Welcome to this week's Data Breaches Digest, a catalogue of links concerning Data Breaches and Cyber Security that were published on the Internet during the period between 8th August and 14th August 2022.
14th August
Apple’s macOS was hacked by the Zoom installer
China unleashes secret attack on Russia as Xi begins to abandon Putin in huge U-turn
Cisco Confirms Network Breach After Employee’s Google Account was Hacked
Data breach at University of Kashmir (KU): A serious issue
Gmail & Google Password Manager Targeted By New Smartphone Threat
Hacker breached our network via employee Google account, says Cisco
Killnet Claim They’ve Stolen Employee Data from Lockheed Martin
Mexico and cybersecurity, is the country protected?
Most common cryptocurrency scams
Newly Uncovered PyPI Package Drops Fileless Cryptominer to Linux Systems
Novant warns patients of data breach; 1.3 million notification letters mailed
OneTouchPoint hit by ransomware attack
Over 9,000 VNC servers exposed online without a password
Senior Care Giant Avamere Suffers Cybersecurity Breach
Tornado Cash Developer Arrested After U.S. Sanctions the Cryptocurrency Mixer
US Treasury sanctions Tornado Cash for money laundering for hacking groups
Why Hackers Are Now Targeting Electric Car Charging Stations
Yanluowang Ransomware: Nigerian Communications Commission’s Computer Security Incident Response Team (NCC-CSIRT) urges stronger security measures
13th August
A New Jailbreak for John Deere Tractors Rides the Right-to-Repair Wave
A practical approach to building resilience with zero trust
An enemy in disguise: Why cybersecurity teams are being set up to fail
Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users
Cisco Hacked: Ransomware Gang Claims It Has 2.8GB Of Data
Cyber Attack at Bombardier Recreational Products (BRP): Will Employees Get Paid?
Cybercrime more profitable than illegal drugs
Fighting back against rising rates of cybercrime
Google fined $60 million over Android location data collection
Hackers Using Google Sites and Microsoft Azure to Launch Crypto Phishing Campaigns
How To Protect Yourself With A More Secure Kind Of Multi-Factor Authentication
Microsoft is criticized by Eclypsium for bootloader security issues
Netskope Discovers Hackers Are Using Google Sites and Microsoft Azure to Steal Crypto
NFT Heists: Are Recent Attacks the First of Many to Come?
Nigerian Communications Commission (NCC) Alerts On Yanluowang Ransomware Threat, Urges Stronger Security
Novant warns patients of data breach
Once, Twice, Three Times A Ransomware Victim: Triple-Hacked In Just 2 Weeks
Potential data breach at iPay88 still under probe, says Bank Negara
Ransomware: NCC-CSIRT urges organisations to adopt stronger security measures
Russian Hackers Are Escalating and Diversifying Their Attacks on Ukraine
Security alert: Researcher gains root access to macOS using Zoom installer
SOVA malware adds ransomware feature to encrypt Android devices
The 4 keys to prevent information theft on social networks like Twitter or Instagram
The Chinese Roots of Hybrid Warfare
This tracker lists and ranks the biggest heists of NFT cryptocurrency
Toronto cannabis store owner loses 'thousands of dollars' after OCS cyberattack delays deliveries
Updated Android Trojan Features Ransomware Capabilities
Use Hotmail or Gmail? This email 'from Royal Mail' could cause you untold misery
Waterloo Region District School Board (WRDSB) confirms employee information dating back to 1970 accessed during cyber incident
Your current cybersecurity approach creates systemic vulnerabilities
12th August
1 million Kashmir University Students & Teachers’ Data ‘hacked, put on sale’ on Dark Web
5 Cost-Effective Ways to Implement Cybersecurity on a Budget
14 Emerging And Ongoing Cyberthreats Every Organization Needs To Be Aware Of
Accusoft Corporation Announces Data Breach
ACTS Retirement Services Faces Class Action over Data Breach
Airbnb, Shell, Walmart, Ray-Ban, and MORE: Top Scams and Phishing Schemes of the Week
Almost 2,000 data breaches reported for the first half of 2022
Anonymous poop gifting site hacked, customers exposed
APT group takes over IT infrastructure
Auto Parts Manufacturer Attacked by Three Different Ransomware in Two weeks
