View as Webpage

Cyber Security Review Newsletter

21 July 2023 | Issue 199

TOP NEWS

Google says Apple employee found a zero-day but did not report it

 

KillNet Showcases New Capabilities While Repeating Older Tactics

 

A nasty Google Cloud bug could let hackers use it to launch attacks

 

CISA Releases Cybersecurity Advisory on Threat Actors Exploiting Citrix CVE-2023-3519

 

North Korea-backed hackers breached JumpCloud to target cryptocurrency clients

 

Comprehensive analysis of initial attack samples exploiting CVE-2023-23397 vulnerability

 

DDoS Botnets Target Zyxel Vulnerability CVE-2023-28771

 

FakeSG enters the ‘FakeUpdates’ arena to deliver NetSupport RAT

 

Victims of Cyberattack on File-Transfer Tool Pile Up

 

Intellexa and Cytrox are latest spyware firms to face U.S. wrath

 

North Carolina: Kannapolis didn’t alert public when cyberattack knocked out police dispatch

 

Escalating Privileges via Third-Party Windows Installers

 

Estee Lauder says hacker obtained some data from its systems

 

FIN8 Uses Revamped Sardonic Backdoor to Deliver Noberus Ransomware

 

How Hackers Could Attack Electric Vehicle Chargers

 

CISA Releases Seven Industrial Control Systems Advisories

 

Fortescue Hit by Cyber Attack That Saw Network Data Disclosed

NSA, CISA Release Guidance on Security Considerations for 5G Network Slicing 

 

Common typo causes millions of emails intended for members of the US military to be sent to accounts in Mali

 

US energy department, other agencies hit in global hacking spree

 

Cyber attack hits South Korean government institution, $135,000 lost

 

WormGPT, PoisonGPT: How generative AI can become a tool for criminals

 

Analysis of Storm-0558 techniques for unauthorized email access

 

Detecting BPFDoor Backdoor Variants Abusing BPF Filters

 

Cyber attack targets Libyan internet provider LTT

 

FortiGuard Labs Discovers Multiple Vulnerabilities in Adobe InDesign

 

Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation



CISA Releases Nine Industrial Control Systems Advisories

 

Malicious campaigns target government, military and civilian entities in Ukraine, Poland

 

Commerce Secretary Gina Raimondo’s emails hacked in Microsoft cyber breach

 

Enhanced Monitoring to Detect APT Activity Targeting Outlook Online

 

Utility cyber threats on the rise, but experts say don’t forget basics

 

Major security flaws in popular Quickblox chat and video framework expose sensitive data of millions

 

Hunting for A New Stealthy Universal Rootkit Loader

Privacy activists slam EU-US pact on data sharing

 

Undocumented driver-based browser hijacker RedDriver targets Chinese speakers and internet cafes

 

FortiOS/FortiProxy – Proxy mode with deep inspection – Stack-based buffer overflow

 

Microsoft discloses more than 130 vulnerabilities as part of July’s Patch Tuesday, four exploited in the wild

 

12,000 State Bank of India employees’ sensitive data leaked on Telegram channels

 

Storm-0978 attacks reveal financial and espionage motives

 

Attackers Exploit Unpatched Windows Zero-Day Vulnerability

 

Florida patients among 11 million affected by HCA Healthcare data breach

 

Ventia takes systems offline to contain cyber attack

 

The TOITOIN Trojan: Analyzing a New Multi-Stage Attack Targeting LATAM Region

 

Major cyber attack at Scottish university as police and government called in

 

The five-day job: A BlackByte ransomware intrusion case study

 

Charges filed in cyber attack on East Bay water treatment plant

 

France set to allow police to spy on suspects through remote phone access

 

The growth of commercial spyware based intelligence providers without legal or ethical supervision

 

CISA and Partners Release Joint Cybersecurity Advisory on Newly Identified Truebot Malware Variants

 

Japan’s biggest port hit by suspected cyberattack, operations halted

 

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand

MAIN TOPICS

LATEST ARTICLES

NEW: A BRIEF HISTORY OF DATA LOSS PREVENTION

Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.


NEW: THE 5 ESSENTIAL CYBERSECURITY AWARENESS TRAINING TIPS FOR A MORE SECURE ENVIRONMENT

This article will explain cybersecurity awareness and dive deeper into the five essential tips to include in your security awareness training program to make your digital environments more secure.


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023

This article discusses crucial security measures to keep your apps safe in 2023.


WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK

What can you do if you’ve identified an employee as a cyber security risk?

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted by email to: [email protected]

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.

ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please call +44 207 193 2303 or email us.



*Special rates are available for start-ups and micro businesses.

MEDIA PARTNERS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

Email:  [email protected]

 Request Media Kit 
Subscribe
Twitter
www.cybersecurity-review.com

© 2014-2023 Cyber Security Review. Published by Delta Business Media. All Rights Reserved.