Editor's Message

Welcome to DBD. On March 8th we celebrated our 4th Anniversary and the 1st Anniversary of our PRiSM application, officially endorsed by the SANS Institute. Despite recent personal issues that have impacted the amount of time I have been able to dedicate to both projects, I have been doing my best to keep everything as up-to-date as possible, and I would like to take this opportunity to thank everyone for their patience and support whilst I navigate through this very difficult time. Stay safe. :)



Monday 8 August 2022

Data Breaches Digest - Week 32 2022

Welcome to this week's Data Breaches Digest, a catalogue of links concerning Data Breaches and Cyber Security that were published on the Internet during the period between 8th August and 14th August 2022.


14th August

Apple’s macOS was hacked by the Zoom installer

China unleashes secret attack on Russia as Xi begins to abandon Putin in huge U-turn

Cisco Confirms Network Breach After Employee’s Google Account was Hacked

Data breach at University of Kashmir (KU): A serious issue

Gmail & Google Password Manager Targeted By New Smartphone Threat

Hacker breached our network via employee Google account, says Cisco

Killnet Claim They’ve Stolen Employee Data from Lockheed Martin

Mexico and cybersecurity, is the country protected?

Most common cryptocurrency scams

Newly Uncovered PyPI Package Drops Fileless Cryptominer to Linux Systems

Novant warns patients of data breach; 1.3 million notification letters mailed

OneTouchPoint hit by ransomware attack

Over 9,000 VNC servers exposed online without a password

Senior Care Giant Avamere Suffers Cybersecurity Breach

Tornado Cash Developer Arrested After U.S. Sanctions the Cryptocurrency Mixer

US Treasury sanctions Tornado Cash for money laundering for hacking groups

Why Hackers Are Now Targeting Electric Car Charging Stations

Yanluowang Ransomware: Nigerian Communications Commission’s Computer Security Incident Response Team (NCC-CSIRT) urges stronger security measures

13th August

A New Jailbreak for John Deere Tractors Rides the Right-to-Repair Wave

A practical approach to building resilience with zero trust

An enemy in disguise: Why cybersecurity teams are being set up to fail

Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users

Cisco Hacked: Ransomware Gang Claims It Has 2.8GB Of Data

Cyber Attack at Bombardier Recreational Products (BRP): Will Employees Get Paid?

Cybercrime more profitable than illegal drugs

Fighting back against rising rates of cybercrime

Google fined $60 million over Android location data collection

Hackers Using Google Sites and Microsoft Azure to Launch Crypto Phishing Campaigns

How To Protect Yourself With A More Secure Kind Of Multi-Factor Authentication

Microsoft is criticized by Eclypsium for bootloader security issues

Netskope Discovers Hackers Are Using Google Sites and Microsoft Azure to Steal Crypto

NFT Heists: Are Recent Attacks the First of Many to Come?

Nigerian Communications Commission (NCC) Alerts On Yanluowang Ransomware Threat, Urges Stronger Security

Novant warns patients of data breach

Once, Twice, Three Times A Ransomware Victim: Triple-Hacked In Just 2 Weeks

Potential data breach at iPay88 still under probe, says Bank Negara

Ransomware: NCC-CSIRT urges organisations to adopt stronger security measures

Russian Hackers Are Escalating and Diversifying Their Attacks on Ukraine

Security alert: Researcher gains root access to macOS using Zoom installer

SOVA malware adds ransomware feature to encrypt Android devices

The 4 keys to prevent information theft on social networks like Twitter or Instagram

The Chinese Roots of Hybrid Warfare

This tracker lists and ranks the biggest heists of NFT cryptocurrency

Toronto cannabis store owner loses 'thousands of dollars' after OCS cyberattack delays deliveries

Updated Android Trojan Features Ransomware Capabilities

Use Hotmail or Gmail? This email 'from Royal Mail' could cause you untold misery

Waterloo Region District School Board (WRDSB) confirms employee information dating back to 1970 accessed during cyber incident

Your current cybersecurity approach creates systemic vulnerabilities

12th August

1 million Kashmir University Students & Teachers’ Data ‘hacked, put on sale’ on Dark Web

