View as Webpage

Cyber Security Review Newsletter

6 October 2023 | Issue 204

TOP NEWS

Qakbot-affiliated actors distribute Ransom Knight malware despite infrastructure takedown

 

CISA Releases Three Industrial Control Systems Advisories

 

Zero-days for hacking WhatsApp are now worth millions of dollars

 

NSA and CISA Release Advisory on Top Ten Cybersecurity Misconfigurations

 

Clorox shares touch more than 5-year low on financial hit from cyber attack

 

Update on MOVEit Transfer SQL Injection Vulnerabilities: CVE-2023-34362, CVE-2023-35036 and CVE-2023-35708

 

CISA and NSA Release New Guidance on Identity and Access Management

 

Lyca Mobile blames cyberattack for network disruption

 

Kenya hit by record 860m cyber-attacks in a year

 

Taiwan prosecutors investigating alleged submarine program leak

 

IronNet, founded by former NSA director, shuts down and lays off staff

 

CISA Adds One Known Exploited Vulnerability to Catalog

 

CL0P Seeds ^_- Gotta Catch Em All!

 

BunnyLoader, the newest Malware-as-a-Service

 

CISA Releases Three Industrial Control Systems Advisories

Budworm: APT Group Uses Updated Custom Tool in Attacks on Government and Telecoms Org

 

Ransomware group demands $51 million from Johnson Controls after cyber attack

 

A cryptor, a stealer and a banking trojan

 

phpPgAdmin deserialization vulnerability

 

Indian Cyber Force Claims Responsibility for Cyber Attacks on Canadian Websites

 

Edinburgh Trams website offline following ‘cyber- attack’

 

Russia: Leonardo’s air booking system resumes after cyberattack

 

QR codes in email phishing

 

10 new vulnerabilities disclosed by Talos, including use-after-free issue in Google Chrome

 

Czechia: University of Defence victim of cyber-attack

 

NSA, FBI, CISA, and Japanese Partners Release Advisory on PRC-Linked Cyber Actors

 

A Ransomware Group Is Claiming They’ve Breached Sony’s Systems And Stolen Data

 

Data breaches putting domestic abuse victims’ lives at risk, says UK watchdog

 

Analysis of Generative AI Trends and ChatGPT Usage

 

ICS protocol coverage using Snort 3 service inspectors

CISA Releases Six Industrial Control Systems Advisories

 

Dusting for fingerprints: ShadowSyndicate, a new RaaS player?

 

APT and financial attacks on industrial organizations in H1 2023

 

China to impose severe punishment on crimes of cyberbullying, defamation offenses, fabricating sexual topics

 

UK: Reported cyber security breaches increase threefold for financial services firms

 

Hackers break into Russian database with data on hundreds of millions of flights

 

One of the largest T-Mobile authorized retailers had 90GB of info leaked, including customer data

 

Lingerie group Wacoal hit by cyber attack

 

Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government

 

Bermuda: Governor Confirms A ‘Major Cyber-Attack’

 

Backchannel Diplomacy: APT29’s Rapidly Evolving Diplomatic Phishing Operations

 

Emergency update: Apple patches three zero-days

 

Air Canada releases statement after brief cyber attack

 

Overview of IoT threats in 2023

 

CISA Releases Six Industrial Control Systems Advisories

 

UK to lend helping hand to Azerbaijan in cyber security sector

MAIN TOPICS

PRESS RELEASES

Supporting engineers and technicians in the field of cyber security

ARTICLES

MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.


A BRIEF HISTORY OF DATA LOSS PREVENTION

Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.


THE 5 ESSENTIAL CYBERSECURITY AWARENESS TRAINING TIPS FOR A MORE SECURE ENVIRONMENT

This article will explain cybersecurity awareness and dive deeper into the five essential tips to include in your security awareness training program to make your digital environments more secure.


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023

This article discusses crucial security measures to keep your apps safe in 2023.


WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK

What can you do if you’ve identified an employee as a cyber security risk?

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted by email to: editorial@deltabusinessmedia.com

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.


ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please call +44 207 193 2303 or email us.



*Special rates are available for start-ups and micro businesses.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

Email:  info@deltabusinessmedia.com

 Request Media Kit 
Subscribe
Twitter

www.cybersecurity-review.com

© 2014-2023 Cyber Security Review. Published by Delta Business Media. All Rights Reserved.