View as Webpage

Cyber Security Review Newsletter

19 January 2024 | Issue 210

TOP NEWS

Update Chrome – Google patches actively exploited zero-day vulnerability

 

Water and Wastewater Sector – Incident Response Guide

 

TA866 returns with a large Email campaign

 

Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware

 

Thousands of Android TV boxes hit by dangerous new malware-dropping botnet

 

7777-Botnet Infection Vectors

 

The dangers of quadruple blow ransomware attacks

 

New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs

 

Ivanti vulnerabilities now actively exploited in massive numbers

 

PSA: Anyone can tell if you are using WhatsApp on your computer

 

Binge & Dan Murphys Among Major Brands Hit By Cyber Attack

 

Alleged FruitFly malware creator ruled incompetent to stand trial

 

Known Indicators of Compromise Associated with Androxgh0st Malware

 

Latest Cyber-Attacks in Serbia Raise Fresh Questions about Defence

 

Data breach hits Navy contractor Fincantieri Marine Group

 

Medical data breach could impact thousands from New Hampshire

Joomla! vulnerability is being actively exploited

 

Hyundai Motor India fixes bug that exposed customers’ personal data

 

Financial Fraud APK Campaign

 

Dallas says cyberattack targeted more people than previously disclosed

 

Medusa Ransomware Turning Your Files into Stone

 

Weaponizing Apache OFBiz CVE-2023-51467

 

Distributed Energy Generation Gateway (In)Security

 

Actively exploited 0-days in Ivanti VPN are letting hackers backdoor networks

 

Atomic Stealer rings in the new year with updated version

 

Texas-based care provider HMG Healthcare says hackers stole unencrypted patient data

 

Thailand: Elderly to get anti-scam education as cybercrime explodes

 

Australia: The Iconic denies responsibility for data breach

 

SEC says ‘compromised’ account to blame for tweet approving Bitcoin ETF

 

Linux devices are under attack by a never-before-seen worm

 

AI aids nation-state hackers but also helps US spies to find them, says NSA cyber director

 

Fidelity National Financial says hackers stole data on 1.3 million customers

Dutch national sabotaged nuclear facility in Iran: Report

 

Kenya Airways suffers passenger data breach in cyber attack

 

.NET Hooking – Harmonizing Managed Territory

 

New York: Refuah Health to spend over $1M on cyber security following ransomware attack

 

Deceptive Cracked Software Spreads Lumma Variant on YouTube

 

Hundreds of museums hit by cyber attack

 

Lebanon: Beirut airport screens come under cyberattack

 

Explained: SMTP smuggling

 

Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer

 

23andMe blames “negligent” breach victims, says it’s their own fault

 

Three New Malicious PyPI Packages Deploy CoinMiner on Linux Devices

 

ECB to conduct mock cyber attacks at 109 banks

 

Orange suffers cyber attack affecting clients’ internet access in Spain

 

US insurance giant First American confirms it was hit by a ransomware attack

 

Oops! Black Basta ransomware flubs encryption

MAIN TOPICS

ARTICLES

WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP

By Miguel Clarke, GRC and Cyber Security lead for Armor Defense


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?

By Ross Moore, Cyber Security Support Analyst with Passageways


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.


A BRIEF HISTORY OF DATA LOSS PREVENTION

Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023

This article discusses crucial security measures to keep your apps safe in 2023.


WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK

What can you do if you’ve identified an employee as a cyber security risk?

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted by email to: [email protected]

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.


ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

Email:  [email protected]

 Request Media Kit 
Subscribe
Twitter

www.cybersecurity-review.com

© 2014-2024 Cyber Security Review. Published by Delta Business Media. All Rights Reserved.