View as Webpage

Cyber Security Review Newsletter

6 June 2024 | Issue 219

TOP NEWS

Philippines: Toyota, Robinsons Land confirm data breaches

 

Critical Path Traversal Vulnerability in Check Point Security Gateways (CVE-2024-24919)

 

Big name TikTok accounts hijacked after opening DM

 

Debt collection agency FBCS leaks information of 3 million US citizens

 

Scammers Defraud Individuals via Work-From-Home Scams

 

The Dreaded Network Pivot: An Attack Intelligence Story

 

Hospitals in London declared critical incident after cyber-attack

 

The impact of legacy vulnerabilities in today’s cybersecurity landscape

 

Navigating Cyber Risk Through Collaboration

 

Excel File Deploys Cobalt Strike at Ukraine


Inside The Box: Malware’s New Playground

 

Ticketmaster confirms customer data breach

 

Santander data breach: 30m account and credit card details up for sale on dark web

 

BBC cyber attack exposes details of 25,000 current and former staff

 

CVE-2024-24919: Check Point Security Gateway Information Disclosure

 

Europol: Largest ever operation against botnets hits dropper malware ecosystem

 

Confluence Data Center and Server Remote Code Execution Vulnerability

Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices

 

CVE-2024-30043: Abusing URL Parsing Confusion To Exploit XXE On Sharepoint Server And Cloud

 

Sing Us a Song You’re the Piano Scam

 

‘People’s lives are at risk’: Ascension ransomware attack going on nearly three weeks

 

Data leak site BreachForums is back, boasting Live Nation/Ticketmaster user data. But is it a trap?

 

Guidance on the 911 S5 Residential Proxy Service

 

Pakistani hackers target ‘Make in India’ defence programs

 

Static Unpacking For The Widespread NSIS-Based Malicious Packer Family

 

Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks

 

pcTattleTale spyware leaks database containing victim screenshots, gets website defaced

 

ABN Amro on alert as supplier hit by ransomware attack

 

Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks

 

Threat landscape for industrial automation systems, Q1 2024

 

Data breach at medical giant Cencora exposes info from multiple drug companies

 

Ghana Cyber Security Authority Records 187 Cases of WhatsApp Account Takeovers, Warns of Rising Trend

Massive cyber attack against Eritrea’s Internet System

 

India-Estonia Cyber Security Pact to Combat Growing Threat from Chinese Hackers

 

5 Reasons to Attend Cyber Security & Cloud Congress North America 2024

 

Hellhounds: Operation Lahat. Part 2

 

Crooks plant backdoor in software used by courtrooms around the world

 

LockBit demands $25 million from Canadian pharmacy chain London Drugs after ransomware attack

 

ShrinkLocker: Turning BitLocker into ransomware

 

Most recent cyber attacks on water systems won’t be the last, says cybersecurity expert

 

Cyber Signals: Inside the growing risk of gift card fraud

 

Bank of Russia reports rising number of cyber attacks on financial infrastructure

 

Optus sued by regulator over 2022 cyber-attack

 

Cyber attacks on construction firms jump, new report finds

 

A Microsoft under attack from government and tech rivals after ‘preventable’ hack ties executive pay to cyberthreats

 

London council warns residents’ data may have been compromised by cyber attack on healthcare provider

 

New Caledonia foils a cyberattack “of unprecedented strength”

 

Why Microsoft’s New AI Feature Has Prompted Privacy Concerns

 

Patriot Mobile Suffers Data Breach Impacting Subscriber’s Personal Data

 

23-year-old man accused of running $100 million online narcotics marketplace

MAIN TOPICS

ARTICLES



HOW TO ENGAGE YOUR EMPLOYEES IN SECURITY AWARENESS TRAINING

This article outlines actionable strategies to engage employees effectively in IT security awareness training

WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP

By Miguel Clarke, GRC and Cyber Security lead for Armor Defense


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?

By Ross Moore, Cyber Security Support Analyst with Passageways


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS

More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.


A BRIEF HISTORY OF DATA LOSS PREVENTION

Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted to: editorial@deltabusinessmedia.com

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.

ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

marcom@cybersecurity-review.com

 Request Media Kit 
Subscribe
X

www.cybersecurity-review.com

© 2014-2024 Cyber Security Review. Powered by Delta Business Media. All Rights Reserved.