Cyber spider
17
Jun
2024

Alleged Scattered Spider sim-swapper arrested in Spain

A 22-year-old British national allegedly linked to the Scattered Spider hacking group and responsible for attacks on 45 U.S. companies…

Metomic’s Google User Groups feature alerts users when sensitive data might be at risk
17
Jun
2024

Metomic’s Google User Groups feature alerts users when sensitive data might be at risk

Metomic launched its new integration with Google Groups. The feature enables IT and security teams to ensure data loss prevention…

A Week In Cybersecurity World
17
Jun
2024

A Week In Cybersecurity World

This week on TCE Cyberwatch, we report on significant breaches affecting both prominent companies and universities, with thousands of individuals…

LA County’s Department of Public Health (DPH) data breach impacted over 200,000 individuals
17
Jun
2024

LA County’s Department of Public Health (DPH) data breach impacted over 200,000 individuals

LA County’s Department of Public Health (DPH) data breach impacted over 200,000 individuals Pierluigi Paganini June 17, 2024 The County…

NHS Ransomware Attack Leads to Cancellations of 800+ Operations
17
Jun
2024

NHS Ransomware Attack Leads Cancellations of 800+ Operations

A ransomware cyber attack targeted Synnovis, a pathology laboratory that processes blood tests for several NHS organizations, primarily in southeast…

Help Wanted: Women In Cybersecurity
17
Jun
2024

Help Wanted: Women In Cybersecurity

17 Jun Help Wanted: Women In Cybersecurity Posted at 08:55h in Blogs by Di Freeze This week in cybersecurity from…

Malware peddlers love this one social engineering trick!
17
Jun
2024

Malware peddlers love this one social engineering trick!

Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. The…

Emerging Technology Review and Needs
17
Jun
2024

Emerging Technology Review and Needs

By Milica D. Djekic The progress distribution is a slow and time-consuming process that normally might take decades and sometimes…

China-Linked Hackers
17
Jun
2024

China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices

Jun 17, 2024NewsroomCyber Espionage / Vulnerability A suspected China-nexus cyber espionage actor has been attributed as behind a prolonged attack…

Gartner: Navigating incident response in the cloud
17
Jun
2024

Gartner: Navigating incident response in the cloud

Traditional incident response (IR) processes, honed for on-premises environments, face significant challenges when applied to the cloud. The shared responsibility…

UK’s Total Fitness Exposes 500k Images of Members And Staff
17
Jun
2024

Total Fitness Exposes 500k Images of Members & Staff

Cybersecurity researcher Jeremiah Fowler discovered a non-password-protected database containing 474,651 images belonging to Total Fitness, a health club chain with…

Operation Celestial Force Employing Android & Windows Malware
17
Jun
2024

Operation Celestial Force Employing Android & Windows Malware

A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage campaign named Operation Celestial Force, targeting…