DAILY NEWS: Janeiro / Fevereiro (28/01/2024 - 03/02/2024) - 05 Semana de 2024Cyber Security, Privacy and Information Security News --- Daily Updates !! Week Resume03/02AnyDesk Hacked: Popular Remote Desktop Software Mandates Password ResetAnyDesk Urges Password Change Amid Security BreachAtlanta Women’s Health Group notifying patients of April 2023 data breachCanada’s most prolific hacker is expected to make full restitutionClorox says cyberattack caused $49 million in expensesCyber attack on OWWA website foiled —DICTDiretor-geral do Inca fala sobre ataque hacker que paralisou atendimentosElite Supplements customers targeted in cyber attackFormer CIA Hacker Gets 40 Years In Prison For Leaking Documents To WikileaksHackers silenciosos atacam você por anos e você nem nota, diz analista Joshua Schulte: Why former CIA hacker is sentenced 40 years in jail?Mastodon vulnerability allows attackers to take over accountsMastodon Vulnerability Allows Hackers to Hijack Any Decentralized AccountRansomware Attacks Target These 5 Sectors MostReports of data breach on Class Charts platformThe Department of Information and Communications Technology (DICT) blocks cyber attack, traces threat origin from ChinaTotal Health overcomes cyber attack and ensures the continuity of services for more than 4.8 million membersU.S. Sanctions 6 Iranian Officials for Critical Infrastructure Cyber Attacks02/02App de mobile banking é atacado e hackers põem dados à vendaApple Vision Pro: a potential privacy nightmare, for just $3.5K Belarusian charged with crypto laundering BISD phone system now back online with new vendor following ransomware attackBlackbaud Must Improve Poor Security, Data Retention Practices to Avoid Future Breaches, Says FTCBTC-e server admin indicted for laundering ransom payments, stolen cryptoCasaSpeciale Hit by Data Breach, AlphaTeam Claims ResponsibilityCloudflare blocks cyberattack on Brazil data center, but rips out equipment anywayCloudflare Breach: Nation-State Hackers Access Source Code and Internal DocsCloudflare breached on Thanksgiving Day, but the attack was promptly containedCloudflare frustra hack a seu data center fora de operação em SPCloudflare Hacked After State Actor Leverages Okta BreachCloudflare Suffers Breach After Failing to Rotate Stolen Okta CredentialsCloudzy Elevates Cybersecurity: Integrating Insights from Recorded Future to Revolutionize Cloud SecurityConselho de Corretores de MT aciona PF para investigar ataque de hacker à rede socialCredential Harvesting Vs. Credential Stuffing Attacks: What’s the Difference?Crowdsourced security is not just for tech companies anymoreCyber Attack on Indian Air Force: Attempt to Steal Data via EmailCyber Fail: When Ransomware Gangs Get CarelessDDoS attack power skyrockets to 1.6 TbpsDecoding KillNet 2.0 and Sylhet Gang-SG Cyberattack Plans for 2024Detecting First-Party Fraud: Strategies and ChallengesDirtyMoe Malware Infects 2,000+ Ukrainian Computers for DDoS and CryptojackingEU adopts first cybersecurity certification scheme for safer tech EU and United States enhance cooperation on cybersecurityEuropcar denies data breach amid alleged sale of customer infoEx CIA employee Joshua Adam Schulte sentenced to 40 years in prisonEx-CIA hacker jailed for 40 years for his role in WikiLeaksFans' and players' personal information reportedly exposed in Football Australia data leakFeds Face a Midnight Deadline for Resetting Ivanti GatewaysFootball Australia data breach: Personal details of fans and players allegedly leaked IG NewsFormer CIA Engineer Sentenced to 40 Years for Leaking Classified DocumentsGrasping the estimated cost of cybercrime: how recovery can cost US$5 millionGroton schools’ internet outage from ‘cyber-attack’ under investigationGrupo hacker explora dispositivos USB e plataformas legítimasHackers deploy login credentials they stole at Okta to hack Cloudflare – updateHackers tentam invadir datacenter da Cloudflare em São PauloHewlett Packard Data Breach: IntelBroker Alleges Sale of Sensitive InformationHow Does Cybersecurity Services Prevent Businesses From Cyber Attacks?How to Protect Your Webmail Account From Cyberthreats and PhishingIndian Bank Data Breach Sparks Concern: Database Allegedly on SaleINTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPsInterpol operation Synergia takes down 1,300 servers used for cybercrimeIt’s a wrap: EU states finally find compromise on AI Act Italian Data Protection Authority Alleges Breaches of GDPR by ChatGPT PlatformJohnson Controls says it spent $27 million to remediate September ransomware attackLockBit 3.0 Ransomware Targets Manchester Fertility ClinicLockBit group targets Chicago hospital, demands $900,000 as ransomLockBit Reigns Supreme in Soaring Ransomware LandscapeLurie Children's Hospital took systems offline after cyberattackMalicious logins from suspicious infrastructure fuel identity-based incidentsMassive Trello User Data Leak: Hacker Lists 15 Million Records on a Dark Web Hacking ForumMicrosoft Ditches C# for Rust: M365 Core Gets Safety and Perf BoostsMispadu Stealer’s New Variant Targets Browser Data of Mexican UsersMore Ransomware Victims Are Declining to Pay ExtortionistsMurder suspect freed after cyberattackNavigating the DORA Regulation: What UK Finance Firms Need to KnowNIS2 Directive raises stakes for security leaders'No loss of your banking data' says Shropshire venue as it works to kill spam email invaderOperation Synergia led to the arrest of 31 individualsOxford Academy refers itself to Information Commissioner's Office (ICO) over data breach"Poderia ser pior", diz hacker condenado a pagar US$ 14 milhões para a Nintendo pelo resto da vidaPurpleFox malware infected at least 2,000 computers in UkraineRansomware group threatens to leak sensitive data from Virginia IT services firm with U.S. military contractsRomance Scam Victims Surge in 2023Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay AttacksSaiba quanto o Judiciário gaúcho já gastou para prevenir ataques hackersSecurity Leaders, C-Suite Unite to Tackle CyberthreatsSurvey Surfaces Raft of Cloud Security Challenges Tax return scammers flood Google with fake ads Teen Chatting App Wizz Removed from Apple and Google Stores for Sextortion ConcernsTelefónica Breached Again: Hackers Claim to Sell Unauthorized AccessThe CSO guide to top security conferencesUnderstanding the Connection Between IoT Vulnerabilities and Home Network IntrusionsWas BrightStar Care attacked by two different groups — or was there only one breach?Why you should always change your logins after a data breach01/023.5M exposed in COVID-19 e-passport leak71% of businesses haven’t incorporated AI into physical securityAll federal civilian agencies ordered to disconnect at-risk Ivanti products by FridayAnonymous Sudan Claims DDOS Attacks on UAE’s Flydubai AirlineAustralian IT Pros Need to Prepare for AI Regulation for the First Time With EU AI Act Imminent Change Your Password Day: Five Reasons to (Finally) Do ItCISA orders federal agencies to disconnect Ivanti VPN appliances by SaturdayCISA Warns of Active Exploitation of Critical Flaws in Apple iOS and macOSCivil society in Jordan under assault by