View as Webpage

Cyber Security Review Newsletter

5 March 2024 | Issue 213

TOP NEWS

Network tunneling with… QEMU?

 

US airman pleads guilty to leaking classified documents

 

Iran foiled nearly 200 cyber-attacks in month to elections

 

Third-party breach leads to American Express customer data compromise

 

New Marsilia Ransomware Downloader Found

 

New Banking Trojan “CHAVECLOAK” Targets Brazil

 

Three underwater data cables providing Internet through Red Sea are cut amid Al Houthi militant attacks

 

FCC and crypto firms are being hit in advanced phishing attacks using fake Okta logins

 

South Africa: CIPC cyber attack leaves millions of entities vulnerable across nation

 

BiBi attacks Israel: Pro-Hamas hackers use new malware to attack Israeli companies

 

North Carolina: Around £2.1 million has been stolen from the housing agency as the US Secret Service is investigating

 

20 million Cutout.Pro AI service users hit by massive data breach

 

LockBit cyberattack: Fulton County refuses to pay ransom as deadline passes

 

US prescription market hamstrung for 9 days (so far) by ransomware attack

The 32nd International Defense Industry Exhibition MSPO will take place from 3 to 6 September 2024 in Kielce, Poland

 

Malicious meeting invite fix targets Mac users

 

Hackers stole ‘sensitive’ data from Taiwan telecom giant

 

Golden Corral Corporation Provides Notice of Data Privacy Event

 

Ireland: Dept of Foreign Affairs investigating potential cybersecurity incident

 

Cyber attack affects numerous services at most Nebraska state hospital

 

A ransomware gang claims to have hacked nearly 200GB of Epic Games internal data

 

Pennsylvania: Welch plant in North East restarts after cyber attack shuts facility down for 3 weeks

 

Pharma giant Cencora hit by major cyberattack

 

Navigating the Cloud: Exploring Lateral Movement Techniques

 

Most data breaches on enterprise attack the supply chain

 

Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts

 

Cyber Security & Cloud Congress North America Unveils Esteemed Speaker Lineup

 

Lockbit cybercrime gang says it is back online following global police bust

Data From Chinese Security Services Company i-Soon Linked to Previous Chinese APT Campaigns

 

Malicious Apple Shortcuts could bypass security features to steal data

 

The Building Resilience to Cognitive Warfare Technical Exchange Meeting

 

Charlotte Cowles’s $50,000 Scam Article, Anyone Can Become a Victim

 

Canada: RCMP confirms ‘alarming’ cyber event targeting its networks

 

China’s top anti-espionage authority warns of secret leaks through smart wearable devices

 

“To live is to fight, to fight is to live! – IBM ODM Remote Code Execution

 

ClamAV’s VirusEvent Command Injection Vulnerability

 

AT&T, T-Mobile and Verizon users hit by massive cellular outage in US

 

Malawi: Cyber-attack hits immigration service

 

FBI issues warning against using Chinese manufactured drones

 

A first analysis of the i-Soon data leak

 

re: Zyxel VPN Series Pre-auth Remote Command Execution

 

Australia: OAIC to investigate legal consultant’s data breach

 

Europol: Tips & advice to prevent ransomware from infecting your electronic devices

MAIN TOPICS

ARTICLES

WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP

By Miguel Clarke, GRC and Cyber Security lead for Armor Defense


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?

By Ross Moore, Cyber Security Support Analyst with Passageways


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.


A BRIEF HISTORY OF DATA LOSS PREVENTION

Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023

This article discusses crucial security measures to keep your apps safe in 2023.


WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK

What can you do if you’ve identified an employee as a cyber security risk?

ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted by email to: [email protected]

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.


EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

[email protected]

 Request Media Kit 
Subscribe
X

www.cybersecurity-review.com

© 2014-2024 Cyber Security Review. Powered by Delta Business Media. All Rights Reserved.