5 Cost-Effective Ways to Implement Cybersecurity on a Budget

14 Emerging And Ongoing Cyberthreats Every Organization Needs To Be Aware Of

Accusoft Corporation Announces Data Breach

ACTS Retirement Services Faces Class Action over Data Breach

Airbnb, Shell, Walmart, Ray-Ban, and MORE: Top Scams and Phishing Schemes of the Week

Almost 2,000 data breaches reported for the first half of 2022

Anonymous poop gifting site hacked, customers exposed

APT group takes over IT infrastructure

Auto Parts Manufacturer Attacked by Three Different Ransomware in Two weeks

Behavioral Health Group informs 198K patients of data theft from December

Berkshire Partners LLC Announces Data Breach

Beware! A Malware with Fake Nepal Telecom Offer is Spreading

Beware of crypto 'dusting' hacks; here's everything you need to know

Binance Recovers $450,000 Stolen in Curve Phishing Attack

Canada: Municipality’s costly cyber fraud case remains unsolved

Central Oregon hospital overpaid employees by $2 million. Now, it wants that money back

China Is Infiltrating Kids’ Video Games With Propaganda and Spyware

Chinese hackers backdoor chat app with new Linux, macOS malware

Cisco Patches High-Severity Vulnerability Affecting ASA and Firepower Solutions

Cloudflare scuppers Twilio-like cyber attack with hardware keys

Congressional Commission Probes HHS Capability to Address Health Sector Ransomware Attacks

Critical Infrastructure Attacks Remain a Major Threat, Top Security Writer Warns

Crucial Cybersecurity Software Features

Cuba ransomware now targeting critical infrastructure

Cyber incident forces Canadian manufacturer to suspend operations

Cybersecurity a ‘continuous’ battle for Georgetown County in wake of 2021 attack

Cybersecurity lessons from the red team: How to prevent a data breach

Data Alone Isn’t Enough: Why You Need a Defensible, Intelligent Data Inventory

Data security, surveillance practices to be examined by Federal Trade Commission (FTC)

Eclypsium calls out Microsoft over bootloader security woes

Eclypsium researchers present information on 3 new bootloader vulnerabilities

Facebook’s In-app Browser on iOS Tracks ‘Anything You Do on Any Website’

Faster! Faster! Trends in U.S. Cyber Incident Notification Laws

FBI, CISA warn over ransomware gang that can make million dollar demands

Federal Communications Commission (FCC) Warns About Increased Robotext Scams From Automated Smishing Attacks

Gastroenterology Consultants PA to settle data breach class-action suit

Global Threat Actors Use the 'Great Resignation' to Target Job Seekers

Hackers Put Sensitive Data of AKD Securities Up for Sale on Dark Web

Hackers Target School Systems To Get Private Data

Hackers, fraudsters launder US$540 million via crypto bridge RenBridge

Hanesbrands takes US$100m sales hit in ransomware attack

How Can You Prevent Email Hacking and Recover a Hacked Email?

How to protect cybersecurity budgets

How will the crypto crash affect ransomware attacks and payments?

Hungary: Police arrest hackers suspected of stealing millions of forints

Increased threat of ransomware for Small and Medium Businesses

iPay88 data breach: Ministry to take immediate action

K–12 Students Are Using Cyberattacks to Shut Down Schools

Lax Security Courts Liability, Says US Consumer Financial Protection Bureau (CFPB)

Laying the foundations for a cyber resilient future

Lincolnshire Police has lost data or sent it to the wrong person more than 200 times

Living Innovations Reports Data Breach Stemming from Phishing Incident

Lowering Cyberinsurance Premiums with Managed Security Services

Majority of firms lack cyber insurance

Malaysia central bank says investigation ongoing into potential data breach

Microsoft blocks UEFI bootloaders enabling Windows Secure Boot bypass

Microsoft's Delay in Patching 'Dogwalk' Flaw Baffles Security Researchers

Morocco Among 10 Least Cybersecure Countries for Digital Nomads

Morristown health center alerting customers to ransomware attack

NHS 111 systems could be offline until next week following cyber attack

Novel Ransomware Comes to the Sophisticated SOVA Android Banking Trojan

OneDrive, Fidelity Investment, and MORE – 3 Phishing Scams to Watch Out For

Outrage as personal information of Kashmir University students and faculty is ‘hacked’ and sold online