Behavioral Health Group informs 198K patients of data theft from December
Berkshire Partners LLC Announces Data Breach
Beware! A Malware with Fake Nepal Telecom Offer is Spreading
Beware of crypto 'dusting' hacks; here's everything you need to know
Binance Recovers $450,000 Stolen in Curve Phishing Attack
Canada: Municipality’s costly cyber fraud case remains unsolved
Central Oregon hospital overpaid employees by $2 million. Now, it wants that money back
China Is Infiltrating Kids’ Video Games With Propaganda and Spyware
Chinese hackers backdoor chat app with new Linux, macOS malware
Cisco Patches High-Severity Vulnerability Affecting ASA and Firepower Solutions
Cloudflare scuppers Twilio-like cyber attack with hardware keys
Congressional Commission Probes HHS Capability to Address Health Sector Ransomware Attacks
Critical Infrastructure Attacks Remain a Major Threat, Top Security Writer Warns
Crucial Cybersecurity Software Features
Cuba ransomware now targeting critical infrastructure
Cyber incident forces Canadian manufacturer to suspend operations
Cybersecurity a ‘continuous’ battle for Georgetown County in wake of 2021 attack
Cybersecurity lessons from the red team: How to prevent a data breach
Data Alone Isn’t Enough: Why You Need a Defensible, Intelligent Data Inventory
Data security, surveillance practices to be examined by Federal Trade Commission (FTC)
Eclypsium calls out Microsoft over bootloader security woes
Eclypsium researchers present information on 3 new bootloader vulnerabilities
Facebook’s In-app Browser on iOS Tracks ‘Anything You Do on Any Website’
Faster! Faster! Trends in U.S. Cyber Incident Notification Laws
FBI, CISA warn over ransomware gang that can make million dollar demands
Federal Communications Commission (FCC) Warns About Increased Robotext Scams From Automated Smishing Attacks
Gastroenterology Consultants PA to settle data breach class-action suit
Global Threat Actors Use the 'Great Resignation' to Target Job Seekers
Hackers Put Sensitive Data of AKD Securities Up for Sale on Dark Web
Hackers Target School Systems To Get Private Data
Hackers, fraudsters launder US$540 million via crypto bridge RenBridge
Hanesbrands takes US$100m sales hit in ransomware attack
How Can You Prevent Email Hacking and Recover a Hacked Email?
How to protect cybersecurity budgets
How will the crypto crash affect ransomware attacks and payments?
Hungary: Police arrest hackers suspected of stealing millions of forints
Increased threat of ransomware for Small and Medium Businesses
iPay88 data breach: Ministry to take immediate action
K–12 Students Are Using Cyberattacks to Shut Down Schools
Lax Security Courts Liability, Says US Consumer Financial Protection Bureau (CFPB)
Laying the foundations for a cyber resilient future
Lincolnshire Police has lost data or sent it to the wrong person more than 200 times
Living Innovations Reports Data Breach Stemming from Phishing Incident
Lowering Cyberinsurance Premiums with Managed Security Services
Majority of firms lack cyber insurance
Malaysia central bank says investigation ongoing into potential data breach
Microsoft blocks UEFI bootloaders enabling Windows Secure Boot bypass
Microsoft's Delay in Patching 'Dogwalk' Flaw Baffles Security Researchers
Morocco Among 10 Least Cybersecure Countries for Digital Nomads
Morristown health center alerting customers to ransomware attack
NHS 111 systems could be offline until next week following cyber attack
Novel Ransomware Comes to the Sophisticated SOVA Android Banking Trojan
OneDrive, Fidelity Investment, and MORE – 3 Phishing Scams to Watch Out For
Outrage as personal information of Kashmir University students and faculty is ‘hacked’ and sold online
Palo Alto Networks: New PAN-OS DDoS flaw exploited in attacks
Pixsy had a data breach; photographers, change your passwords now
Pixsy Suffers ‘IT Issue’ But Says Data Wasn’t Compromised
Organizations would like the government to help with ransomware demand costs
Ransomware attack blamed for closure of all 7-Eleven stores in Denmark
Ransomware Attack Costs Hanesbrands $100 Million in Lost Sales
Ransomware attacks are hitting small businesses. These are experts’ top defense tips