NSO’s Pegasus spywareCustom rules in security tools can be a game changer for vulnerability detectionCVEMap: Open-source tool to query, browse and search CVEsCyber attack forces New Jersey's Freehold Township School District to shut schoolsCybersecurity M&A Roundup: HPE Agrees $14bn Acquisition, Deals Announced by SonicWall and SentinelOneDigital watermarking and the future of online trustExposed Docker APIs Under Attack in 'Commando Cat' Cryptojacking CampaignFBI disrupts Chinese botnet used for targeting US critical infrastructure Federal contractor suffers data breachFritzFrog botnet exploits Log4Shell, PwnKit vulnerabilitiesFritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your NetworkFulton County government systems paralyzed by cyberattackGitHub Vulnerability: Key Rotation Amid High-Severity ThreatGoogle’s Bazel Exposed to Command Injection ThreatGoogle shares fix for Pixel phones hit by bad system updateHack à Orange Espanha inunda a dark web de credenciaisHeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto MiningHow FBI deleted China malware from US routersIn 2023, Cybercriminals Were Still Using Social Engineering to Steal Your Credentials Inca sofre ataque hacker e paralisa atendimentos de radioterapiaIndia-linked hackers target Pakistan with spyware in new campaignInternational fintech firm exposes data of over 300K traders in cybersecurity breachInterpol arrests more than 30 cybercriminals in global ‘Synergia’ operationInterpol-Led Initiative Targets 1300 Suspicious IPsIs Your Remote Workforce Truly Safe? Three Reasons Zero-Trust is the Answer Ivanti Releases Zero-Day Patches and Reveals Two New BugsMedical device maker Exactech breachedMultiple malware used in attacks exploiting Ivanti VPN flawsNew Windows Event Log zero-day flaw gets unofficial patchesPayment fraud is hitting organizations harder than ever beforePolice seized 50,000 Bitcoin from operator of the now-defunct piracy site movie2kProtect AI adds LLM support with open source acquisitionPump-and-Dump Schemes Make Crypto Fraudsters $240mPurpleFox malware infected thousands of systems in UkraineRipple Co-Founder’s Personal XRP Wallet Breached in $112 Million HackRussian spies impersonating Western researchers in ongoing hacking campaignTeen arrest sheds light on US swatting epidemicTelegram is a Wide-Open Marketplace for Phishing Tools The American View: The Art of Deliberate Miscommunication: Decoding Office PoliticsThreat actor used Vimeo, Ars Technica to serve second-stage malwareTimex Group says cyber attack compromised the data of over 3,000 current and former employeesTop cybersecurity product news of the weekUber fined $11M for violating privacy of EU driversUnpacking the challenges of AI cybersecurityUS Agencies Failure to Oversee Ransomware Protections Threaten White House GoalsU.S. Feds Shut Down China-Linked "KV-Botnet" Targeting SOHO Routers US security agencies terminate China-backed hacking attemptUS Thwarts Volt Typhoon Cyber Espionage Campaign Through Router DisruptionZero trust implementation: Plan, then execute, one step at a timeWarning: New Malware Emerges in Attacks Exploiting Ivanti VPN VulnerabilitiesWhy the Right Metrics Matter When it Comes to Vulnerability ManagementWomen in Security nominations close in one month31/0123andMe data breach targeted Jews A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logsAI And 5G are Defining a New Era of Cybersecurity: The Industry Must Collectively Adapt Alert: Ivanti Discloses 2 New Zero-Day Flaws, One Under Active ExploitationAnnual recovery costs from cybercrime soar up to $5 million for businessesBankers Life and Casualty Company Files Notice of Data Breach Impacting ThousandsBucks 911 Communications Center Back Online After OutageBucks County's 911 dispatch system up and running after 9-day outage from cyber attackCanada’s foreign affairs department hit by data breach Canada’s foreign affairs department investigates data breachCanadian government probes cyberattack and data breach at Global Affairs DepartmentCentennial Bank Files Notice of Data Breach with Texas Attorney GeneralCISA: Vendors must secure SOHO routers against Volt Typhoon attacksCISA warns of patched iPhone kernel bug now exploited in attacksCitibank Sued For Failing to Protect Fraud VictimsCity Cyber Taskforce Launches to Secure Corporate Finance Confronting the SaaS Data Protection and Security CrisisCrime bosses behind Myanmar cyber ‘fraud dens’ handed over to Chinese governmentCritical Flaws Found in GNU C Library, Major Linux Distros at RiskCyberArk releases online ransomware decryptorCybercriminals replace familiar tactics to exfiltrate sensitive dataData Breach Response: What Are The Needed Steps To Be Taken By Businesses?Database management enters a new era of complexityDecember cyberattack on Chicago community hospital claimed by LockBit gangDelinea report highlights switch in ransomware techniques Delinea research reveals that ransomware is back on the rise as cybercriminals’ motivation shifts to data exfiltration Des Moines Orthopedic Surgeons (DMOS) warns of data breach, expert says “it’s everything you’d want as a thief”Does CVSS 4.0 solve the exploitability problem?Dogecoin Community Tracks Down Hacker As MyDogeWallet Is Compromised AgainDrop in Ransomware Payments Suggest Futility in Paying AttackersEU Launches First Cybersecurity Certification for Digital Products Europcar denies data breach of 50 million users, says data is fakeEuropcar dismisses data leak claims as AI fakeExploit released for Android local elevation flaw impacting 7 OEMsFBI disrupts Chinese botnet by wiping malware from infected routersFootball Australia leak exposes players’ detailsFree ransomware recovery tool White Phoenix now has a web versionGlobal Affairs Canada Investigating Cyberattack and Data BreachHackers Exploit Trusted Platform Redirect Flaws For Phishing AttacksHackers Exploiting Ivanti VPN Flaws to Deploy KrustyLoader MalwareHackers Hijacking MS-SQL Servers to Install Mimic Ransomware Hackers obtain confidential information on Romanian officials after cyber attack at Parliament How ransomware has changed and the groups to watch out for in 2024How to make developers accept DevSecOpsIndian Telecom Users' Data on Sale on Dark Web: CloudSEK ReportItalian Businesses Hit by Weaponized USBs Spreading Cryptojacking MalwareIvanti VPN Flaws Exploited to Spread KrustyLoader MalwareIvanti warns of new Connect Secure zero-day exploited in attacksJohnson Controls Lost $27M and Corporate Data in September Ransomware AttackJohnson Controls says ransomware attack cost $27 million, data stolenKent councils say cyber incident disrupted public services and online operationsLafayette Life Announces Third-Party Data Breach at First Financial Security, Inc. Compromised Customer InfoLeading Mobile Banking App Hit by IntelBroker Hackers, Sensitive Data Up for SaleLoanPro Confirms December 2023 Data Breach Affecting an Unknown Number of ConsumersMalaysian Telecom Provider, Aminia Hit by Pro-Israeli Cyberattack, Website InaccessibleMercedes source code exposed via GitHub token leakMicrosoft Teams became a phishing highway for DarkGate malware“More