View as Webpage

Cyber Security Review Newsletter

21 March 2024 | Issue 214

TOP NEWS

Ring doorbell owners warned of bank raiding attack as thieves target Brits

 

China’s MSS publicizes typical case to remind public of overseas cyber ransom attacks

 

The Updated APT Playbook: Tales from the Kimsuky threat actor group

 

Android malware, Android malware and more Android malware

 

Microsoft Threat Intelligence unveils targets and innovative tactics amidst tax season

 

The ‘AT&T breach’ – what you need to know

 

UK: Criminal investigation into council cyber attack

 

A new data wiper is targeting Linux x86 network devices

 

British authorities investigating the Princess of Wales medical records breach

 

From Ransomware to Pig Butchering, Visa Report Shows Top Scams Impacting Consumers and Businesses Globally

 

Threat landscape for industrial automation systems. H2 2023

 

New Zealand: Hackers email Mediaworks data breach victims demanding NZ$820

 

Ethereum’s Create2: A Double-Edged Sword In Blockchain Security

 

Tech giant Fujitsu says it was hacked, warns of data breach

 

Mandatory cyber requirements after Change Healthcare attack opposed by health sector

 

Southeast Asia’s three-nation partnership to fight cyber threats

Russia foiled 280,000 DDoS cyberattacks against remote electronic voting system

 

UK: NHS Dumfries and Galloway hit by cyber attack with ‘significant quantity’ of data at risk

 

Vietnam: Over 1,800 cyber attacks detected in Q1

 

Ransomware’s appetite for US healthcare sees known attacks double in a year

 

A patched Windows attack surface is still exploitable

 

A bug in an Irish government website exposed COVID-19 vaccination records

 

Businesses leaving their Kubernetes containers exposed to ransomware


CIA allegedly made fake social media accounts to troll the Chinese government

 

What’s in your notepad? Infected text editors target Chinese users

 

CVE-2024-21412: DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign

 

EU passes landmark AI act, paving the way for greater AI regulation

 

Chinese international purchasing agency for military equipment has agency qualification revoked for serious risk of information leakage

 

US health department opens probe into UnitedHealth hack

 

Roku Discloses Data Breach, 15,000 Accounts Compromised

 

New Multi-Stage StopCrypt Ransomware

 

Is Cybersecurity The Achilles’ Heel Of The Electric Vehicle Revolution?

Acer Philippines reports data breach in third-party vendor system

 

Ransomware: Attacks Continue to Rise as Operators Adapt to Disruption

 

VCURMS: A Simple and Functional Weapon

 

How AI Is Transforming Audit, Risk, and Compliance

 

French state services hit by cyberattacks of ‘unprecedented intensity’

 

EU’s use of Microsoft 365 found to breach data protection rules

 

Third-Party Breach and Missing MFA Contributed to British Library Cyber-Attack

 

Microsoft admits Russian state hack still not contained

 

Duvel forced to shut breweries after cyber attack

 

FBI Report Reveals Americans Lost Staggering $3.94 Billion to Crypto Investment Scams in 2023

 

Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities

 

Update now! JetBrains TeamCity vulnerability abused at scale

 

Patch now! VMWare escape flaws are so serious even end-of-life software gets a fix

 

PetSmart warns customers of credential stuffing attack

  

Jersey data breach leaks personal information

 

Italy privacy watchdog fines Unicredit $3.1 million for data breach

 

Insurance giant Fidelity hit by data breach

 

Wyze reports a new data breach

 

Capita shares sink as outsourcing giant swings to £107m loss, takes £25m hit from cyber attack

MAIN TOPICS

ARTICLES

WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP

By Miguel Clarke, GRC and Cyber Security lead for Armor Defense


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?

By Ross Moore, Cyber Security Support Analyst with Passageways


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.


A BRIEF HISTORY OF DATA LOSS PREVENTION

Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023

This article discusses crucial security measures to keep your apps safe in 2023.


WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK

What can you do if you’ve identified an employee as a cyber security risk?

ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted by email to: [email protected]

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.


EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

[email protected]

 Request Media Kit 
Subscribe
X

www.cybersecurity-review.com

© 2014-2024 Cyber Security Review. Powered by Delta Business Media. All Rights Reserved.