View as Webpage

Cyber Security Review Newsletter

22 April 2024 | Issue 216

TOP NEWS

ToddyCat is making holes in your infrastructure

 

Grindr facing UK lawsuit over alleged data protection breaches

 

Discord’s updated Terms of Service are exactly the wrong response to its recent data breaches

 

Singapore: Personal information of parents, staff at 127 schools accessed in data security breach

 

More ways Israel could strike Iran, from cyber attacks to assassinations

 

Italy: SYNLAB affected by cyber-attack

 

Overflowing Water Tank Linked to Russian Cyber Attack

 

The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider

 

#StopRansomware: Akira Ransomware summary

 

Digitalisation, Efficiency, Innovation: AUTOMA 2024 Tackles Key Challenges in Oil & Gas

  

US 911 emergency call line outage resolved in some areas

 

SoumniBot: the new Android banker’s unique techniques

 

Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters

 

CVE-2024-3400: Critical Command Injection Vulnerability in Palo Alto Networks Firewalls

 

CVE-2024-20697: Windows Libarchive Remote Code Execution Vulnerability

 

Botnets Continue Exploiting CVE-2023-1389 for Wide-Scale Spread

Cisco Duo says a third-party data breach stole MFA SMS logs

 

Giant Tiger breach sees 2.8 million records leaked

 

South Africa’s trade regulator ITAC hit by cyber attack

 

MGM files suit against FTC to block cyber attack investigation

 

How to Engage Your Employees in Security Awareness Training

 

SteganoAmor campaign: TA558 mass-attacking companies and public institutions all around the world

 

Change Healthcare faces another ransomware threat – and it looks credible

 

More than 3 000 law enforcement authorities now connected to Europol

 

“Highly capable” hackers root corporate networks by exploiting Palo Alto Networks firewall 0-day

 

Roku says more than 500,000 accounts impacted in cyberattack

 

Hackable Intel and Lenovo hardware that went undetected for 5 years won’t ever be fixed

 

Microsoft’s April 2024 Patch Tuesday includes two actively exploited zero-day vulnerabilities

 

Northern Ireland: No disciplinary action over multimillion-pound PSNI data breach

 

Apple alerts users in 92 nations to mercenary spyware attacks


Russia slaps sanctions on UK IT sector

 

Government Consulting Firm GMA Reports a Massive Data Breach That Revealed 341,650 Social Security Numbers

Russian businesses targeted by novel ransomware gang

 

IMF: Rising Cyber Threats Pose Serious Concerns for Financial Stability

 

Microsoft employees exposed internal passwords in security lapse

 

UK: Cyber security breaches survey 2024

 

Thousands of LG TVs are vulnerable to takeover

 

Cybercrime on agriculture operations and businesses is on the rise

 

NHS board warns patients of further data leak after cyber attack

 

Critical takeover vulnerabilities in 92,000 D-Link devices under active exploitation

 

ScrubCrypt Deploys VenomRAT with an Arsenal of Plugins

 

Vet firm CVS hit by cyber-attack

 

Evolving Threat Landscape: A Deep Dive into Multichannel Attacks Targeting Retailers

 

Improving Detection and Response: Making the Case for Deceptions

 

Byakugan – The Malware Behind a Phishing Attack

 

The Illusion Of Privacy: Geolocation Risks In Modern Dating Apps

 

LazyStealer: Sophisticated does not mean better

 

Why the threat of a ‘nightmare’ Chinese supercomputer just got a step closer

 

UK: Parliamentary staff warned of dangers after suspected sexting honeytrap attacks

 

Chaos Ransomware Operator Gives Up Decryption Tool for Free

MAIN TOPICS

ARTICLES

NEW: HOW TO ENGAGE YOUR EMPLOYEES IN SECURITY AWARENESS TRAINING

This article outlines actionable strategies to engage employees effectively in IT security awareness training

WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP

By Miguel Clarke, GRC and Cyber Security lead for Armor Defense


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?

By Ross Moore, Cyber Security Support Analyst with Passageways


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.


A BRIEF HISTORY OF DATA LOSS PREVENTION

Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.

ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted to: editorial@deltabusinessmedia.com

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

marcom@cybersecurity-review.com

 Request Media Kit 
Subscribe
X

www.cybersecurity-review.com

© 2014-2024 Cyber Security Review. Powered by Delta Business Media. All Rights Reserved.