View as Webpage

Cyber Security Review Newsletter

19 December 2023 | Issue 209

TOP NEWS

Xfinity discloses a data breach but doesn’t say how many users are affected

 

Coverage Advisory for CVE-2023-50164: Apache Struts Path Traversal and File Upload Vulnerability

 

#StopRansomware: Play Ransomware

 

MongoDB, North Face owner VF Corp and Mr. Cooper fall victim to cyberattacks

 

Israeli-linked hacker group behind major cyber-attack on Iran’s petrol stations

 

Defense Contractor Austal USA Confirms a Cyber Attack by Hunters International Ransomware Group

 

Snatch ransomware attack claims probed by Kraft Heinz

 

Critical RCE vulnerability discovered in Perforce Helix Core Server

 

Supply chain attack targeting Ledger crypto wallet leaves users hacked

 

ALPHV ransomware gang returns, sorta

 

Rhadamanthys v0.5.0 – A Deep Dive Into The Stealer’s Components

 

Exploring Encrypted Attacks Amidst the AI Revolution

 

Microsoft patches 34 vulnerabilities, including one zero-day

 

Apple will require court order to give push notification data to law enforcement

Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally

 

U.K. MoD breach of Afghans’ data ‘could have posed threat to life in Taliban’s hands’

 

How the EU Cyber Resilience Act Impacts Manufacturers

 

The sound of you typing on your keyboard could reveal your password

 

Kyivstar explains network failure by hacker attack, subscriber data not compromised

 

Bitcoin ATM company Coin Cloud hacked

 

USAF cracks down on ‘need to know’ violations in wake of Discord leaks

 

Spider-Man developer Insomniac Games suffers ransomware attack

 

US healthcare giant Norton says hackers stole millions of patients’ data during ransomware attack

 

PSNI data breach ‘wake-up call’ for UK forces, review says

 

China: Foreign geographic information software collects sensitive data, posing threat to national security

 

No confirmation on rumored ALPHV/BlackCat site takedown by law enforcement

 

Insights into your unpatched vulnerabilities

 

Analyzing AsyncRAT’s code injection into aspnet_compiler.exe across multiple incident response cases

Europol warning on the criminal use of Bluetooth trackers for geolocalisation

 

U.S., South Korea, Japan to step up actions on North Korea cyber threats

 

Russian FSB cyber actor Star Blizzard continues worldwide spear-phishing campaigns

 

You versus adversaries: How to become unbeatable in 20 cybersecurity moves

 

MrAnon Stealer Spreads via Email with Fake Hotel Booking PDF

 

Nissan probing possible cyberattack and data breach

 

EU agrees ‘historic’ deal with world’s first laws to regulate AI

 

Android phones can be taken over remotely – update when you can

 

Governments spying on Apple, Google users through push notifications -US senator

 

Star Blizzard increases sophistication and evasion in ongoing attacks

 

Millions of patient scans and health records spilling online thanks to decades-old protocol bug

 

Why Both C-Suite Executives and Technical Experts Need to Take Memory Safe Coding Seriously

 

New macOS Trojan-Proxy piggybacking on cracked software

 

TA422’s Dedicated Exploitation Loop – the Same Week After Week

 

Genetic testing firm 23andMe admits hackers accessed DNA data of 7m users

MAIN TOPICS

ARTICLES

WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP

By Miguel Clarke, GRC and Cyber Security lead for Armor Defense


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?

By Ross Moore, Cyber Security Support Analyst with Passageways


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.


A BRIEF HISTORY OF DATA LOSS PREVENTION

Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023

This article discusses crucial security measures to keep your apps safe in 2023.


WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK

What can you do if you’ve identified an employee as a cyber security risk?

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted by email to: editorial@deltabusinessmedia.com

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.


ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

Email:  info@deltabusinessmedia.com

 Request Media Kit 
Subscribe
Twitter

www.cybersecurity-review.com

© 2014-2023 Cyber Security Review. Published by Delta Business Media. All Rights Reserved.