Palo Alto Networks: New PAN-OS DDoS flaw exploited in attacks

Pixsy had a data breach; photographers, change your passwords now

Pixsy Suffers ‘IT Issue’ But Says Data Wasn’t Compromised

Organizations would like the government to help with ransomware demand costs

Ransomware attack blamed for closure of all 7-Eleven stores in Denmark

Ransomware Attack Costs Hanesbrands $100 Million in Lost Sales

Ransomware attacks are hitting small businesses. These are experts’ top defense tips

Ransomware Groups Refine Shakedown and Monetization Models

Ransomware is not going anywhere: Attacks are up 24%

Recovery From NHS Ransomware Attack May Take a Month

Report Shows Hackers Launder $540M Through Crypto RenBridge Platform

Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders

Scammers Are Impersonating Family Members to Get Your Money

School's back, and so are scammers, New York State warns students

SolidBit Ransomware Group Recruiting New Affiliates on Dark Web

Someone stole your NFTs on OpenSea? Here’s what you can do

Southwest Airlines Email Phishing Scam Says ‘Congrats,’ Claims You’ve Received ‘Reward’

St. Charles hospital asks employees to repay $2 million in wages

The Anatomy of Wiper Malware, Part 1: Common Techniques

The impact of exploitable misconfigurations on network security

Thousands of Mobile Apps Are Leaking Twitter API Keys, Could Be Used for Account Hijacking

Threat Actors Use Evernote-Themed Phishing Scheme to Attack Healthcare Organizations

Timecard provider outage has St. Charles calling on workers to repay $2 million in overpayments

Top 6 Security Issues in Mergers and Acquisitions

Transparency is the key to managing cyber attacks

Twilio: 125 customers affected by data breach, no passwords stolen

Twilio Confirms 125 Customers Have Been Affected by Data Breach - Have Passwords Been Stolen?

U.S. Government Offers $10 Million Reward for Information on Conti Ransomware Gang

US Unmasks Suspected Conti Ransomware Actor

Warning over 'genuine looking' Royal Mail scam as thousands targeted

Waterloo public board confirms student database also accessed in cyberattack

What Is the LockBit 3.0 Ransomware and What Can You Do About It?

Why Cloud Storage Needs Cybersecurity

Why Proactive Cybersecurity Is a Must in Today’s Sophisticated Threat Environment

Xiaomi Phones with MediaTek Chips Found Vulnerable to Forged Payments

Xiaomi phones with MediaTek chips vulnerable to forged payments

Xiaomi Smartphone Vulnerabilities Could Lead to Forged Payments

Your Macs Aren't as Secure as You Think

Zeppelin Ransomware Resurfaces with New Compromise, Encryption Tactics

Zeppelin Ransomware Victims May Need Multiple Decryption Keys

11th August

79% of companies invest only in cybersecurity after hacking

85% of Android users are concerned about privacy

Access to hacked corporate networks still strong but sales fall

Advanced begins forensic investigation into ransomware attack

Agriculture Sector in Danger of Cyber Threats

Android Banking Trojan SOVA Comes Back With New Features Including Ransomware

As the cost of cyber insurance rises, the number of organizations who can’t afford it is set to double

Atlas MedStaff LLC Confirms Recent Data Breach Following “Sophisticated Cyberattack”

Australia: Phishing fraudsters used SIM box to fleece hundreds of victims, police allege

Australia: Second man charged over SMS phishing scam

Banks step up cybersecurity following iPay88 data breach

Black Basta: New ransomware threat aiming for the big league

Black Hat at 25: Why Cybersecurity Is Going to Get Worse Before It Gets Better

Canadian recreational vehicle maker BRP, Ontario Cannabis Store dealing with cyber attacks

Cisco admits corporate network compromised by gang with links to Lapsus$

Cisco Confirms It's Been Hacked by Yanluowang Ransomware Gang

Cisco Confirms Network Breach Via Hacked Employee Google Account

Cisco Hacked: Ransomware Gang Claims It Has 2.8GB Of Data

Cisco has been hacked by a ransomware gang

Cisco reveals attack on company's network by ransomware group

Cisco reveals cyberattack on its corporate network

Cisco Talos confirms data breach after ransomware gang 'forces' incident disclosure

