article thumbnail

List of Data Breaches and Cyber Attacks in October 2022 – 9.9 Million Records Breached

IT Governance

Welcome to our October 2022 review of data breaches and cyber attacks. The post List of Data Breaches and Cyber Attacks in October 2022 – 9.9 We identified 102 security incidents throughout the month, which is the second largest figure so far this year – trailing only August (112). Cyber attacks.

article thumbnail

List of data breaches and cyber attacks in February 2022 – 5.1 million records breached

IT Governance

Meanwhile, you can find the full list of cyber attacks and data breaches for February 2022 below. The post List of data breaches and cyber attacks in February 2022 – 5.1 It will take place on Thursday, 3 March at 3pm, and you can register for on our website. As usual, incidents affecting UK-based organisations are listed in bold.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 408 by Pierluigi Paganini

Security Affairs

Clasiopa group targets materials research in Asia CERT of Ukraine says Russia-linked APT backdoored multiple govt sites UK won the Military Cyberwarfare exercise Defence Cyber Marvel 2 (DCM2) CISA warns of disruptive attacks amid the anniversary of Russia’s invasion of Ukraine Highly evasive cryptocurrency miner targets macOS Hackers are actively exploiting (..)

article thumbnail

A Cyber Insurance Backstop

Schneier on Security

In the first week of January, the pharmaceutical giant Merck quietly settled its years-long lawsuit over whether or not its property and casualty insurers would cover a $700 million claim filed after the devastating NotPetya cyberattack in 2017. The 9/11 attacks cost insurers and reinsurers $47 billion. 11, 2001, terrorist attacks.

article thumbnail

China-linked Moshen Dragon abuses security software to sideload malware

Security Affairs

RedFoxtrot has been active since at least 2014 and focused on gathering military intelligence from neighboring countries, it is suspected to work under the PLA China-linked Unit 69010. Experts observed overlap between the TTPs of the Moshen Dragon group with the ones of the Chinese Nomad Panda (aka RedFoxtrot).

Security 106
article thumbnail

CyberheistNews Vol 13 #13 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks

KnowBe4

users encounter mobile phishing attacks More than 50% of all mobile devices were exposed to a mobile attack in 2022 Why is mobile so prevalent and why are attacks working? doing so in 2022, a 93% increase. In a statement by Xavier Chango, the National Head of Forensic Science, "It's a military-type explosive, but very small capsules."

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

Chris Gray of Deep Watch talks about the view from the inside of a virtual SOC, the ability to see threats against a large number of SMB organizations, and the changes to cyber insurance we’re seeing as a result. VAMOSI: Cybersecurity insurance. cyber insurance as a whole was changing heavily. And why is that?