Groups, More Problems”: Searchlight Cyber Report Reveals Ransomware Groups to Watch in 2024Most UK firms pay ransomware demands, despite ‘do not pay’ policiesNearly 4-year-old Cisco vuln linked to recent Akira ransomware attacksNew Glibc Flaw Grants Attackers Root Access on Major Linux DistrosNoName Cyberattack Strikes Prominent Organizations in NetherlandsPawn Storm’s Stealthy Net-NTLMv2 Assault RevealedPhishing campaign spreads malware via Microsoft TeamsPlanet Home Lending Discloses Ransomware AttackProactive cybersecurity: A strategic approach to cost efficiency and crisis managementRansomware Attacks Are So Severe, Some Security Pros Are Being HospitalizedRansomware payment rates drop to new low – only 29% of victims are forking over cashR00TK1T Breaches Backend Systems Of Local Comms And Network Solutions Provider Aminia [UPDATE]RunC Flaws Enable Container Escapes, Granting Attackers Host AccessSchneider Electric Energy Giant Confirms Cactus Ransomware AttackSchneider Electric's Sustainability Division hit by ransomware attack and data breachSecuring Your SaaS Landscape: Closer Look at Disaster Recovery, Posture ManagementSecurity leaders share thoughts on Schneider Electric ransomware attackSysdig Report Exposes 91% Failure in Runtime ScansTelegram Is a 'Scammer's Paradise' Thanks to Cheap Phishing ToolsTelegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and MalwareThe SEC Won't Let CISOs Be: Understanding New SaaS Cybersecurity RulesTietoevry advances restoration after ransomwareTop 10 Tips to Prevent Ransomware: Safeguarding Your Digital FortressUkraine boasts of cyber attack on Russian Defense Ministry US brokerage giant Keenan & Associates says August cyber attack impacted over 1.5m peopleU.S. Officials Detained a 19-year-old SIM-Swap HackerUS Sanctions Egyptian IT Experts Aiding ISIS in CybersecurityUS Senators Propose Cybersecurity Agriculture BillU.S. Treasury Imposes Sanctions on Alleged ISIS Cybersecurity ExpertsValheim Discord servers locked after hacker releases virusVisa sued over ‘Vanilla’ gift card draining scam30/011.5 Million Affected by Data Breach at Insurance Broker Keenan & Associates3 Best Practices to Improve Threat Hunting 3 security gadgets I never leave home without 71% of Ransomware Attack Victims Refuse to Pay the RansomA mishandled GitHub token exposed Mercedes-Benz source codeAfter Cyber Attack, Freehold Twp. Schools Returning To NormalAkira claims major ransomware attack on British cosmetics retailer LushAlpha Ransomware Group Launches Data Leak Site on the Dark WebALPHV/BlackCat Hackers Claim Attack on Technica, Documents at Risk of ExposureApós ataque hacker no Inca, pacientes sofrem para marcar consulta: 'não tem plano B'Apparel Giant VF Corporation’s Ransomware Attack Leaked PII of over 35 Million CustomersAssessing and quantifying AI risk: A challenge for enterprisesAtaque hacker bilionário à exchange Bitfinex vai virar filme da AmazonAtaque hacker prejudica atendimento no Instituto Nacional de CâncerAussie fintech start-up Cape denies hacker’s data breach claimBalancing AI benefits with security and privacy risks in healthcareBarnsley Council at ‘high risk’ of cyber attackBrazilian Feds Dismantle Grandoreiro Banking Trojan, Arresting Top OperativesBeware of Phobos Ransomware Delivered via Office DocumentBreach of watchmaker Timex exposes thousandsCactus ransomware gang claims the Schneider Electric hackChina-Linked Hackers Target Myanmar's Top Ministries with Backdoor BlitzCitibank sued over failure to defend customers against hacks, fraudClay County continuing to alert residents to October 2023 data breachCyber Events the Top Risk for Organizations in 2024Cybersecurity Survey: What Keeps Brits Awake at Night?Data Highlights Substantial Decrease in Ransom Payments, with Only 29% Complying in Q4 2023Data leak at fintech giant reveals staff calling clients ‘idiots’Data of 750 Million Indian Mobile Subscribers Sold on Hacker ForumsDelinea Research Reveals that Ransomware is Back on the Rise as Cybercriminals' Motivation Shifts to Data Exfiltration Email Authentication Protocols: Preventing Phishing and Spoofing AttacksEnergy giant Schneider Electric hit by huge ransomware attackExcessive Expansion Vulnerabilities Leave Jenkins Servers Open to AttacksFaction: Open-source pentesting report generation and collaboration frameworkFBI: Scammers Are Sending Couriers to Collect Cash From VictimsFBI warns of scammers sending live couriers to collect moneyFulton County computer systems still down after cyber attackGlobal Ransomware Attacks Reach Record High for 2023, According to Corvus Insurance Q4 Ransomware ReportGreat security or great UX? Both, pleaseHacker group R00TK1T claims its first victim in MalaysiaHackers invadem o sistema do Instituto Nacional de CâncerHampered cyber attack councils in Kent report ‘data breach’How SMBs can lower their risk of cyberattacks and data breachesHow to Bridge the Cyber Talent GapHow to manage Fedora's firewall without using the command line Hundreds of network operators’ credentials found circulating in Dark WebHyperFund founder faces charges in $1.7 billion crypto schemeImproving cybersecurity culture: A priority in the year of the CISOIndian telecom regulator orders security audit amid alleged data breach of 750 million subscribersInstituto Nacional do Câncer sofre ataque hacker e suspende serviços de radioterapiaInstituto Nacional do Câncer sofre invasão hacker e impacta no funcionamento dos serviçosInsurance Broker Keenan Says 1.5 Million Affected by Data Breach Italian Data Protection Watchdog Accuses OpenAI's ChatGPT of Privacy ViolationsJuniper Networks Releases Urgent Junos OS Updates for High-Severity FlawsKeenan & Associates alerts 1.5 million customers of data breachKeenan & Associates Data Breach Affects More Than 1.5 Million IndividualsLoanDepot class action alleges company failed to prevent massive data breachMalaysian telco provider has data breach – againMedusa ransomware group claims cyber attack on Kansas City transportation agency, demands $2m in ransomMicrosoft Teams exposed a gateway to deliver DarkGate malwareMicrosoft Teams phishing pushes DarkGate malware via group chatsNew ZLoader Malware Variant Surfaces with 64-bit Windows CompatibilityOrange España Breach: Dark Web Flooded With Operator CredentialsPF cumpre mandado em Goiás em operação que mira hackers; roubos chegaram a 3,6 milhões de eurosPF: hackers brasileiros criam vírus para roubar 3,6 milhões de eurosPolice disrupt Grandoreiro banking malware operation, make arrestsQ4 Ransomware Report: 2023 ends as a record-breaking yearRansomware Incidents Hit Record High, But Law Enforcement Takedowns Slow GrowthRansomware on the rise with mid-size companies a prime targetRansomware recap 2023 highlights cybersecurity crisisResearch shows cybercriminals’ motivation shifts to data exfiltrationRussian APT28 phishing Ukraine's military to steal login infoRust Payloads Exploiting Ivanti Zero-Days Linked to Sophisticated Sliver ToolkitSalesforce-based phishing attacks surge 109% since the start of 2024Salud Total cyber attack: EPS confirms impact on servicesSchneider Electric Confirms Data Accessed in