Ransomware Groups Refine Shakedown and Monetization Models
Ransomware is not going anywhere: Attacks are up 24%
Recovery From NHS Ransomware Attack May Take a Month
Report Shows Hackers Launder $540M Through Crypto RenBridge Platform
Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders
Scammers Are Impersonating Family Members to Get Your Money
School's back, and so are scammers, New York State warns students
SolidBit Ransomware Group Recruiting New Affiliates on Dark Web
Someone stole your NFTs on OpenSea? Here’s what you can do
Southwest Airlines Email Phishing Scam Says ‘Congrats,’ Claims You’ve Received ‘Reward’
St. Charles hospital asks employees to repay $2 million in wages
The Anatomy of Wiper Malware, Part 1: Common Techniques
The impact of exploitable misconfigurations on network security
Thousands of Mobile Apps Are Leaking Twitter API Keys, Could Be Used for Account Hijacking
Threat Actors Use Evernote-Themed Phishing Scheme to Attack Healthcare Organizations
Timecard provider outage has St. Charles calling on workers to repay $2 million in overpayments
Top 6 Security Issues in Mergers and Acquisitions
Transparency is the key to managing cyber attacks
Twilio: 125 customers affected by data breach, no passwords stolen
Twilio Confirms 125 Customers Have Been Affected by Data Breach - Have Passwords Been Stolen?
U.S. Government Offers $10 Million Reward for Information on Conti Ransomware Gang
US Unmasks Suspected Conti Ransomware Actor
Warning over 'genuine looking' Royal Mail scam as thousands targeted
Waterloo public board confirms student database also accessed in cyberattack
What Is the LockBit 3.0 Ransomware and What Can You Do About It?
Why Cloud Storage Needs Cybersecurity
Why Proactive Cybersecurity Is a Must in Today’s Sophisticated Threat Environment
Xiaomi Phones with MediaTek Chips Found Vulnerable to Forged Payments
Xiaomi phones with MediaTek chips vulnerable to forged payments
Xiaomi Smartphone Vulnerabilities Could Lead to Forged Payments
Your Macs Aren't as Secure as You Think
Zeppelin Ransomware Resurfaces with New Compromise, Encryption Tactics
Zeppelin Ransomware Victims May Need Multiple Decryption Keys
11th August
79% of companies invest only in cybersecurity after hacking
85% of Android users are concerned about privacy
Access to hacked corporate networks still strong but sales fall
Advanced begins forensic investigation into ransomware attack
Agriculture Sector in Danger of Cyber Threats
Android Banking Trojan SOVA Comes Back With New Features Including Ransomware
As the cost of cyber insurance rises, the number of organizations who can’t afford it is set to double
Atlas MedStaff LLC Confirms Recent Data Breach Following “Sophisticated Cyberattack”
Australia: Phishing fraudsters used SIM box to fleece hundreds of victims, police allege
Australia: Second man charged over SMS phishing scam
Banks step up cybersecurity following iPay88 data breach
Black Basta: New ransomware threat aiming for the big league
Black Hat at 25: Why Cybersecurity Is Going to Get Worse Before It Gets Better
Canadian recreational vehicle maker BRP, Ontario Cannabis Store dealing with cyber attacks
Cisco admits corporate network compromised by gang with links to Lapsus$
Cisco Confirms It's Been Hacked by Yanluowang Ransomware Gang
Cisco Confirms Network Breach Via Hacked Employee Google Account
Cisco Hacked: Ransomware Gang Claims It Has 2.8GB Of Data
Cisco has been hacked by a ransomware gang
Cisco reveals attack on company's network by ransomware group
Cisco reveals cyberattack on its corporate network
Cisco Talos confirms data breach after ransomware gang 'forces' incident disclosure
Classiscam threat expands to target leading platforms in Singapore
Conti Cybercrime Cartel Using 'BazarCall' Phishing Attacks as Initial Attack Vector
Countering Advanced Persistent Threats With Advanced Persistent Security
Criminals are hacking pharmacy accounts to steal THIS drug
Critical Flaws Disclosed in Device42 IT Asset Management Software
Cyber attacks on health institutions
Cyber-attack targets IT firm used by Northern Ireland's health service
Cyberattacks are particularly costly in health care. Why?
