Here’s the latest cybersecurity-cybercrime news from “”

Views expressed in this cybersecurity news update are those of the reporters and correspondents.

Accessed on  23 August 2021, 1327 UTC.

Content provided by “”


Please click link or scroll down to read your selections.


The vulnerability could allow unauthenticated, remote attackers to execute arbitrary code or cause a denial of service condition. [Read More]
The non-profit health system says it reached a negotiated solution and that it is now in the process of restoring information operations that it was forced to suspend. [Read More]
A court in Belarus declared Wednesday a group of hackers who claim to have carried out a massive hack on the interior ministry in an attack on President Alexander Lukashenko’s regime to be an “extremist” organisation. [Read More]
A report from ClearSky documents a threat actor has been targeting multiple organizations in Israel using supply chain tools and impersonating known companies. [Read More]
T-Mobile has confirmed that hackers have accessed the personal information of millions of current and former customers. [Read More]
The flaws are rated critical and expose both Windows and MacOS users to code execution attacks. [Read More]
A pair of ransomware attacks on sewage treatment plants in rural Maine communities demonstrates that small towns need to be just as vigilant as larger communities in protecting against hackers, local officials said. [Read More]
T-Mobile acknowledged a breach of customer information after a hacker group claimed to have obtained records of 100 million of the operator’s US customers and offered some of the data on the dark web. [Read More]
Hackers accessed personally identifiable and protected health information during a ransomware attack earlier this year, Colonial Pipeline says. [Read More]
Declan Harrington, Eric Meiggs, and co-conspirators targeted people who had high value social media accounts or large amounts of cryptocurrency. [Read More]


Leveraging humans for detection makes it hard for the attackers to predict whether or not their malicious emails will be identified and using technology to automate response provides scale and speed in resolution.
The fact that so many large and high-profile enterprises fall prey to ransomware attacks that in many cases does not pose any new technical challenge suggests that there are still many gaps that needs to be closed.
We tend to focus on the attack surface when it comes to cybersecurity, but the reality is, much like an iceberg, there’s so much more lurking beneath the surface.
Threat hunting must be non-attributable, while maintaining a clear audit trail to satisfy legal and governance requirements.
Fraudsters will determine who to target within the industry based on each service’s fraud prevention policies and maturity, rather than generally targeting the industry.
Taking down dark web sites may cause headache for both the bad guys and the good guys, but it can also have a profound positive effect on the fight against cybercrime.
Josh Goldfarb debunks the most common myths surrounding fraud, security and user experience.
Each side of the public-private collaboration has resources and capabilities that shore up the other and increase effectiveness in combatting cybercrime.
The ransomware threat could still become more pervasive over the next two to three years, not because ransomware is effective in and of itself but because of other players in the game continue to fan the flames.
Over the coming weeks, we must be vigilant as there will be a glut of activity and misinformation from cybercriminals wanting to disrupt the COVID-19 vaccine rollout.