Ransomware AttackSchneider Electric hit by Cactus Ransomware cyber attackSelf-managed GitLab installations should be patched again (CVE-2024-0402)Sistema do Instituto Nacional do Câncer sofre invasão hackerSlowMist reports 80% of X comments related to phishing software Smart Vendor Security Is Key To Avoiding A Data Breach In 2024Stablecoin sofre hack, perde milhões e cai abaixo de US$ 1Tapping into the Potential of Generative AI in CybersecurityTentativa de ataque hacker impede recarga de cartões Fácil e de Estudante na Grande GoiâniaThe Ransomware Threat in 2024 is Growing: ReportThere was a 39% surge in data exfiltration cyberattacks in 2023Top Security Posture Vulnerabilities RevealedToronto Public Library website partially restored but personal accounts still downUK House of Lords Calls For Legislation on Facial Recognition TechUnlocking sustainable security practices with secure coding educationURGENT: Upgrade GitLab - Critical Workspace Creation Flaw Allows File OverwriteU.S. Disabled 'Pervasive' Chinese Hacking Network Targeting Presidential Election, Military Infrastructure, Taiwan ResponseUS disables hacking network targeting critical infrastructureU.S. Postal Service phishing scams rising after post-holiday lullWhy you need to think before you scan that QR codeWindsor Hospital’s Journey to Cyberattack Rehabilitation: New Recovery Phase Announced29/011.5M affected in insurance broker breach10 penetration testing tools the pros use23andMe says hackers accessed raw genotypes and family tree information of users45k Jenkins servers exposed to RCE attacks using public exploits493 Companies Share Their SaaS Security Battles – Get Insights in this WebinarAI will increase global ransomware threat, UK cyber security chiefs warnAlbabat, Kasseika, Kuiper: New Ransomware Gangs Rise with Rust and GolangAlleged NoName Ransomware Attack Targets Multiple Organizations in a Single DayAnnual cost of recovering from cybercrime can be as much as US$5 MillionAnthropic confirms data leak amid FTC probeApple's new Stolen Device Protection has a big vulnerability. Here's how to fix it BianLian Ransomware Group Strikes Again, Targeting Two US-Based CompaniesBinance issues warning amidst surge in WhatsApp phishing scamsCanada wakes up to China, Russia, Iran threat to intellectual propertyCaravan and Motorhome Club responding to a major systems outage following a LockBit ransomware attackCI/CD at Risk as Exploits Released For Critical Jenkins BugCritical Jenkins RCE flaw exploited in the wild. Patch now! (CVE-2024-23897)Crypto Users Alarmed by Phishing Emails Impersonating PatreonCybercriminals embrace smarter strategies, less effortDark Web Drugs Vendor Forfeits $150m After Guilty Plea‘Delete Immediately’: Trezor Warns Users of Elaborate Phishing Emails and Large Scale AttackDHS employees jailed for stealing data of 200K U.S. govt workersEnergy giant Schneider Electric hit by Cactus ransomware attackExploring the intersection of network security and modern technologiesFBI: Tech support scams now use couriers to collect victims' moneyFinland Follows the Money: Tracing Monero to Catch HackerFTC and DOJ tell firms: find ways not to delete internal chatsGlobal critical infrastructure faces relentless cyber activityGoGet takes action against phishing scam: Multiple fraudulent websites discovered Hacker group R00TK1T threatens to attack Malaysia’s digital infrastructureHigher cyber defenses lead to higher ransoms, study findsHow to Change Mac Permissions via the Mac Terminal Impersonating authorities accounts for 9% of all phishing attacks in VNInformation Commissioner's Office (ICO) confirms data breach reports from Kent councilsItaly watchdog says OpenAI's ChatGPT breaches privacy rulesKeenan warns 1.5 million people of data breach after summer cyberattackKillnet 2.0 Emerges as a Dark Web Force; New Features and Capabilities DiscussedLush cyber attack claimed by Akira ransomware gangMalicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows MachinesMercedes-Benz accidentally exposed sensitive data, including source codeMicrosoft Provides Defense Guidance After Nation-State CompromiseMicrosoft says Outlook apps can’t connect to Outlook.comMicrosoft Teams hit by second outage in three daysMicrosoft Teams returns to normalcy after outageNational Security Agency buys web browsing data without warrant, letter showsNigeria Data Protection Commission (NDPC) investigating 17 major cases of data breach in Nigeria, earns N400 millionNigerian 'Yahoo Boys' Behind Social Media Sextortion Surge in the USNSA Admits Secretly Buying Your Internet Browsing Data without WarrantsNSA buys internet browsing records from data brokers without a warrantNSA found illegally buying private data of AmericansPhishing Emails Pose as Patreon, Promoting Fake Crypto ProjectsPhobos Ransomware Family Expands With New FAUST VariantPlataforma de karaokê baseada em blockchain sofre hack de R$ 58 milhõesPolícia da Finlândia rastreia transações de Monero para prender hacker que extorquia vítimasPrioritizing cybercrime intelligence for effective decision-making in cybersecurityRansomware payments drop to record low as victims refuse to payRansomware remains the most pressing security issue worldwide — but even schools are being targeted nowReport: election wave will bring tsunami of internet shutdownsResearchers simulate AI-assisted biological attack, uncover new risksResearchers Uncover How Outlook Vulnerability Could Leak Your NTLM PasswordsRiding the AI Waves: The Rise of Artificial Intelligence to Combat Cyber ThreatsTexas therapy provider Concentra Health notifies 4 million patients of data theft incidentThird-party risk management best practices and why they matterUkraine’s SBU arrested a member of Pro-Russia hackers group ‘Cyber Army of Russia’Unwanted emails from Patreon? Crypto users say it might be a phishing scam US Senator Exposes NSA Purchase of Americans’ Internet RecordsWhat to do when deep fakes break our trustYou've been hit by a data breach in NY. What should you do next? Here are first steps28/01Airbus in talks to acquire big data and cybersecurity branch of Atos‘Akira' ransomware behind Bucks Co. emergency dispatch system cyberattack Armis on verge of acquiring cyber startup Silk Security for tens of millions of dollarsAutoridades finlandesas rastrearam transações de Monero ligadas ao hack da Vastaamo Crypto Stealing PyPI Malware Hits Both Windows and Linux UsersCyber Security vs. Data Science: Which Career is Best in 2024Data Privacy Day: Data Privacy Enforcement Changes Impacting Businesses in 2024Don’t let QR codes scam you: After phishing, quishing attacks on the riseExploits released for critical Jenkins RCE flaw, patch nowMassive Data Breach: Personal Information of 750 Million Users, Including Indians, Exposed on the Dark WebMedusa ransomware attack hit Kansas City Area Transportation AuthorityMultiple PoC exploits released for Jenkins flaw CVE-2024-23897The Prime Minister in Washington to discuss energy, cyber security, commerceTrello data breach exposes 15 million users' details on Dark Web Why Cyber Resilience Matters More Than CybersecurityDAILY NEWS: Janeiro (21/01/2024 - 27/01/2024) - 04 Semana de 2024