Cyberattacks are reshaping modern warfare. How can countries and companies protect themselves?
'Cybercrime is big-game hunting now...you need to be prepared'
Don't be surprised if your organization suffers multiple cyberattacks
Don’t fall for this ‘fake’ Emirates Airlines free tickets contest - it’s another phishing scam!
Dramatic uptick in threat activity with exploits growing nearly 150%
Education sector most at risk of cyber attack
Email cyberattacks increased 48% in first half of 2022
Facts about ransomware attack
FBI: Zeppelin ransomware may encrypt devices multiple times in attacks
Fears for patient data after ransomware attack on NHS software supplier
Federal Trade Commission (FTC) begins first investigation into crypto industry over $196M data breach
Five cyber scams to avoid now
Fourth-party risk management is essential for software supply chain security
Free toolkit of cybersecurity resources for election security
From Defending the Open Internet to Confronting the Reality of a Fragmented Cyberspace: Reflecting Upon Two CFR Reports on U.S. Goals in Cyberspace
German school hit by ransomware
Hackers are still using these old security flaws in Microsoft Office. Make sure you've patched them
Hackers Behind Cuba Ransomware Attacks Using New RAT Malware
Hackers issue 'ransom demands' to NHS IT supplier: Fears MILLIONS of confidential patient records could be leaked after major cyber attack
How credential phishing attacks threaten a host of industries and organizations
How Cyberattackers Are Cultivating New Strategies and Reconfiguring Classic Gambits
How ransomware gets from one computer to another
Incident of the Week: Twilio suffers data breach following phishing attack
Incident Response for Health Care IT: Differences and Drivers
Insurance and Cyber Security: Why These Two Things Should Be Priorities for Small Businesses
Kashmir University's Data Hacked, 1 Million Students' Data Allegedly Put on Sale
Krebs: ‘We’ve Over-Fetishized the APT Threat’
Lazarus subgroup expands attacks with new ransomware
Malaysia: Use two-factor authentication, avoid social media accounts to stop phishing attacks
Malaysia records RM560m loss in cyber crime last year
Malaysian payment gateway platform iPay88 suffers data leak, card data may be compromised
Mobile Attacks Rise as Devices Become Essential to Productivity
MultiCare announces breach that could impact over 18,000 patients’ health data and records
New Hacker Forum Takes Pro-Ukraine Stance
New Mexico hospital breach compromised the healthcare data of 100K patients
New Report Reveals Fraud Management Is Vital to the Business Strategy of Most Organizations
New Zealand: Scammers pretending to be from Waka Kotahi target vehicle owners
NHS crisis: Criminals issue 'demands' after accessing data – staff without patient records
NHS IT supplier held to ransom by hackers
NHS staff told to plan for three weeks of disruption following cyberattack
Quarterly HP Wolf Security Threat Insights Report highlights growing use of shortcut files to deliver malware
Ransomware attack cost Hanesbrands $100 million in sales. It's unclear whether Winston-Salem company paid the ransom
Ransomware attacks on the rise
Ransomware Data Theft Epidemic Fuelling BEC Attacks
Ransomware potentially exposed 2,000 Ypsilanti-area utility customers’ bank information
Ransomware Victims Want Government to Help Cover Damages
Researchers Unveil More Details On How Hackers Are Installing Android’s Latest Spyware 'Dracarys'
Researchers Warn of Ongoing Mass Exploitation of Zimbra RCE Vulnerability
Sea-Doo maker BRP's operations remain suspended after cyberattack
SMS-Based Multi-Factor Authentication: What Could Go Wrong? Plenty
Starlink Successfully Hacked Using $25 Modchip
Suspected $3m Romance Scammer Extradited to Japan
Swan Bitcoin Discloses Data Leak Due to Phishing Attack on Newsletter Provider
Tenant criticises Clarion Housing communication after cyber attack
Tenet's $100M cyber incident raises 10 must-ask questions for boards
The ransomware ecosystem: What makes it the biggest threat to businesses
The top identity-based attacks and how to stop them: Part 2
The Use of Ethereum in Illegal Activities Rises for Many Criminals
Third-Party Mailing Error Exposes 37K SSNs at Sound Health and Wellness Trust
Three ransomware attacks hit single company over two weeks
UK NHS service recovery may take a month after MSP ransomware attack
US government will pay you $10 million for info on Conti ransomware members
Weak breach data disclosure laws for IP theft leaves vital Australian industries vulnerable
Web3 helps Taiwan secure information against cyberattacks
What happened to the Lapsus$ hackers?