Classiscam threat expands to target leading platforms in Singapore

Conti Cybercrime Cartel Using 'BazarCall' Phishing Attacks as Initial Attack Vector

Countering Advanced Persistent Threats With Advanced Persistent Security

Criminals are hacking pharmacy accounts to steal THIS drug

Critical Flaws Disclosed in Device42 IT Asset Management Software

Cyber attacks on health institutions

Cyber-attack targets IT firm used by Northern Ireland's health service

Cyberattacks are particularly costly in health care. Why?

Cyberattacks are reshaping modern warfare. How can countries and companies protect themselves?

'Cybercrime is big-game hunting now...you need to be prepared'

Don't be surprised if your organization suffers multiple cyberattacks

Don’t fall for this ‘fake’ Emirates Airlines free tickets contest - it’s another phishing scam!

Dramatic uptick in threat activity with exploits growing nearly 150%

Education sector most at risk of cyber attack

Email cyberattacks increased 48% in first half of 2022

Facts about ransomware attack

FBI: Zeppelin ransomware may encrypt devices multiple times in attacks

Fears for patient data after ransomware attack on NHS software supplier

Federal Trade Commission (FTC) begins first investigation into crypto industry over $196M data breach

Five cyber scams to avoid now

Fourth-party risk management is essential for software supply chain security

Free toolkit of cybersecurity resources for election security

From Defending the Open Internet to Confronting the Reality of a Fragmented Cyberspace: Reflecting Upon Two CFR Reports on U.S. Goals in Cyberspace

German school hit by ransomware

Hackers are still using these old security flaws in Microsoft Office. Make sure you've patched them

Hackers Behind Cuba Ransomware Attacks Using New RAT Malware

Hackers issue 'ransom demands' to NHS IT supplier: Fears MILLIONS of confidential patient records could be leaked after major cyber attack

How credential phishing attacks threaten a host of industries and organizations

How Cyberattackers Are Cultivating New Strategies and Reconfiguring Classic Gambits

How ransomware gets from one computer to another

Incident of the Week: Twilio suffers data breach following phishing attack

Incident Response for Health Care IT: Differences and Drivers

Insurance and Cyber Security: Why These Two Things Should Be Priorities for Small Businesses

Kashmir University's Data Hacked, 1 Million Students' Data Allegedly Put on Sale

Krebs: ‘We’ve Over-Fetishized the APT Threat’

Lazarus subgroup expands attacks with new ransomware

Malaysia: Use two-factor authentication, avoid social media accounts to stop phishing attacks

Malaysia records RM560m loss in cyber crime last year

Malaysian payment gateway platform iPay88 suffers data leak, card data may be compromised

Mobile Attacks Rise as Devices Become Essential to Productivity

MultiCare announces breach that could impact over 18,000 patients’ health data and records

New Hacker Forum Takes Pro-Ukraine Stance

New Mexico hospital breach compromised the healthcare data of 100K patients

New Report Reveals Fraud Management Is Vital to the Business Strategy of Most Organizations

New Zealand: Scammers pretending to be from Waka Kotahi target vehicle owners

NHS crisis: Criminals issue 'demands' after accessing data – staff without patient records

NHS IT supplier held to ransom by hackers

NHS staff told to plan for three weeks of disruption following cyberattack

Quarterly HP Wolf Security Threat Insights Report highlights growing use of shortcut files to deliver malware

Ransomware attack cost Hanesbrands $100 million in sales. It's unclear whether Winston-Salem company paid the ransom

Ransomware attacks on the rise

Ransomware Data Theft Epidemic Fuelling BEC Attacks

Ransomware potentially exposed 2,000 Ypsilanti-area utility customers’ bank information

Ransomware Victims Want Government to Help Cover Damages

Researchers Unveil More Details On How Hackers Are Installing Android’s Latest Spyware 'Dracarys'

