This week’s latest cybersecurity bulletin will take you through the top cybersecurity news, sharing how Microsoft has been sued, the UK government’s scanning of all Internet devices, the evolution of Robin Banks phishing, malicious phishing applications on Google Play, how hackers stole $11 million from African banks, and a fresh clipboard stealer replacing crypto wallet addresses.
Every second counts when your organization experiences a data breach. Having a response plan ready before a data breach happens is critical, so you know the steps to respond quickly to minimize the damage. This article discusses how your enterprise can respond to a data breach by taking proactive measures.
Many businesses rely on their email communications for everything from keeping teams updated on each other’s progress, to contacting clients and scheduling meetings. They can’t get by with their voip phone services alone. Without the use of emails, businesses would quickly come unstuck, causing delays to projects and preventing effective customer support. To avoid this, businesses need to invest in email security, protecting this channel of communication and the information that is shared within.
This week’s cybersecurity bulletin covers cybercriminal students getting arrested, Google’s zero-day exploits, a ransomware attack on ACL, the man behind raccoon stealer, LinkedIn’s latest steps to battle malicious actors, and the hive ransomware attack on one of the largest electricity providers.
Medibank was targeted using stolen login credentials that led the threat actors to its network, allowing them to steal customer records. Medibank is in conversation with the threat actors while Australian federal police investigate the matter and the fate of the customer’s hanging. Here is everything about the Medibank hack, how the cyberattack took place, what Medibank is doing and offering its customers, what will Medibank’s future be, and why cyber insurance and cybersecurity protection is essential for organizations.
As most businesses are moving their operations to the Cloud, misconfigurations are common today, leading to data exfiltration. In this article, we discuss the recent Microsoft data breach, which potentially led to the exfiltration of customers’ data.
Threat actors are developing advanced and sophisticated techniques to target organizations worldwide with new tools. This week’s top cybersecurity news highlights new double extortion tools, why Google is being sued, the FBI’s warning to US students, the cyber espionage campaign on Asian casinos, 2.2 million stolen customer records, and OldGremlin targeting Russia with ransomware.
The world has become an interconnected ecosystem due to APIs and cloud services. Today, organizations are leveraging physical and virtual services from other organizations instead of having to develop them from scratch.
The past few years saw a rise in the variety and volume of software supply chain attacks. The threat landscape is evolving too fast to neglect the latest updates. The article shows how researchers discovered an npm API vulnerability.
that reminds developers to stay on top of their security practices.
The best action against cybercriminals is knowing how they operate and carry out malicious activities. This weekly cybersecurity bulletin brings the top cybersecurity news worldwide, covering ransomware attacks against Ukraine, Black Axe cybercriminals behind bars, the Alchemist malware, crypto stealing Solana update campaign, exposed financial information, and unofficial WhatsApp stealing accounts. Let us see how threat actors are using these attacks so you can stay safe.