What is a Social Engineering Attack?
What the Zola Hack Can Teach Us About Password Security
Which malware delivery techniques are currently favored by attackers?
Why is Cybersecurity Essential for Small Businesses?
Why MFA Falls Short And What Can Be Done About It
Why SAP systems need to be brought into the cybersecurity fold
Zimbra auth bypass bug exploited to breach over 1,000 servers
Zimbra RCE Vulnerability Exploited Without Admin Privileges
10th August
3 Of The Most Notorious Ransomware Attacks In Internet History
7-Eleven Denmark confirms ransomware attack behind store closures
$8 Million Multistate Settlement Resolves 2019 Data Breach Investigation
9 security threats in the metaverse
36% of orgs expose insecure FTP protocol to the internet, and some still use Telnet
1,980 Data Breaches Were Reported in 2022 H1 and 60% Were the Result of Hacking
American Wholesale Furniture Company Announces Data Breach
Amid heightened fear of ransomware, threat intel seen as ‘core requirement’ of doing business
Amid reports of data breach, Kashmir University says data 'unmodified'
An Inside Look at Hive’s Ransomware-as-a-Service (RaaS) Tactics
Anti-Vax Dating App Offers Up Admin Privileges
Australia: Federal Court rules on Chubb's ransomware dispute
Automotive supplier breached by 3 ransomware gangs in 2 weeks
Big business in cryptocurrencies and cybercrime
Chinese hackers attack government ministries globally
Cisco fixes bug allowing RSA private key theft on ASA, FTD devices
Cisco hacked by Yanluowang ransomware gang, 2.8GB allegedly stolen
Cloud and data protection big challenges for New Zealand businesses
Cloudflare was the target of a sophisticated phishing attack. Here's why it didn't work
Common NFT and Metaverse Scams
Conti extortion gangs behind surge of BazarCall phishing attacks
Convergence and adoption of AI and ML countering the cyber threat
‘Coopetition’ a growing trend among ransomware gangs
Cyber-criminals Shift From Macros to Shortcut Files to Hack Business PCs
Cyprus: SMEs must smarten up against cybercrime
Dark Utilities C2 as a service tool leverages IPFS, targets several operating systems
DeathStalker's VileRAT Continues to Target Foreign and Crypto Exchanges
Do your clients have enough (or any) coverage for ransomware attacks?