Cyber Security, Privacy and Information Security News --- Daily Updates !! Week Resume03/02AnyDesk Hacked: Popular Remote Desktop Software Mandates Password ResetAnyDesk Urges Password Change Amid Security BreachAtlanta Women’s Health Group notifying patients of April 2023 data breachCanada’s most prolific hacker is expected to make full restitutionClorox says cyberattack caused $49 million in expensesCyber attack on OWWA website foiled —DICTDiretor-geral do Inca fala sobre ataque hacker que paralisou atendimentosElite Supplements customers targeted in cyber attackFormer CIA Hacker Gets 40 Years In Prison For Leaking Documents To WikileaksHackers silenciosos atacam você por anos e você nem nota, diz analista Joshua Schulte: Why former CIA hacker is sentenced 40 years in jail?Mastodon vulnerability allows attackers to take over accountsMastodon Vulnerability Allows Hackers to Hijack Any Decentralized AccountRansomware Attacks Target These 5 Sectors MostReports of data breach on Class Charts platformThe Department of Information and Communications Technology (DICT) blocks cyber attack, traces threat origin from ChinaTotal Health overcomes cyber attack and ensures the continuity of services for more than 4.8 million membersU.S. Sanctions 6 Iranian Officials for Critical Infrastructure Cyber Attacks02/02App de mobile banking é atacado e hackers põem dados à vendaApple Vision Pro: a potential privacy nightmare, for just $3.5K Belarusian charged with crypto laundering BISD phone system now back online with new vendor following ransomware attackBlackbaud Must Improve Poor Security, Data Retention Practices to Avoid Future Breaches, Says FTCBTC-e server admin indicted for laundering ransom payments, stolen cryptoCasaSpeciale Hit by Data Breach, AlphaTeam Claims ResponsibilityCloudflare blocks cyberattack on Brazil data center, but rips out equipment anywayCloudflare Breach: Nation-State Hackers Access Source Code and Internal DocsCloudflare breached on Thanksgiving Day, but the attack was promptly containedCloudflare frustra hack a seu data center fora de operação em SPCloudflare Hacked After State Actor Leverages Okta BreachCloudflare Suffers Breach After Failing to Rotate Stolen Okta CredentialsCloudzy Elevates Cybersecurity: Integrating Insights from Recorded Future to Revolutionize Cloud SecurityConselho de Corretores de MT aciona PF para investigar ataque de hacker à rede socialCredential Harvesting Vs. Credential Stuffing Attacks: What’s the Difference?Crowdsourced security is not just for tech companies anymoreCyber Attack on Indian Air Force: Attempt to Steal Data via EmailCyber Fail: When Ransomware Gangs Get CarelessDDoS attack power skyrockets to 1.6 TbpsDecoding KillNet 2.0 and Sylhet Gang-SG Cyberattack Plans for 2024Detecting First-Party Fraud: Strategies and ChallengesDirtyMoe Malware Infects 2,000+ Ukrainian Computers for DDoS and CryptojackingEU adopts first cybersecurity certification scheme for safer tech EU and United States enhance cooperation on cybersecurityEuropcar denies data breach amid alleged sale of customer infoEx CIA employee Joshua Adam Schulte sentenced to 40 years in prisonEx-CIA hacker jailed for 40 years for his role in WikiLeaksFans' and players' personal information reportedly exposed in Football Australia data leakFeds Face a Midnight Deadline for Resetting Ivanti GatewaysFootball Australia data breach: Personal details of fans and players allegedly leaked IG NewsFormer CIA Engineer Sentenced to 40 Years for Leaking Classified DocumentsGrasping the estimated cost of cybercrime: how recovery can cost US$5 millionGroton schools’ internet outage from ‘cyber-attack’ under investigationGrupo hacker explora dispositivos USB e plataformas legítimasHackers deploy login credentials they stole at Okta to hack Cloudflare – updateHackers tentam invadir datacenter da Cloudflare em São PauloHewlett Packard Data Breach: IntelBroker Alleges Sale of Sensitive InformationHow Does Cybersecurity Services Prevent Businesses From Cyber Attacks?How to Protect Your Webmail Account From Cyberthreats and PhishingIndian Bank Data Breach Sparks Concern: Database Allegedly on SaleINTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPsInterpol operation Synergia takes down 1,300 servers used for cybercrimeIt’s a wrap: EU states finally find compromise on AI Act Italian Data Protection Authority Alleges Breaches of GDPR by ChatGPT PlatformJohnson Controls says it spent $27 million to remediate September ransomware attackLockBit 3.0 Ransomware Targets Manchester Fertility ClinicLockBit group targets Chicago hospital, demands $900,000 as ransomLockBit Reigns Supreme in Soaring Ransomware LandscapeLurie Children's Hospital took systems offline after cyberattackMalicious logins from suspicious infrastructure fuel identity-based incidentsMassive Trello User Data Leak: Hacker Lists 15 Million Records on a Dark Web Hacking ForumMicrosoft Ditches C# for Rust: M365 Core Gets Safety and Perf BoostsMispadu Stealer’s New Variant Targets Browser Data of Mexican UsersMore Ransomware Victims Are Declining to Pay ExtortionistsMurder suspect freed after cyberattackNavigating the DORA Regulation: What UK Finance Firms Need to KnowNIS2 Directive raises stakes for security leaders'No loss of your banking data' says Shropshire venue as it works to kill spam email invaderOperation Synergia led to the arrest of 31 individualsOxford Academy refers itself to Information Commissioner's Office (ICO) over data breach"Poderia ser pior", diz hacker condenado a pagar US$ 14 milhões para a Nintendo pelo resto da vidaPurpleFox malware infected at least 2,000 computers in UkraineRansomware group threatens to leak sensitive data from Virginia IT services firm with U.S. military contractsRomance Scam Victims Surge in 2023Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay AttacksSaiba quanto o Judiciário gaúcho já gastou para prevenir ataques hackersSecurity Leaders, C-Suite Unite to Tackle CyberthreatsSurvey Surfaces Raft of Cloud Security Challenges Tax return scammers flood Google with fake ads Teen Chatting App Wizz Removed from Apple and Google Stores for Sextortion ConcernsTelefónica Breached Again: Hackers Claim to Sell Unauthorized AccessThe CSO guide to top security conferencesUnderstanding the Connection Between IoT Vulnerabilities and Home Network IntrusionsWas BrightStar Care attacked by two different groups — or was there only one breach?Why you should always change your logins after a data breach01/023.5M exposed in COVID-19 e-passport leak71% of businesses haven’t incorporated AI into physical securityAll federal civilian agencies ordered to disconnect at-risk Ivanti products by FridayAnonymous Sudan Claims DDOS Attacks on UAE’s Flydubai AirlineAustralian IT Pros Need to Prepare for AI Regulation for the First Time With EU AI Act Imminent Change Your Password Day: Five Reasons to (Finally) Do ItCISA orders federal agencies to disconnect Ivanti VPN appliances by SaturdayCISA Warns of Active Exploitation of Critical Flaws in Apple iOS and macOSCivil society in Jordan under assault by NSO’s Pegasus spywareCustom rules in