View as Webpage

Cyber Security Review Newsletter

3 November 2023 | Issue 206

TOP NEWS

Tech firms to allow vetting of AI tools


Game-changing technologies meet at SAHA EXPO 2024


WhatsApp spy mod spreads through Telegram, attacks Arabic-speaking users

 

Boeing confirms ‘cyber incident’ after ransomware gang claims data theft

 

New Zealand: Money-motivated cyber attacks outnumber those carried out by nation-states

 

Do government sanctions against ransomware groups work?

 

Investigation of Session Hijacking via Citrix NetScaler ADC and Gateway Vulnerability (CVE-2023-4966)

 

Over the Kazuar’s nest: Cracking down on a freshly hatched backdoor used by Pensive Ursa

 

British Library suffering major technology outage after cyber-attack

 

India: What you need to know about the Apple and Aadhaar attacks

 

From Albania to the Middle East: The Scarred Manticore is listening

 

Canada bans Chinese app WeChat from government devices

 

Step-by-step through the Money Message ransomware

 

CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys

 

TA571 Delivers IcedID Forked Loader

 

ING CISO says data sharing is key to financial cybersecurity

Police Service of Northern Ireland reprimanded over unlawful data sharing

 

Update now! Apple patches a raft of vulnerabilities

 

Casio Data Breach Impacts Customers in 149 Countries

 

Gaza in communications blackout as Israel intensifies siege

 

Police warn Israelis not to answer unknown calls

 

A cascade of compromise: unveiling Lazarus’ new campaign

 

Increasing transparency in AI security

 

‘iLeakage’ Attack Can Force Apple Safari To Reveal Passwords


China crackdown on cyber scams in Southeast Asia nets thousands but leaves networks intact

 

Kansas court system down nearly 2 weeks in `security incident’ that has hallmarks of ransomware

 

FBI: Threats Associated with the Israel-HAMAS Conflict

 

StripedFly: Perennially flying under the radar

 

Responding and Defending Against IdP Vendor Compromise

 

Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction

 

Mystic Stealer Revisited

 

Cyber Security & Cloud Expo Global returns to London – What to expect

2023 Zscaler ThreatLabz Report Indicates 400% Growth in IoT Malware Attacks

 

5 southwestern Ontario hospitals hit by cyberattack, patient appointments to be rescheduled

 

Sheffield Hallam cryptocurrency investigation game wins European Commission Award

 

Stealer for PIX payment system, new Lumar stealer and Rhysida ransomware

 

Okta cybersecurity breach wipes out more than $2 billion in market cap

 

The outstanding stealth of Operation Triangulation

 

From Copacabana to Barcelona: The Cross-Continental Threat of Brazilian Banking Malware

 

Booking.com customers targeted by scam ‘confirmation’ emails

 

Philippines’ cybersecurity failures exposed as hackers leak state secrets, people’s data

 

Phony Corsair LinkedIn Listing Contains DarkGate Malware

 

Irish-linked spyware used in brazen attacks

 

Europol: Ragnar Locker ransomware gang taken down by international police swoop

 

Money-making scripts attack organizations

 

Crambus: New Campaign Targets Middle Eastern Government

 

How BPF-Enabled Malware Works

 

Ransomware actor exploits unsupported ColdFusion servers – but comes away empty-handed

MAIN TOPICS

ARTICLES

WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?

By Ross Moore, Cyber Security Support Analyst with Passageways


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.


A BRIEF HISTORY OF DATA LOSS PREVENTION

Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023

This article discusses crucial security measures to keep your apps safe in 2023.


WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK

What can you do if you’ve identified an employee as a cyber security risk?

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted by email to: editorial@deltabusinessmedia.com

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.


ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please call +44 207 193 2303 or email us.



*Special rates are available for start-ups and micro businesses.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

Email:  info@deltabusinessmedia.com

 Request Media Kit 
Subscribe
Twitter

www.cybersecurity-review.com

© 2014-2023 Cyber Security Review. Published by Delta Business Media. All Rights Reserved.