Researchers Warn of Ongoing Mass Exploitation of Zimbra RCE Vulnerability

Sea-Doo maker BRP's operations remain suspended after cyberattack

SMS-Based Multi-Factor Authentication: What Could Go Wrong? Plenty

Starlink Successfully Hacked Using $25 Modchip

Suspected $3m Romance Scammer Extradited to Japan

Swan Bitcoin Discloses Data Leak Due to Phishing Attack on Newsletter Provider

Tenant criticises Clarion Housing communication after cyber attack

Tenet's $100M cyber incident raises 10 must-ask questions for boards

The ransomware ecosystem: What makes it the biggest threat to businesses

The top identity-based attacks and how to stop them: Part 2

The Use of Ethereum in Illegal Activities Rises for Many Criminals

Third-Party Mailing Error Exposes 37K SSNs at Sound Health and Wellness Trust

Three ransomware attacks hit single company over two weeks

UK NHS service recovery may take a month after MSP ransomware attack

US government will pay you $10 million for info on Conti ransomware members

Weak breach data disclosure laws for IP theft leaves vital Australian industries vulnerable

Web3 helps Taiwan secure information against cyberattacks

What happened to the Lapsus$ hackers?

What is a Social Engineering Attack?

What the Zola Hack Can Teach Us About Password Security

Which malware delivery techniques are currently favored by attackers?

Why is Cybersecurity Essential for Small Businesses?

Why MFA Falls Short And What Can Be Done About It

Why SAP systems need to be brought into the cybersecurity fold

Zimbra auth bypass bug exploited to breach over 1,000 servers

Zimbra RCE Vulnerability Exploited Without Admin Privileges

10th August

3 Of The Most Notorious Ransomware Attacks In Internet History

7-Eleven Denmark confirms ransomware attack behind store closures

$8 Million Multistate Settlement Resolves 2019 Data Breach Investigation

9 security threats in the metaverse

36% of orgs expose insecure FTP protocol to the internet, and some still use Telnet

1,980 Data Breaches Were Reported in 2022 H1 and 60% Were the Result of Hacking

American Wholesale Furniture Company Announces Data Breach

Amid heightened fear of ransomware, threat intel seen as ‘core requirement’ of doing business

Amid reports of data breach, Kashmir University says data 'unmodified'

An Inside Look at Hive’s Ransomware-as-a-Service (RaaS) Tactics

Anti-Vax Dating App Offers Up Admin Privileges

Australia: Federal Court rules on Chubb's ransomware dispute

Automotive supplier breached by 3 ransomware gangs in 2 weeks

Big business in cryptocurrencies and cybercrime

Chinese hackers attack government ministries globally

Cisco fixes bug allowing RSA private key theft on ASA, FTD devices

Cisco hacked by Yanluowang ransomware gang, 2.8GB allegedly stolen

Cloud and data protection big challenges for New Zealand businesses

Cloudflare was the target of a sophisticated phishing attack. Here's why it didn't work

Common NFT and Metaverse Scams

Conti extortion gangs behind surge of BazarCall phishing attacks

Convergence and adoption of AI and ML countering the cyber threat

‘Coopetition’ a growing trend among ransomware gangs

Cyber-criminals Shift From Macros to Shortcut Files to Hack Business PCs

Cyprus: SMEs must smarten up against cybercrime

Dark Utilities C2 as a service tool leverages IPFS, targets several operating systems

DeathStalker's VileRAT Continues to Target Foreign and Crypto Exchanges

Do your clients have enough (or any) coverage for ransomware attacks?

Emotet Tops List of July's Most Widely Used Malware

Ex-employee sues San Antonio’s Pape-Dawson Engineers over data breach

Experts Uncover Details on Maui Ransomware Attack by North Korean Hackers

Exploit Activity Surges 150% in Q2 Thanks to Log4Shell

Five steps to effective threat hunting

Global scam operation ‘Classiscam’ expanded to Singapore

Greek Police Launch Investigation into Next Generation Fraudsters

Hacker uses new RAT malware in Cuba Ransomware attacks

Hackers and fraudsters used crypto bridge RenBridge to launder $540 million, says report

