View as Webpage

Cyber Security Review Newsletter

5 December 2023 | Issue 208

TOP NEWS

Roblox and Twitch provider Tipalti breached by ransomware

 

The Obvious, The Normal, And The Advanced: A Comprehensive Analysis Of Outlook Attack Vectors

 

UK: Sellafield nuclear site hacked by groups linked to Russia and China

 

New Relic’s cyber-something revealed as attack on staging systems, some users

 

New Tool Set Found Used Against Organizations in the Middle East, Africa and the US

 

FBI: IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities

 

New iOS and iPad zero-day vulnerabilities spur yet another update

 

Booking.com hackers increase attacks on customers

 

France bans ministers from WhatsApp, Signal; demands French alternatives

 

Egypt Hosts The 3rd Edition of Defence Exhibition to Showcase the Latest Global Military Advancements

 

Japan space agency server likely hit by unauthorized access attack

 

Medical test company’s ‘serious and systemic failures’ led to cyber-attack, watchdog says

 

Spyware Employs Various Obfuscation Techniques to Bypass Static Analysis

 

ownCloud vulnerability can be used to extract admin passwords

 

GoTitan Botnet – Ongoing Exploitation on Apache ActiveMQ

 

Guidelines for secure AI system development

Hacker claims to have hit General Electric and stolen company data

 

The Unseen Layers: Exploring The Tactics Of Multistage .NET Malware Packers

 

Ransomware ‘catastrophe’ at Fidelity National Financial causes panic with homeowners and buyers

 

Gulf Air hit with data breach, customer data possibly affected

 

New Jersey: Montclair, Westwood Hospitals Divert Ambulances After Cyber Attack

 

The Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI

 

Thousands of house purchases frozen by cyber attack

 

Singapore cyber defenders fend off simulated attacks against cellular, gas and airport systems

 

New ransomware-as-a-service caters to cybercriminals with commercial expansion

 

Q3 2023 in Review: DDoS Attacks Report by StormWall

 

Israel-Hamas war spotlight: Shaking the rust off SysJoker

 

Cisco aids Ukraine in cyber defense with modified switches to counter Russian attacks

 

Updates to U.S. State Data Privacy Laws: What You Need to Know

 

HrServ – Previously unknown web shell used in APT attack

 

Diamond Sleet supply chain compromise distributes a modified CyberLink installer

 

Türkiye’s MIT saves Palestinian Iron Dome hacker from Mossad hit

FCC wants to improve cyber protections for schools, libraries

 

The Rug Pull: A Million-Dollar Scam With A Fake Token Factory

 

How to stop fake System notifications on macOS

 

British Library Employee data leaked in cyber attack

 

Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors

 

U.S. DOD strategy warns emerging tech is ‘at the forefront’ of information threats

 

SysAid path traversal vulnerability

 

#StopRansomware: LockBit 3.0 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability

 

Ukraine sacks ‘corrupt’ cyber defence chiefs

 

A Comparative Study on Linux and Windows Ransomware Attacks

 

When Maximum Effort Doesn’t Equate to Maximum Results

 

Binance CEO pleads guilty to money laundering charges

 

Konni Campaign Distributed Via Malicious Document

 

Social engineering attacks lure Indian users to install Android banking trojans

 

NATO Exercises to Enhance its Cyber Resilience

 

Data stolen in hack of nuclear energy testing facility Idaho National Lab

 

Hackers accessed sensitive health data of Welltok patients

MAIN TOPICS

ARTICLES

WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP

By Miguel Clarke, GRC and Cyber Security lead for Armor Defense


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?

By Ross Moore, Cyber Security Support Analyst with Passageways


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.


A BRIEF HISTORY OF DATA LOSS PREVENTION

Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023

This article discusses crucial security measures to keep your apps safe in 2023.


WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK

What can you do if you’ve identified an employee as a cyber security risk?

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted by email to: editorial@deltabusinessmedia.com

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.


ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

Email:  info@deltabusinessmedia.com

 Request Media Kit 
Subscribe
Twitter

www.cybersecurity-review.com

© 2014-2023 Cyber Security Review. Published by Delta Business Media. All Rights Reserved.