View as Webpage

Cyber Security Review Newsletter

4 April 2024 | Issue 215

TOP NEWS


Google patches critical vulnerability for Androids with Qualcomm chips

 

Unveiling the Fallout: Operation Cronos’ Impact on LockBit Following Landmark Disruption

 

CVE-2024-0394: Rapid7 Minerva Armor Privilege Escalation (FIXED)

 

Prudential Financial February incident exposed data of nearly 37K customers

 

Top yacht retailer MarineMax says cyberattack led to major online data breach

 

US and UK announce landmark agreement on artificial intelligence safety

 

International Exhibition for National Security & Resilience to showcase latest security solutions at ADNEC Centre Abu Dhabi in May

 

Pentagon Creates Office of the Assistant Secretary of Defense for Cyber Policy

 

Google agrees to wipe browsing data to put consumer privacy lawsuit to rest

 

What we know about the xz Utils backdoor that almost infected the world

 

Funding delivered to upgrade Fort Eisenhower’s Cyber Center of Excellence

 

Scottish law firm Scullion Law suffers cyber attack

 

AT&T data breach: Millions of customers’ data found on dark web

OpenAI’s new ‘Voice Engine’ clones your voice in only 15 seconds

 

Backdoor found in widely used Linux utility targets encrypted SSH connections

 

Massachusetts healthcare provider warns patients of data breach

 

The impact of compromised backups on ransomware outcomes

 

Cloud Werewolf spearphishes Russian and Belarus government employees with fake spa vouchers and federal decrees

 

Phishing Attack Targets Apple Users With Password Resets

 

Hackers threaten to release ‘huge volume’ of stolen NHS Scotland data

 

Cambodia: Police target growing gambling, cybercrime

 

New Gmail & M365 Warning As 2FA Security Bypass Hack Confirmed

 

Illinois Tollway warns I-PASS customers of text message phishing scam

 

YouTube ordered to reveal the identities of video viewers

 

Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script

 

Patch now: Mozilla patches two critical vulnerabilities in Firefox

Pakistan: Government establishes National CERT to counter cyber attacks

 

Secure by Design Alert Eliminating SQL Injection Vulnerabilities in Software

 

New Golang Trojan Installs Certificate for Comms Evasion

 

Chinese hackers targeted UK’s Electoral Commission and politicians, say security services

 

High Court order will deliver ‘swift management’ of compensation claims by those affected by PSNI data breach

 

GM stops sharing driver data with brokers amid backlash

 

APT29 Uses WINELOADER to Target German Political Parties

 

Air Europa says customer data may have been compromised in October breach

 

UK: ‘Mass surveillance’ fears over law change plans

 

UN General Assembly adopts landmark resolution on artificial intelligence

 

Unpatchable vulnerability in Apple chip leaks secret encryption keys

 

Bringing Access Back — Initial Access Brokers Exploit F5 BIG-IP (CVE-2023-46747) and ScreenConnect

 

Patch Ivanti Standalone Sentry and Ivanti Neurons for ITSM now

MAIN TOPICS

ARTICLES

WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP

By Miguel Clarke, GRC and Cyber Security lead for Armor Defense


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?

By Ross Moore, Cyber Security Support Analyst with Passageways


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.


A BRIEF HISTORY OF DATA LOSS PREVENTION

Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023

This article discusses crucial security measures to keep your apps safe in 2023.


WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK

What can you do if you’ve identified an employee as a cyber security risk?

ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted to: editorial@deltabusinessmedia.com

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

marcom@cybersecurity-review.com

 Request Media Kit 
Subscribe
X

www.cybersecurity-review.com

© 2014-2024 Cyber Security Review. Powered by Delta Business Media. All Rights Reserved.