View as Webpage

Cyber Security Review Newsletter

21 August 2024 | Issue 224

TOP NEWS

Microchip Technologies hit by cyberattack

 

Toyota confirms customer and employee data stolen, says breach at third party to blame

 

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

 

BVI Electricity Corporation suffers cyber attack

 

General Motors sued for selling customer driving data to third parties

 

Ransomware attacks surge over 60% in UK and US

 

Missing tycoon’s co-defendant fatally struck by car

 

Hacked GPS tracker reveals location data of customers

 

Wichita airport still without Wi-Fi months after cyber attack

 

L.A. Courts Owe Public Full Accounting After July Ransomware Attack

 

How the ransomware attack at Change Healthcare went down: A timeline

 

X suspends business in Brazil over censorship row

 

FBI: Ransomware Disruptions during Voting Periods Will Not Impact the Security and Resiliency of Vote Casting or Counting

 

Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove

 

Rogue AI is the Future of Cyber Threats

 

A Deep Dive into a New ValleyRAT Campaign Targeting Chinese Speakers

 

Tusk: unraveling a complex infostealer campaign

T-Mobile Fined $60 Million to Settle Alleged National Security Violations

 

Hong Kong urged to fast-track privacy law reforms amid surge in data breaches

 

Kootenai Health cyber attack impacts 464,000 patients

 

Cyber attack on councils across Greater Manchester leaves thousands vulnerable to phishing scam

 

EastWind campaign: new CloudSorcerer attacks on government organizations in Russia

 

Enzo Biochem ordered to cough up $4.5 million over lousy security that led to ransomware disaster

 

New Windows Cyber Attacks Confirmed – CISA Says Update By September 3

 

ArtiPACKED: Hacking Giants Through a Race Condition in GitHub Actions Artifacts

 

FBI investigating attempts to hack Biden-Harris and Trump campaigns

 

Ongoing Social Engineering Campaign Refreshes Payloads

 

5G network flaws could be abused to let hackers spy on your phone

 

Indirect prompt injection in the real world: how people manipulate neural networks

 

Swiss-based Schlatter says IT network affected by cyberattack

 

Data of 3 billion people exposed in one of the largest data breaches in history

 

Cash App to award $15M to users in security breach settlement

Windows Downdate: Downgrade Attacks Using Windows Updates

 

Security company ADT announces security breach of customer data

 

Zimbabwe: Disclosure of cyber attacks must be mandatory to protect clients

 

Keys to the Kingdom – Gaining access to the Physical Facility through Internal Access

 

JG Summit Holdings probing ‘possible’ cyber attack

 

Royal Ransomware Actors Rebrand as “BlackSuit”

 

Russia: Massive DDoS attack on Kursk Region repelled

 

Greece leaves spy services unchecked on Predator hacks

 

Advanced fined £6m over stolen patient data in 2022 cyber attack

 

Cloud Cover: How Malicious Actors Are Leveraging Cloud Services

 

SharpRhino malware targets IT admins

 

UK: Port of Tyne website hit by cyber attack

 

Mitigating the Latest Vulnerability (CVE-2024-5008) in Progress WhatsUp Gold

 

Kadokawa confirms data leak of 254,000 people due to cyberattack

 

SonicWall Discovers Second Critical Apache OFBiz Zero-Day Vulnerability

 

Chinese hackers hijacked an ISP software update to spread malware

MAIN TOPICS

ARTICLES

HOW TO ENGAGE YOUR EMPLOYEES IN SECURITY AWARENESS TRAINING

This article outlines actionable strategies to engage employees effectively in IT security awareness training

WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP

By Miguel Clarke, GRC and Cyber Security lead for Armor Defense


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?

By Ross Moore, Cyber Security Support Analyst with Passageways


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted to: editorial@deltabusinessmedia.com

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.

ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

marcom@cybersecurity-review.com

 Request Media Kit 
Subscribe
X

www.cybersecurity-review.com

© 2014-2024 Cyber Security Review. Powered by Delta Business Media. All Rights Reserved.