Emotet Tops List of July's Most Widely Used Malware
Ex-employee sues San Antonio’s Pape-Dawson Engineers over data breach
Experts Uncover Details on Maui Ransomware Attack by North Korean Hackers
Exploit Activity Surges 150% in Q2 Thanks to Log4Shell
Five steps to effective threat hunting
Global scam operation ‘Classiscam’ expanded to Singapore
Greek Police Launch Investigation into Next Generation Fraudsters
Hacker uses new RAT malware in Cuba Ransomware attacks
Hackers and fraudsters used crypto bridge RenBridge to launder $540 million, says report
Hackers Behind Twilio Breach Also Targeted Cloudflare Employees
Hardware MFA Stops Attack on Cloudflare
Identity is the killer context: 4 ways to stay in control
Illuminate Education Removed From Ed-Tech Privacy Pact Following Data Breach
India: Phishers tempt public with instant loan offers
Ireland: Cyber-attack concerns over DNA database security
ista International takes systems offline in wake of ransomware attack; Daixin Team claims thousands of servers encrypted
Kashmir University: Personal data of over million students hacked, put on sale
Kashmir University Hacking: Data of 1 Million Students Found on Dark Web
Laredo reportedly lost $1.1M in phishing scam
Latest VMware threat report reveals truth about deepfakes
Malaysian PM's messaging accounts hacked as officials deny data breach crisis
Maui ransomware linked to North Korean group Andariel
Microsoft Patches ‘Dogwalk’ Zero-Day and 17 Critical Flaws
New dark web markets claim association with criminal cartels
New Malware Targeting Privacy of Android Users
PCS Revenue Control Systems data breach $1.135M class action settlement
Personal data of 1 million students, employees of Kashmir University hacked, put on sale
Personal data of one million students from Kashmir University hacked
Phishing attack abuses Microsoft Azure, Google Sites to steal crypto
Q2 2022 Threat Landscape: Ransomware Returns, Healthcare Hit
Report shows 1 in 3 organizations now reply weekly ransomware attacks
Research reveals hackers circulating spoof sites, fake apps
Security vs. Convenience
Should your business worry about Chinese cyber attacks?
Surge in CVEs as Microsoft Fixes Exploited Zero Day Bugs
The Business of Hackers-for-Hire Threat Actors
The challenges of managing the modern external attack surface
The next evolution of cyber defense: Ransomware-proof object storage
This company didn't spot the flaw in their network. But three ransomware gangs did
Trust, transparency and reliability are keys to Web3 success
University of Kashmir (KU) Data Breach, Million Student Data On Sale
Weekly Ransomware Attacks Taking a Toll on Security Pros
What is the Impact of Data Loss on Your Business?
Where to Start Your Zero-Trust Journey
Why Zero Trust makes cyber sense in the post-pandemic era
9th August
4 Ways to Avoid the Next Colonial Pipeline Cyberattack
5 ways to identify job phishing schemes
6 industries most vulnerable to ransomware attacks
7-Eleven closes Denmark stores after latest cyberattack on retail point-of-sale systems
10 Credential Stealing Python Libraries Found on PyPI Repository
10 malicious PyPI packages found stealing developer's credentials
125 ransomware attacks on industrial systems in Q2 after Conti shutdown
362,000+ people affected by spine practice data breach
Addressing The Most Common Web Application Security Threats
AiTM phishing attack targeting enterprise users of Gmail
Almost half of Irish people fell victim to a cyber attack last year
An Emerging Trend: Privacy As An Employee Benefit
Asymmetric vs symmetric encryption: What’s the difference?
Bangko Sentral warns public against text phishing scam
Beware of PayPal emails: some are phishing emails disguised as legitimate emails that will try to steal your money
Books chain The Works suffering after cyber attack and cost rises
Bored Ape Yacht Club (BAYC) holders beware: Phishing scammers are defrauding NFT holders for millions of dollars
Building a Data Loss Prevention Strategy for Your Cloud
California Health System Reaches $340K Settlement Over Healthcare Data Breach
Catches of the Month: Phishing Scams for August 2022
Centerstone Announces Data Breach
Chinese Hackers Targeted Dozens of Industrial Enterprises and Public Institutions
CISA Issues Warning on Active Exploitation of UnRAR Software for Linux Systems
CISA warns of Windows and UnRAR flaws exploited in the wild
Cloudflare avoided breach despite employees falling for same scam that snared Twilio
Cloudflare employees also hit by hackers behind Twilio breach
Cloudflare Foils SMS Phishing Attack With Security Keys