security tools can be a game changer for vulnerability detectionCVEMap: Open-source tool to query, browse and search CVEsCyber attack forces New Jersey's Freehold Township School District to shut schoolsCybersecurity M&A Roundup: HPE Agrees $14bn Acquisition, Deals Announced by SonicWall and SentinelOneDigital watermarking and the future of online trustExposed Docker APIs Under Attack in 'Commando Cat' Cryptojacking CampaignFBI disrupts Chinese botnet used for targeting US critical infrastructure Federal contractor suffers data breachFritzFrog botnet exploits Log4Shell, PwnKit vulnerabilitiesFritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your NetworkFulton County government systems paralyzed by cyberattackGitHub Vulnerability: Key Rotation Amid High-Severity ThreatGoogle’s Bazel Exposed to Command Injection ThreatGoogle shares fix for Pixel phones hit by bad system updateHack à Orange Espanha inunda a dark web de credenciaisHeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto MiningHow FBI deleted China malware from US routersIn 2023, Cybercriminals Were Still Using Social Engineering to Steal Your Credentials Inca sofre ataque hacker e paralisa atendimentos de radioterapiaIndia-linked hackers target Pakistan with spyware in new campaignInternational fintech firm exposes data of over 300K traders in cybersecurity breachInterpol arrests more than 30 cybercriminals in global ‘Synergia’ operationInterpol-Led Initiative Targets 1300 Suspicious IPsIs Your Remote Workforce Truly Safe? Three Reasons Zero-Trust is the Answer Ivanti Releases Zero-Day Patches and Reveals Two New BugsMedical device maker Exactech breachedMultiple malware used in attacks exploiting Ivanti VPN flawsNew Windows Event Log zero-day flaw gets unofficial patchesPayment fraud is hitting organizations harder than ever beforePolice seized 50,000 Bitcoin from operator of the now-defunct piracy site movie2kProtect AI adds LLM support with open source acquisitionPump-and-Dump Schemes Make Crypto Fraudsters $240mPurpleFox malware infected thousands of systems in UkraineRipple Co-Founder’s Personal XRP Wallet Breached in $112 Million HackRussian spies impersonating Western researchers in ongoing hacking campaignTeen arrest sheds light on US swatting epidemicTelegram is a Wide-Open Marketplace for Phishing Tools The American View: The Art of Deliberate Miscommunication: Decoding Office PoliticsThreat actor used Vimeo, Ars Technica to serve second-stage malwareTimex Group says cyber attack compromised the data of over 3,000 current and former employeesTop cybersecurity product news of the weekUber fined $11M for violating privacy of EU driversUnpacking the challenges of AI cybersecurityUS Agencies Failure to Oversee Ransomware Protections Threaten White House GoalsU.S. Feds Shut Down China-Linked "KV-Botnet" Targeting SOHO Routers US security agencies terminate China-backed hacking attemptUS Thwarts Volt Typhoon Cyber Espionage Campaign Through Router DisruptionZero trust implementation: Plan, then execute, one step at a timeWarning: New Malware Emerges in Attacks Exploiting Ivanti VPN VulnerabilitiesWhy the Right Metrics Matter When it Comes to Vulnerability ManagementWomen in Security nominations close in one month31/0123andMe data breach targeted Jews A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logsAI And 5G are Defining a New Era of Cybersecurity: The Industry Must Collectively Adapt Alert: Ivanti Discloses 2 New Zero-Day Flaws, One Under Active ExploitationAnnual recovery costs from cybercrime soar up to $5 million for businessesBankers Life and Casualty Company Files Notice of Data Breach Impacting ThousandsBucks 911 Communications Center Back Online After OutageBucks County's 911 dispatch system up and running after 9-day outage from cyber attackCanada’s foreign affairs department hit by data breach Canada’s foreign affairs department investigates data breachCanadian government probes cyberattack and data breach at Global Affairs DepartmentCentennial Bank Files Notice of Data Breach with Texas Attorney GeneralCISA: Vendors must secure SOHO routers against Volt Typhoon attacksCISA warns of patched iPhone kernel bug now exploited in attacksCitibank Sued For Failing to Protect Fraud VictimsCity Cyber Taskforce Launches to Secure Corporate Finance Confronting the SaaS Data Protection and Security CrisisCrime bosses behind Myanmar cyber ‘fraud dens’ handed over to Chinese governmentCritical Flaws Found in GNU C Library, Major Linux Distros at RiskCyberArk releases online ransomware decryptorCybercriminals replace familiar tactics to exfiltrate sensitive dataData Breach Response: What Are The Needed Steps To Be Taken By Businesses?Database management enters a new era of complexityDecember cyberattack on Chicago community hospital claimed by LockBit gangDelinea report highlights switch in ransomware techniques Delinea research reveals that ransomware is back on the rise as cybercriminals’ motivation shifts to data exfiltration Des Moines Orthopedic Surgeons (DMOS) warns of data breach, expert says “it’s everything you’d want as a thief”Does CVSS 4.0 solve the exploitability problem?Dogecoin Community Tracks Down Hacker As MyDogeWallet Is Compromised AgainDrop in Ransomware Payments Suggest Futility in Paying AttackersEU Launches First Cybersecurity Certification for Digital Products Europcar denies data breach of 50 million users, says data is fakeEuropcar dismisses data leak claims as AI fakeExploit released for Android local elevation flaw impacting 7 OEMsFBI disrupts Chinese botnet by wiping malware from infected routersFootball Australia leak exposes players’ detailsFree ransomware recovery tool White Phoenix now has a web versionGlobal Affairs Canada Investigating Cyberattack and Data BreachHackers Exploit Trusted Platform Redirect Flaws For Phishing AttacksHackers Exploiting Ivanti VPN Flaws to Deploy KrustyLoader MalwareHackers Hijacking MS-SQL Servers to Install Mimic Ransomware Hackers obtain confidential information on Romanian officials after cyber attack at Parliament How ransomware has changed and the groups to watch out for in 2024How to make developers accept DevSecOpsIndian Telecom Users' Data on Sale on Dark Web: CloudSEK ReportItalian Businesses Hit by Weaponized USBs Spreading Cryptojacking MalwareIvanti VPN Flaws Exploited to Spread KrustyLoader MalwareIvanti warns of new Connect Secure zero-day exploited in attacksJohnson Controls Lost $27M and Corporate Data in September Ransomware AttackJohnson Controls says ransomware attack cost $27 million, data stolenKent councils say cyber incident disrupted public services and online operationsLafayette Life Announces Third-Party Data Breach at First Financial Security, Inc. Compromised Customer InfoLeading Mobile Banking App Hit by IntelBroker Hackers, Sensitive Data Up for SaleLoanPro Confirms December 2023 Data Breach Affecting an Unknown Number of ConsumersMalaysian Telecom Provider, Aminia Hit by Pro-Israeli Cyberattack, Website InaccessibleMercedes source code exposed via GitHub token leakMicrosoft Teams became a phishing highway for DarkGate malware“More Groups, More Problems”: Searchlight Cyber