View as Webpage

Cyber Security Review Newsletter

6 February 2024 | Issue 211

TOP NEWS

Deputy Prime Minister hosts first global conference targeting ‘hackers for hire’ and malicious use of commercial cyber tools

 

Dead-end job

 

Defence and Security Community to Meet at FUTURE FORCES FORUM & Exhibition 2024

 

AnyDesk confirms cyber attack, revokes certificates as hackers infiltrate systems

 

Python Info-stealer Distributed by Malicious Excel Document

 

Cyber attack hits Pennsylvania Courts’ website

 

Exploring the (Not So) Secret Code of Black Hunt Ransomware

 

Classified Japanese diplomatic info leaked after Chinese cyberattacks in 2020

 

Researchers remotely exploit devices used to manage safe aircraft landings and takeoffs

 

Philippines: Cyber attack on Overseas Workers Welfare Administration website foiled

 

Europcar’s Alleged Data Breach Wasn’t Done Using AI, Experts Argue

 

Cloudflare blames previous Okta breach for November 2023 cyberattack

 

There Are Too Many Damn Honeypots

 

Former CIA employee sentenced to 40 years in prison after carrying out largest data leak in agency’s history

 

Ukraine says 2,000 computers of state firm were impacted in cyber attack

 

Volt Typhoon Actors Exploiting Insecure SOHO Routers

Czech cyber security agency reports record number of attacks in 2023

 

Hackers obtain confidential information on Romanian officials after cyber attack at Parliament

 

Apple warns of “privacy and security threats” after EU requires it to allow sideloading

 

Series of cyber attacks risks sensitive data at New Jersey schools, hospitals

 

Sustainability Business Division of Schneider Electric Responds to Cybersecurity Incident

 

Ukrainian activists launch devastating cyber attack on Russian Space Hydrometeorology Center

 

Blackwood APT Group Has a New DLL Loader

 

Hacked Microsoft test account was assigned admin privileges

 

Albabat ransomware

 

The NSA buys Americans’ internet data, newly released documents show

 

Satellites and the specter of IoT attacks

 

Kansas City Area Transit Authority hit by ransom cyber-attack, affecting communications

 

EASA Partners with IATA to Counter Safety Threat from GNSS Spoofing & Jamming

 

Malicious ads for restricted messaging applications target Chinese users

 

Billion-dollar financial giant EquiLend hit by cyberattack

 

HP Enterprise was hacked by the same Russian state-sponsored group that targeted Microsoft

Another Phobos Ransomware Variant Launches Attack – FAUST

 

Russian hackers attack Ukraine MoD resources

 

Mexican Banks and Cryptocurrency Platforms Targeted With AllaKore RAT

 

Veolia North America hit by ransomware attack

 

Seoul’s spy agency accuses China of major cyber attacks

 

CVE-2024-0204: Critical Authentication Bypass in Fortra GoAnywhere MFT

 

UK: Cybercriminals claim to have stolen data from Southern Water

 

Denmark allocates €12 million for cyber security in Ukraine’s Armed Forces and Defence Ministry within IT coalition

 

AerCap confirms cybersecurity attack

 

“The mother of all breaches”: 26 billion records found online

 

Threat Assessment: BianLian ransomware group

 

Subway reportedly hit by LockBit ransomware – but is it half-baked speculation?

 

OpenAI Lifts Military Ban, Opens Doors to DOD for Cybersecurity Collaboration

 

New macOS backdoor stealing cryptowallets

MAIN TOPICS

ARTICLES

WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP

By Miguel Clarke, GRC and Cyber Security lead for Armor Defense


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?

By Ross Moore, Cyber Security Support Analyst with Passageways


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.


A BRIEF HISTORY OF DATA LOSS PREVENTION

Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023

This article discusses crucial security measures to keep your apps safe in 2023.


WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK

What can you do if you’ve identified an employee as a cyber security risk?

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted by email to: [email protected]

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.


ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

Email:  [email protected]

 Request Media Kit 
Subscribe
X

www.cybersecurity-review.com

© 2014-2024 Cyber Security Review. Published by Delta Business Media. All Rights Reserved.