Crypto World Hit With Another Theft As Nomad Loses $190 Million In Hack
Cyera Finds 'Ghost Data' Expands Threat Surface Making Businesses More Vulnerable to Ransomware Attacks, Compliance Violations
deBridge suspects Lazarus Group behind attempted phishing attack
Education sector experiencing more than double monthly attacks, compared to other industries
Email Is The Single Biggest Threat To Businesses, And Here’s What You Can Do About It
Finland parliament website targeted in cyber attack
Gibson Overseas, Inc. Announces Data Breach
GitHub Zero-Day: From 35K Repos Compromised to False Alarm
Greek Police Launch Investigation into Organised Fraudsters
Hackers Compromise Employee Accounts to Access Twilio Internal Systems
Hackers install Dracarys Android malware using modified Signal app
Hashed passwords exposed in Slack vulnerability
Health Adviser Fined After Illegally Accessing Medical Records
Hospitals still don't have a handle on their IoT devices
How hackers are stealing credit cards from classifieds sites
How Stolen Credentials and Ransomware are a Simultaneous Threat
Identity Cyber Attacks Dominate Microsoft 365 Cybersecurity Incidents, Export Research Findings
Identity Management Firm Entrust Suffers a Security Breach, Ransomware Gang Obtains Files
Infamous Lazarus Group Attempted Cyber-Attack
LogoKit update: The phishing kit leveraging open redirect vulnerabilities
Malicious deepfakes used in attacks up 13% from last year, VMware finds
Malware Families Love Telegram, Discord as Much as Users
Maui ransomware operation linked to North Korean 'Andariel' hackers
Medical platform ‘leaks’ nearly 100,000 healthcare professionals’ personal data
Microsoft: Exchange ‘Extended Protection’ needed to fully patch new bugs
Microsoft August 2022 Patch Tuesday fixes exploited zero-day, 121 flaws
Microsoft fixes exploited zero-day in Windows Support Diagnostic Tool (CVE-2022-34713)
Microsoft Issues Patches for 121 Flaws, Including Zero-Day Under Active Attack
Microsoft patches Windows DogWalk zero-day exploited in attacks
Microsoft Patches Zero-Day Actively Exploited in the Wild
Modern Cyber Threats, Supply Chain Attacks Are Burning Out IT Pros, Experts Say
Molecular Pathology Laboratory Network, Inc. Reports Healthcare Data Breach Impacting Patients’ PHI
Multiple Adversary Ransomware Attacks Increasing
Nation-State Hackers Targeted Facebook in Cyber Espionage Attacks
New Malicious Python Libraries Found on PyPI Repository
NHS 111 System Experiencing Disruption Due to Cyber Attack, System Outage May Impact Services for Several Days
North Korean Cryptocurrency Hacking Poised To Get Even Worse
Number of Firms Unable to Access Cyber-Insurance Set to Double
Orange Business Services Confirms Third-Party Data Breach Affecting Employee Data
Patch Tuesday: Yet another Microsoft RCE bug under active exploit
Policyholders left exposed to rising phishing losses
Preventing email phishing attacks this summer with 3 defensive measures
Quebec farmers union under ransomware cyberattack
Ransomware gangs move away from exploiting Microsoft Office macros
Ransomware Reigns as Cybersecurity Insurance Gap Festers
Report Provides Updates on July's Maui Ransomware Incident
Rise of precision agriculture exposes food system to new threats
Securing employee workstations
Smishing Attack Led to Major Twilio Breach
Suspected Russian cyber attack on British soil as firm subjected to ‘daily’ hacks
Technical support scam still alive and kicking
The Truth About False Positives in Security
Thinking Outside the Mailbox: Modernized Phishing Techniques
Three ransomware gangs consecutively attacked the same network
Top Malware of 2021 Has Been in Use for Years, CISA Warns
Trellix report finds business services top target of ransomware attacks
Twilio confirms data breach after its employees got phished
Twilio Suffers Data Breach After Employees Fall Victim to SMS Phishing Attack
Twitter admits to data breach exposing contact info for 5.4 million accounts
U.S. Sanctions Virtual Currency Mixer Tornado Cash for Alleged Use in Laundering
UK Parliament TikTok account banned over doubts of data breach by China
Understanding your attack surface is key to recognizing what you are defending
US Blacklists Tornado Cash, GitHub Removes Co-Founder in Response
US Treasury Sanctions Virtual Currency Mixer For Connections With Lazarus Group
Virtual Currency Platform ‘Tornado Cash’ Accused of Aiding APTs
VMware warns of public exploit for critical auth bypass vulnerability
Vulnerability scanning vs penetration testing: What’s the difference?