Report Reveals Ransomware Groups to Watch in 2024Most UK firms pay ransomware demands, despite ‘do not pay’ policiesNearly 4-year-old Cisco vuln linked to recent Akira ransomware attacksNew Glibc Flaw Grants Attackers Root Access on Major Linux DistrosNoName Cyberattack Strikes Prominent Organizations in NetherlandsPawn Storm’s Stealthy Net-NTLMv2 Assault RevealedPhishing campaign spreads malware via Microsoft TeamsPlanet Home Lending Discloses Ransomware AttackProactive cybersecurity: A strategic approach to cost efficiency and crisis managementRansomware Attacks Are So Severe, Some Security Pros Are Being HospitalizedRansomware payment rates drop to new low – only 29% of victims are forking over cashR00TK1T Breaches Backend Systems Of Local Comms And Network Solutions Provider Aminia [UPDATE]RunC Flaws Enable Container Escapes, Granting Attackers Host AccessSchneider Electric Energy Giant Confirms Cactus Ransomware AttackSchneider Electric's Sustainability Division hit by ransomware attack and data breachSecuring Your SaaS Landscape: Closer Look at Disaster Recovery, Posture ManagementSecurity leaders share thoughts on Schneider Electric ransomware attackSysdig Report Exposes 91% Failure in Runtime ScansTelegram Is a 'Scammer's Paradise' Thanks to Cheap Phishing ToolsTelegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and MalwareThe SEC Won't Let CISOs Be: Understanding New SaaS Cybersecurity RulesTietoevry advances restoration after ransomwareTop 10 Tips to Prevent Ransomware: Safeguarding Your Digital FortressUkraine boasts of cyber attack on Russian Defense Ministry US brokerage giant Keenan & Associates says August cyber attack impacted over 1.5m peopleU.S. Officials Detained a 19-year-old SIM-Swap HackerUS Sanctions Egyptian IT Experts Aiding ISIS in CybersecurityUS Senators Propose Cybersecurity Agriculture BillU.S. Treasury Imposes Sanctions on Alleged ISIS Cybersecurity ExpertsValheim Discord servers locked after hacker releases virusVisa sued over ‘Vanilla’ gift card draining scam30/011.5 Million Affected by Data Breach at Insurance Broker Keenan & Associates3 Best Practices to Improve Threat Hunting 3 security gadgets I never leave home without 71% of Ransomware Attack Victims Refuse to Pay the RansomA mishandled GitHub token exposed Mercedes-Benz source codeAfter Cyber Attack, Freehold Twp. Schools Returning To NormalAkira claims major ransomware attack on British cosmetics retailer LushAlpha Ransomware Group Launches Data Leak Site on the Dark WebALPHV/BlackCat Hackers Claim Attack on Technica, Documents at Risk of ExposureApós ataque hacker no Inca, pacientes sofrem para marcar consulta: 'não tem plano B'Apparel Giant VF Corporation’s Ransomware Attack Leaked PII of over 35 Million CustomersAssessing and quantifying AI risk: A challenge for enterprisesAtaque hacker bilionário à exchange Bitfinex vai virar filme da AmazonAtaque hacker prejudica atendimento no Instituto Nacional de CâncerAussie fintech start-up Cape denies hacker’s data breach claimBalancing AI benefits with security and privacy risks in healthcareBarnsley Council at ‘high risk’ of cyber attackBrazilian Feds Dismantle Grandoreiro Banking Trojan, Arresting Top OperativesBeware of Phobos Ransomware Delivered via Office DocumentBreach of watchmaker Timex exposes thousandsCactus ransomware gang claims the Schneider Electric hackChina-Linked Hackers Target Myanmar's Top Ministries with Backdoor BlitzCitibank sued over failure to defend customers against hacks, fraudClay County continuing to alert residents to October 2023 data breachCyber Events the Top Risk for Organizations in 2024Cybersecurity Survey: What Keeps Brits Awake at Night?Data Highlights Substantial Decrease in Ransom Payments, with Only 29% Complying in Q4 2023Data leak at fintech giant reveals staff calling clients ‘idiots’Data of 750 Million Indian Mobile Subscribers Sold on Hacker ForumsDelinea Research Reveals that Ransomware is Back on the Rise as Cybercriminals' Motivation Shifts to Data Exfiltration Email Authentication Protocols: Preventing Phishing and Spoofing AttacksEnergy giant Schneider Electric hit by huge ransomware attackExcessive Expansion Vulnerabilities Leave Jenkins Servers Open to AttacksFaction: Open-source pentesting report generation and collaboration frameworkFBI: Scammers Are Sending Couriers to Collect Cash From VictimsFBI warns of scammers sending live couriers to collect moneyFulton County computer systems still down after cyber attackGlobal Ransomware Attacks Reach Record High for 2023, According to Corvus Insurance Q4 Ransomware ReportGreat security or great UX? Both, pleaseHacker group R00TK1T claims its first victim in MalaysiaHackers invadem o sistema do Instituto Nacional de CâncerHampered cyber attack councils in Kent report ‘data breach’How SMBs can lower their risk of cyberattacks and data breachesHow to Bridge the Cyber Talent GapHow to manage Fedora's firewall without using the command line Hundreds of network operators’ credentials found circulating in Dark WebHyperFund founder faces charges in $1.7 billion crypto schemeImproving cybersecurity culture: A priority in the year of the CISOIndian telecom regulator orders security audit amid alleged data breach of 750 million subscribersInstituto Nacional do Câncer sofre ataque hacker e suspende serviços de radioterapiaInstituto Nacional do Câncer sofre invasão hacker e impacta no funcionamento dos serviçosInsurance Broker Keenan Says 1.5 Million Affected by Data Breach Italian Data Protection Watchdog Accuses OpenAI's ChatGPT of Privacy ViolationsJuniper Networks Releases Urgent Junos OS Updates for High-Severity FlawsKeenan & Associates alerts 1.5 million customers of data breachKeenan & Associates Data Breach Affects More Than 1.5 Million IndividualsLoanDepot class action alleges company failed to prevent massive data breachMalaysian telco provider has data breach – againMedusa ransomware group claims cyber attack on Kansas City transportation agency, demands $2m in ransomMicrosoft Teams exposed a gateway to deliver DarkGate malwareMicrosoft Teams phishing pushes DarkGate malware via group chatsNew ZLoader Malware Variant Surfaces with 64-bit Windows CompatibilityOrange España Breach: Dark Web Flooded With Operator CredentialsPF cumpre mandado em Goiás em operação que mira hackers; roubos chegaram a 3,6 milhões de eurosPF: hackers brasileiros criam vírus para roubar 3,6 milhões de eurosPolice disrupt Grandoreiro banking malware operation, make arrestsQ4 Ransomware Report: 2023 ends as a record-breaking yearRansomware Incidents Hit Record High, But Law Enforcement Takedowns Slow GrowthRansomware on the rise with mid-size companies a prime targetRansomware recap 2023 highlights cybersecurity crisisResearch shows cybercriminals’ motivation shifts to data exfiltrationRussian APT28 phishing Ukraine's military to steal login infoRust Payloads Exploiting Ivanti Zero-Days Linked to Sophisticated Sliver ToolkitSalesforce-based phishing attacks surge 109% since the start of 2024Salud Total cyber attack: EPS confirms impact on servicesSchneider Electric Confirms Data Accessed in Ransomware AttackSchneider Electric hit by