Hackers Behind Twilio Breach Also Targeted Cloudflare Employees

Hardware MFA Stops Attack on Cloudflare

Identity is the killer context: 4 ways to stay in control

Illuminate Education Removed From Ed-Tech Privacy Pact Following Data Breach

India: Phishers tempt public with instant loan offers

Ireland: Cyber-attack concerns over DNA database security

ista International takes systems offline in wake of ransomware attack; Daixin Team claims thousands of servers encrypted

Kashmir University: Personal data of over million students hacked, put on sale

Kashmir University Hacking: Data of 1 Million Students Found on Dark Web

Laredo reportedly lost $1.1M in phishing scam

Latest VMware threat report reveals truth about deepfakes

Malaysian PM's messaging accounts hacked as officials deny data breach crisis

Maui ransomware linked to North Korean group Andariel

Microsoft Patches ‘Dogwalk’ Zero-Day and 17 Critical Flaws

New dark web markets claim association with criminal cartels

New Malware Targeting Privacy of Android Users

PCS Revenue Control Systems data breach $1.135M class action settlement

Personal data of 1 million students, employees of Kashmir University hacked, put on sale

Personal data of one million students from Kashmir University hacked

Phishing attack abuses Microsoft Azure, Google Sites to steal crypto

Q2 2022 Threat Landscape: Ransomware Returns, Healthcare Hit

Report shows 1 in 3 organizations now reply weekly ransomware attacks

Research reveals hackers circulating spoof sites, fake apps

Security vs. Convenience

Should your business worry about Chinese cyber attacks?

Surge in CVEs as Microsoft Fixes Exploited Zero Day Bugs

The Business of Hackers-for-Hire Threat Actors

The challenges of managing the modern external attack surface

The next evolution of cyber defense: Ransomware-proof object storage

This company didn't spot the flaw in their network. But three ransomware gangs did

Trust, transparency and reliability are keys to Web3 success

University of Kashmir (KU) Data Breach, Million Student Data On Sale

Weekly Ransomware Attacks Taking a Toll on Security Pros

What is the Impact of Data Loss on Your Business?

Where to Start Your Zero-Trust Journey

Why Zero Trust makes cyber sense in the post-pandemic era

9th August

4 Ways to Avoid the Next Colonial Pipeline Cyberattack

5 ways to identify job phishing schemes

6 industries most vulnerable to ransomware attacks

7-Eleven closes Denmark stores after latest cyberattack on retail point-of-sale systems

10 Credential Stealing Python Libraries Found on PyPI Repository

10 malicious PyPI packages found stealing developer's credentials

125 ransomware attacks on industrial systems in Q2 after Conti shutdown

362,000+ people affected by spine practice data breach

Addressing The Most Common Web Application Security Threats

AiTM phishing attack targeting enterprise users of Gmail

Almost half of Irish people fell victim to a cyber attack last year

An Emerging Trend: Privacy As An Employee Benefit

Asymmetric vs symmetric encryption: What’s the difference?

Bangko Sentral warns public against text phishing scam

Beware of PayPal emails: some are phishing emails disguised as legitimate emails that will try to steal your money

Books chain The Works suffering after cyber attack and cost rises

Bored Ape Yacht Club (BAYC) holders beware: Phishing scammers are defrauding NFT holders for millions of dollars

Building a Data Loss Prevention Strategy for Your Cloud

California Health System Reaches $340K Settlement Over Healthcare Data Breach

Catches of the Month: Phishing Scams for August 2022

Centerstone Announces Data Breach

Chinese Hackers Targeted Dozens of Industrial Enterprises and Public Institutions

CISA Issues Warning on Active Exploitation of UnRAR Software for Linux Systems

CISA warns of Windows and UnRAR flaws exploited in the wild

Cloudflare avoided breach despite employees falling for same scam that snared Twilio

Cloudflare employees also hit by hackers behind Twilio breach

Cloudflare Foils SMS Phishing Attack With Security Keys

Crypto World Hit With Another Theft As Nomad Loses $190 Million In Hack

Cyera Finds 'Ghost Data' Expands Threat Surface Making Businesses More Vulnerable to Ransomware Attacks, Compliance Violations

deBridge suspects Lazarus Group behind attempted phishing attack

Education sector experiencing more than double monthly attacks, compared to other industries