Vyve warns customers of phishing scam
Why Data Security Is No Longer Optional (And How To Start)
Why Does Every Hack Involve Stolen Credentials? Because It Works Every Time
Why web apps need to improve secure service access
Windows 11 To Block Brute Force Ransomware Attacks by Default
8th August
3 Common Bank Scams Targeting NFCU, Bank of America, and M&T Bank
7-Eleven stores in Denmark closed due to a cyberattack
API Security: A Complete Guide
Architecture firm Sheppard Robson suffers a ransomware attack; perpetrators unknown
Attackers abuse open redirects in Snapchat and Amex in phishing attacks
Australia: Low cyber-security awareness is making local councils a target, says expert
Bot attacks target pharmaceutical industry to steal prescriptions
Buying Cyber Insurance Gets Trickier as Attacks Proliferate, Costs Rise
Chinese Hackers May Be Behind Attacks Targeting Eastern Europe and Afghanistan
Chinese hackers use new Windows malware to backdoor govt, defense orgs
Cyber attack on software supplier causes "major outage" across the NHS
Cyber attacks in the gaming sector up 167% in 12 months
Cyberattacks on healthcare organizations negatively impact patient care
Cyber Criminals’ Eye South African SMEs Lack of Security
Dark Utilities C2 service draws thousands of cyber criminals
Data Breach: Twitter confirms personal details of millions of account holders compromised
Data privacy regulation a top three challenge for IoT adopters
deBridge Finance crypto platform targeted by Lazarus hackers
Deepfake attacks and cyber extortion are creating mounting risks
Deepfakes, cyber extortion, API attacks and other emerging cyber threats
Email marketing firm hacked to steal crypto-focused mailing lists
Entrust cyber attack: Hackers accessed cyber security vendor's internal network
Global scam operation "Classiscam" expanded to Singapore
Growing cybercrime demands firm African response
Hackers Exploit Open Redirect Vulnerabilities to Conduct LogoKit Phishing Campaigns
Hackers take down UK emergency services system
Hackers target small businesses’ social media accounts
Hackers Using SHARPEXT Browser Malware to Spy on Gmail and Aol Users
How older security vulnerabilities continue to pose a threat
How To: Approach IoMT Security and Risk Management
How to find out if you are involved in a data breach - and what to do next
How to protect your organization from the top malware strains
India: A Glance At Online Fraud – Phishing
Iran: Israeli hackers down IRGC's news website
Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook
Meta Takes Action Against Cyber Espionage Operations Targeting Facebook in South Asia
New Orchard Botnet Uses Bitcoin Founder's Account Info to Generate Malicious Domains
NHS 111 hit by cyber attack
NHS Cyber-Attack Delays Ambulances
No More Ransom project helps more than 1.5 million people decrypt devices
North Korean hackers are using never-before-seen tools to hack Gmail
North Korean Hackers Behind Attempted DeBridge Attack
North Korean Hackers Target Crypto Job Seekers
Phishers Swim Around 2FA in Coinbase Account Heists
Phishing Scam increases by 234 percent in Africa
Ransomware in Rovagnati, Lockbit spreads all stolen data: data breach analysis
Researchers Uncover Classiscam Scam-as-a-Service Operations in Singapore
Severe skills shortage for cybersecurity professionals a major concern for the industry
Spain's Radioactivity Alert Network disrupted in alarming insider attack
Survey software QuestionPro breached; 22m email addresses stolen by hacker
The Fall of Passwords and the Rise of Analytics
The metaverse faces more than 8 potential cyberthreats
The threat of ransomware is now increasing
Twilio discloses data breach after SMS phishing attack on employees
US sanctions crypto mixer Tornado Cash used by North Korean hackers
VMware Report Warns of Deepfake Attacks and Cyber Extortion
Windows devices with newest CPUs are susceptible to data damage
Wootton Upper School presented a £500,000 ransom note by the Hive ransomware group
Your cybersecurity staff are burned out - and many have thought about quitting
Zero-Day Bug Responsible for Massive Twitter Breach