Cactus Ransomware cyber attackSelf-managed GitLab installations should be patched again (CVE-2024-0402)Sistema do Instituto Nacional do Câncer sofre invasão hackerSlowMist reports 80% of X comments related to phishing software Smart Vendor Security Is Key To Avoiding A Data Breach In 2024Stablecoin sofre hack, perde milhões e cai abaixo de US$ 1Tapping into the Potential of Generative AI in CybersecurityTentativa de ataque hacker impede recarga de cartões Fácil e de Estudante na Grande GoiâniaThe Ransomware Threat in 2024 is Growing: ReportThere was a 39% surge in data exfiltration cyberattacks in 2023Top Security Posture Vulnerabilities RevealedToronto Public Library website partially restored but personal accounts still downUK House of Lords Calls For Legislation on Facial Recognition TechUnlocking sustainable security practices with secure coding educationURGENT: Upgrade GitLab - Critical Workspace Creation Flaw Allows File OverwriteU.S. Disabled 'Pervasive' Chinese Hacking Network Targeting Presidential Election, Military Infrastructure, Taiwan ResponseUS disables hacking network targeting critical infrastructureU.S. Postal Service phishing scams rising after post-holiday lullWhy you need to think before you scan that QR codeWindsor Hospital’s Journey to Cyberattack Rehabilitation: New Recovery Phase Announced29/011.5M affected in insurance broker breach10 penetration testing tools the pros use23andMe says hackers accessed raw genotypes and family tree information of users45k Jenkins servers exposed to RCE attacks using public exploits493 Companies Share Their SaaS Security Battles – Get Insights in this WebinarAI will increase global ransomware threat, UK cyber security chiefs warnAlbabat, Kasseika, Kuiper: New Ransomware Gangs Rise with Rust and GolangAlleged NoName Ransomware Attack Targets Multiple Organizations in a Single DayAnnual cost of recovering from cybercrime can be as much as US$5 MillionAnthropic confirms data leak amid FTC probeApple's new Stolen Device Protection has a big vulnerability. Here's how to fix it BianLian Ransomware Group Strikes Again, Targeting Two US-Based CompaniesBinance issues warning amidst surge in WhatsApp phishing scamsCanada wakes up to China, Russia, Iran threat to intellectual propertyCaravan and Motorhome Club responding to a major systems outage following a LockBit ransomware attackCI/CD at Risk as Exploits Released For Critical Jenkins BugCritical Jenkins RCE flaw exploited in the wild. Patch now! (CVE-2024-23897)Crypto Users Alarmed by Phishing Emails Impersonating PatreonCybercriminals embrace smarter strategies, less effortDark Web Drugs Vendor Forfeits $150m After Guilty Plea‘Delete Immediately’: Trezor Warns Users of Elaborate Phishing Emails and Large Scale AttackDHS employees jailed for stealing data of 200K U.S. govt workersEnergy giant Schneider Electric hit by Cactus ransomware attackExploring the intersection of network security and modern technologiesFBI: Tech support scams now use couriers to collect victims' moneyFinland Follows the Money: Tracing Monero to Catch HackerFTC and DOJ tell firms: find ways not to delete internal chatsGlobal critical infrastructure faces relentless cyber activityGoGet takes action against phishing scam: Multiple fraudulent websites discovered Hacker group R00TK1T threatens to attack Malaysia’s digital infrastructureHigher cyber defenses lead to higher ransoms, study findsHow to Change Mac Permissions via the Mac Terminal Impersonating authorities accounts for 9% of all phishing attacks in VNInformation Commissioner's Office (ICO) confirms data breach reports from Kent councilsItaly watchdog says OpenAI's ChatGPT breaches privacy rulesKeenan warns 1.5 million people of data breach after summer cyberattackKillnet 2.0 Emerges as a Dark Web Force; New Features and Capabilities DiscussedLush cyber attack claimed by Akira ransomware gangMalicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows MachinesMercedes-Benz accidentally exposed sensitive data, including source codeMicrosoft Provides Defense Guidance After Nation-State CompromiseMicrosoft says Outlook apps can’t connect to Outlook.comMicrosoft Teams hit by second outage in three daysMicrosoft Teams returns to normalcy after outageNational Security Agency buys web browsing data without warrant, letter showsNigeria Data Protection Commission (NDPC) investigating 17 major cases of data breach in Nigeria, earns N400 millionNigerian 'Yahoo Boys' Behind Social Media Sextortion Surge in the USNSA Admits Secretly Buying Your Internet Browsing Data without WarrantsNSA buys internet browsing records from data brokers without a warrantNSA found illegally buying private data of AmericansPhishing Emails Pose as Patreon, Promoting Fake Crypto ProjectsPhobos Ransomware Family Expands With New FAUST VariantPlataforma de karaokê baseada em blockchain sofre hack de R$ 58 milhõesPolícia da Finlândia rastreia transações de Monero para prender hacker que extorquia vítimasPrioritizing cybercrime intelligence for effective decision-making in cybersecurityRansomware payments drop to record low as victims refuse to payRansomware remains the most pressing security issue worldwide — but even schools are being targeted nowReport: election wave will bring tsunami of internet shutdownsResearchers simulate AI-assisted biological attack, uncover new risksResearchers Uncover How Outlook Vulnerability Could Leak Your NTLM PasswordsRiding the AI Waves: The Rise of Artificial Intelligence to Combat Cyber ThreatsTexas therapy provider Concentra Health notifies 4 million patients of data theft incidentThird-party risk management best practices and why they matterUkraine’s SBU arrested a member of Pro-Russia hackers group ‘Cyber Army of Russia’Unwanted emails from Patreon? Crypto users say it might be a phishing scam US Senator Exposes NSA Purchase of Americans’ Internet RecordsWhat to do when deep fakes break our trustYou've been hit by a data breach in NY. What should you do next? Here are first steps28/01Airbus in talks to acquire big data and cybersecurity branch of Atos‘Akira' ransomware behind Bucks Co. emergency dispatch system cyberattack Armis on verge of acquiring cyber startup Silk Security for tens of millions of dollarsAutoridades finlandesas rastrearam transações de Monero ligadas ao hack da Vastaamo Crypto Stealing PyPI Malware Hits Both Windows and Linux UsersCyber Security vs. Data Science: Which Career is Best in 2024Data Privacy Day: Data Privacy Enforcement Changes Impacting Businesses in 2024Don’t let QR codes scam you: After phishing, quishing attacks on the riseExploits released for critical Jenkins RCE flaw, patch nowMassive Data Breach: Personal Information of 750 Million Users, Including Indians, Exposed on the Dark WebMedusa ransomware attack hit Kansas City Area Transportation AuthorityMultiple PoC exploits released for Jenkins flaw CVE-2024-23897The Prime Minister in Washington to discuss energy, cyber security, commerceTrello data breach exposes 15 million users' details on Dark Web Why Cyber Resilience Matters More Than CybersecurityDAILY NEWS: Janeiro (21/01/2024 - 27/01/2024) - 04 Semana de 2024
Comments