Email Is The Single Biggest Threat To Businesses, And Here’s What You Can Do About It

Finland parliament website targeted in cyber attack

Gibson Overseas, Inc. Announces Data Breach

GitHub Zero-Day: From 35K Repos Compromised to False Alarm

Greek Police Launch Investigation into Organised Fraudsters

Hackers Compromise Employee Accounts to Access Twilio Internal Systems

Hackers install Dracarys Android malware using modified Signal app

Hashed passwords exposed in Slack vulnerability

Health Adviser Fined After Illegally Accessing Medical Records

Hospitals still don't have a handle on their IoT devices

How hackers are stealing credit cards from classifieds sites

How Stolen Credentials and Ransomware are a Simultaneous Threat

Identity Cyber Attacks Dominate Microsoft 365 Cybersecurity Incidents, Export Research Findings

Identity Management Firm Entrust Suffers a Security Breach, Ransomware Gang Obtains Files

Infamous Lazarus Group Attempted Cyber-Attack

LogoKit update: The phishing kit leveraging open redirect vulnerabilities

Malicious deepfakes used in attacks up 13% from last year, VMware finds

Malware Families Love Telegram, Discord as Much as Users

Maui ransomware operation linked to North Korean 'Andariel' hackers

Medical platform ‘leaks’ nearly 100,000 healthcare professionals’ personal data

Microsoft: Exchange ‘Extended Protection’ needed to fully patch new bugs

Microsoft August 2022 Patch Tuesday fixes exploited zero-day, 121 flaws

Microsoft fixes exploited zero-day in Windows Support Diagnostic Tool (CVE-2022-34713)

Microsoft Issues Patches for 121 Flaws, Including Zero-Day Under Active Attack

Microsoft patches Windows DogWalk zero-day exploited in attacks

Microsoft Patches Zero-Day Actively Exploited in the Wild

Modern Cyber Threats, Supply Chain Attacks Are Burning Out IT Pros, Experts Say

Molecular Pathology Laboratory Network, Inc. Reports Healthcare Data Breach Impacting Patients’ PHI

Multiple Adversary Ransomware Attacks Increasing

Nation-State Hackers Targeted Facebook in Cyber Espionage Attacks

New Malicious Python Libraries Found on PyPI Repository

NHS 111 System Experiencing Disruption Due to Cyber Attack, System Outage May Impact Services for Several Days

North Korean Cryptocurrency Hacking Poised To Get Even Worse

Number of Firms Unable to Access Cyber-Insurance Set to Double

Orange Business Services Confirms Third-Party Data Breach Affecting Employee Data

Patch Tuesday: Yet another Microsoft RCE bug under active exploit

Policyholders left exposed to rising phishing losses

Preventing email phishing attacks this summer with 3 defensive measures

Quebec farmers union under ransomware cyberattack

Ransomware gangs move away from exploiting Microsoft Office macros

Ransomware Reigns as Cybersecurity Insurance Gap Festers

Report Provides Updates on July's Maui Ransomware Incident

Rise of precision agriculture exposes food system to new threats

Securing employee workstations

Smishing Attack Led to Major Twilio Breach

Suspected Russian cyber attack on British soil as firm subjected to ‘daily’ hacks

Technical support scam still alive and kicking

The Truth About False Positives in Security

Thinking Outside the Mailbox: Modernized Phishing Techniques

Three ransomware gangs consecutively attacked the same network

Top Malware of 2021 Has Been in Use for Years, CISA Warns

Trellix report finds business services top target of ransomware attacks

Twilio confirms data breach after its employees got phished

Twilio Suffers Data Breach After Employees Fall Victim to SMS Phishing Attack

Twitter admits to data breach exposing contact info for 5.4 million accounts

U.S. Sanctions Virtual Currency Mixer Tornado Cash for Alleged Use in Laundering

UK Parliament TikTok account banned over doubts of data breach by China

Understanding your attack surface is key to recognizing what you are defending

US Blacklists Tornado Cash, GitHub Removes Co-Founder in Response

US Treasury Sanctions Virtual Currency Mixer For Connections With Lazarus Group

Virtual Currency Platform ‘Tornado Cash’ Accused of Aiding APTs

VMware warns of public exploit for critical auth bypass vulnerability

Vulnerability scanning vs penetration testing: What’s the difference?

