View as Webpage

Cyber Security Review Newsletter

6 August 2024 | Issue 223

TOP NEWS

Beware of Fake WinRar Websites: Malware Hosted on GitHub

 

Google Illegally Acted As A Search Monopoly, Judge Rules In Major Case

 

Chinese cyber attack sparks alert over six year old MS vuln

 

LianSpy: new Android spyware targeting Russian users

 

Bringing Security Back into Balance

 

Pharma giant Cencora is alerting millions about its data breach

 

Optus and Medibank Data Breach Cases Allege Cyber Security Failures

 

UK crimebusters shut down global call-spoofing outfit that claimed 170K-plus victims

 

Israeli hacker group takes responsibility for reported collapse of Wi-Fi in Iran


Fighting Ursa Luring Targets With Car for Sale

 

How “professional” ransomware variants boost cybercrime groups

 

Report finds Apple devices fare the worst when it comes to full takeover risks

 

Threat Actor Abuses Cloudflare Tunnels to Deliver RATs

 

FBI Warns of Scammers Impersonating Cryptocurrency Exchanges

 

CrowdStrike is sued by shareholders over huge software outage

 

OneBlood hit by ransomware attack, tells hospitals to activate critical shortage alerts

32nd International Defence Industry Exhibition MSPO in Targi Kielce

 

Malicious Packages Hidden in PyPI

 

Bloody Wolf strikes organizations in Kazakhstan with STRRAT commercial malware

 

At least 60 people ill after mass food poisoning case at Singapore ByteDance office

 

Microsoft says cyber-attack triggered latest outage

 

Threat actor impersonates Google via fake ad for Authenticator

 

The Proliferation of Cellular in IoT

 

UK: Basic IT security failings left electoral register vulnerable

 

VMware ESXi CVE-2024-37085 Targeted in Ransomware Campaigns

 

Pakistan to launch home-grown messaging app amid internet disruptions

 

US senators ask FTC to investigate car makers’ privacy practices

 

Mandrake spyware sneaks onto Google Play again, flying under the radar for two years

 

US border agents must get warrant before cell phone searches, federal court rules

 

UK: 48 cyber breaches of utility companies recorded last year, a 586% increase on 2022

 

Intruders at HealthEquity rifled through storage, stole 4.3M people’s data

 

U.N. cybercrime treaty faces new scrutiny

Millions more victims exposed in debt collection agency data breach

 

Elon Musk’s X accused of AI data grab in ‘blatant breach of law’

 

Georgia: Columbus hit by data breach, officials say not considered ransomware incident

 

Northern Ireland: Man arrested in connection with PSNI data breach

 

New regulatory license for social media platforms in Malaysia to fight cyber offences

 

Investigators probe suspected sabotage of French fiber optic network

 

CVE-2024-6922: Automation Anywhere Automation 360 Server-Side Request Forgery

 

Guernsey: Warning after spike in cyber-attacks

 

Onyx Sleet uses array of malware to gather intelligence for North Korea

 

Pentagon contractor Leidos hit by data breach Internal documents leaked on cybercrime forum

 

Data breach exposes US spyware maker behind Windows, Mac, Android and Chromebook malware

 

Cyberattack closes Jefferson County Clerk’s Office, all motor vehicle branches

 

Telegram Zero-Day Let Hackers To Spread Malware Hidden in Videos

 

Stargazers Ghost Network

 

EU to toughen cyberattack defence strategy for healthcare sector

 

TracFone will pay $16 million to settle FCC data breach investigation

MAIN TOPICS

ARTICLES



HOW TO ENGAGE YOUR EMPLOYEES IN SECURITY AWARENESS TRAINING

This article outlines actionable strategies to engage employees effectively in IT security awareness training

WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP

By Miguel Clarke, GRC and Cyber Security lead for Armor Defense


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?

By Ross Moore, Cyber Security Support Analyst with Passageways


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted to: editorial@deltabusinessmedia.com

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.

ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

marcom@cybersecurity-review.com

 Request Media Kit 
Subscribe
X

www.cybersecurity-review.com

© 2014-2024 Cyber Security Review. Powered by Delta Business Media. All Rights Reserved.