Vyve warns customers of phishing scam

Why Data Security Is No Longer Optional (And How To Start)

Why Does Every Hack Involve Stolen Credentials? Because It Works Every Time

Why web apps need to improve secure service access

Windows 11 To Block Brute Force Ransomware Attacks by Default

8th August

3 Common Bank Scams Targeting NFCU, Bank of America, and M&T Bank

7-Eleven stores in Denmark closed due to a cyberattack

API Security: A Complete Guide

Architecture firm Sheppard Robson suffers a ransomware attack; perpetrators unknown

Attackers abuse open redirects in Snapchat and Amex in phishing attacks

Australia: Low cyber-security awareness is making local councils a target, says expert

Bot attacks target pharmaceutical industry to steal prescriptions

Buying Cyber Insurance Gets Trickier as Attacks Proliferate, Costs Rise

Chinese Hackers May Be Behind Attacks Targeting Eastern Europe and Afghanistan

Chinese hackers use new Windows malware to backdoor govt, defense orgs

Cyber attack on software supplier causes "major outage" across the NHS

Cyber attacks in the gaming sector up 167% in 12 months

Cyberattacks on healthcare organizations negatively impact patient care

Cyber Criminals’ Eye South African SMEs Lack of Security

Dark Utilities C2 service draws thousands of cyber criminals

Data Breach: Twitter confirms personal details of millions of account holders compromised

Data privacy regulation a top three challenge for IoT adopters

deBridge Finance crypto platform targeted by Lazarus hackers

Deepfake attacks and cyber extortion are creating mounting risks

Deepfakes, cyber extortion, API attacks and other emerging cyber threats

Email marketing firm hacked to steal crypto-focused mailing lists

Entrust cyber attack: Hackers accessed cyber security vendor's internal network

Global scam operation "Classiscam" expanded to Singapore

Growing cybercrime demands firm African response

Hackers Exploit Open Redirect Vulnerabilities to Conduct LogoKit Phishing Campaigns

Hackers take down UK emergency services system

Hackers target small businesses’ social media accounts

Hackers Using SHARPEXT Browser Malware to Spy on Gmail and Aol Users

How older security vulnerabilities continue to pose a threat

How To: Approach IoMT Security and Risk Management

How to find out if you are involved in a data breach - and what to do next

How to protect your organization from the top malware strains

India: A Glance At Online Fraud – Phishing

Iran: Israeli hackers down IRGC's news website

Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook

Meta Takes Action Against Cyber Espionage Operations Targeting Facebook in South Asia

New Orchard Botnet Uses Bitcoin Founder's Account Info to Generate Malicious Domains

NHS 111 hit by cyber attack

NHS Cyber-Attack Delays Ambulances

No More Ransom project helps more than 1.5 million people decrypt devices

North Korean hackers are using never-before-seen tools to hack Gmail

North Korean Hackers Behind Attempted DeBridge Attack

North Korean Hackers Target Crypto Job Seekers

Phishers Swim Around 2FA in Coinbase Account Heists

Phishing Scam increases by 234 percent in Africa

Ransomware in Rovagnati, Lockbit spreads all stolen data: data breach analysis

Researchers Uncover Classiscam Scam-as-a-Service Operations in Singapore

Severe skills shortage for cybersecurity professionals a major concern for the industry

Spain's Radioactivity Alert Network disrupted in alarming insider attack

Survey software QuestionPro breached; 22m email addresses stolen by hacker

The Fall of Passwords and the Rise of Analytics

The metaverse faces more than 8 potential cyberthreats

The threat of ransomware is now increasing

Twilio discloses data breach after SMS phishing attack on employees

US sanctions crypto mixer Tornado Cash used by North Korean hackers

VMware Report Warns of Deepfake Attacks and Cyber Extortion

Windows devices with newest CPUs are susceptible to data damage

Wootton Upper School presented a £500,000 ransom note by the Hive ransomware group

Your cybersecurity staff are burned out - and many have thought about quitting

Zero-Day Bug Responsible for Massive Twitter Breach