Links to 120 July 2024 Stories
6 prevalent AI cybersecurity threats — and best practices to protect your digital life – Boston Business Journal
83% of cybersecurity managers are looking into AI | Security Magazine
9.9 Billion-Password Leak Was Partly a Fluke, Cybersecurity Researcher Says | Extremetech
After AT&T breach, here’s how to protect yourself from cybersecurity attack – YouTube
AI fuelling more sophisticated phishing attempts, cyberattacks – CNA
AI-generated deepfake attacks force companies to reassess cybersecurity – Help Net Security
AT&T cybersecurity breach potentially posed ‘risk to national security’
AT&T says criminals stole phone records of ‘nearly all’ customers in new data breach | TechCrunch
Avoiding The Next CrowdStrike: 10 Essential Lessons
Basta Ransomware Operator Tactics Undergo ‘Notable Shift’ | Decipher
Booking.com reports 900% surge in travel scams | ITIJ
ChatGPT Isn’t ‘Hallucinating’—It’s Bullshitting! | Scientific American
CISA calls for elimination of OS command injection vulnerabilities | Cybersecurity Dive
CISA Confirms Cyberattack on Critical Chemical Security Tool
Class Action Lawsuit Alleges Pruitt Health Ransomware Attack Due to Negligence
CrowdStrike to vendors: Sorry for the global tech outage. Here’s a $10 Uber Eats voucher | CNN Business
Cyber 101: Understanding Cybersecurity Basics for Facility Staff | Department of Energy
Cyber-Insurance Premiums Decline as Firms Build Resilience – Infosecurity Magazine
Cybersecurity & Health Care, New Bill Sponsored By Sen. Young – YouTube
Cybersecurity Best Practices in the Manufacturing Sector – Industrial Cyber
Cybersecurity for water utilities isn’t a game of (bad) luck. It’s a game of skill – One Water Blog
Cybersecurity incident reporting rule would exclude insurers, vendors
Cybersecurity Is a Communications Problem
Cybersecurity Strategies For Smart Agriculture Initiatives
Cybersecurity Tech: Do MSPs Need XDR, or is MDR Enough? | ChannelE2E
Cybersecurity: hackers don’t go on holiday, cyber attacks in tourism are growing – FIRSTonline
Dismissal of Much of SEC’s SolarWinds Complaint Has Potentially Broad Implications for SEC Cybersecurity Enforcement – Gibson Dunn
Escalating ransomware and phishing threatening UK’s most critical industries – Telecom Reseller / Technology Reseller News
Europol Breached: Secret Documents for Sale on the Dark Web
Evolve Bank & Trust LockBit attack hit 7.6 million • The Register
Exclusive: Why creating phishing-resistant users is key to cybersecurity
Fact vs. fiction: Dispelling Zero Trust Misconceptions – Infosecurity Magazine
FBI, NSA and GCHQ Warn Organisations of Hack Threat | Cyber Magazine
Federal Register :: Public Safety and Homeland Security Bureau Requests Comment on Implementation of the Cybersecurity Labeling for Internet of Things Program
Free Webinar: Cybersecurity for Dairy Farmers | Morning Ag Clips
Giant Cybersecurity Threat Discovered Lurking in Plain Sight : ScienceAlert
Global cyber outage grounds flights, hits banks, telecoms, media | Reuters
Global tech outage eases after widespread disruption, new focus seen on risks | Reuters
Google Confirms Play Store Update, App Deletion Starts In Just 5 Weeks
Grassley wants more details on breach of CISA system | SC Media
HardBit Ransomware – What You Need to Know | Tripwire
How attackers evade your EDR/XDR system — and what you can do about it | CSO Online
How to Write a Generative AI Cybersecurity Policy | Trend Micro (US)
It’s Time to Reassess Your Cybersecurity Priorities – SecurityWeek
Jefferson County clerk waits for ‘dark cloud’ to lift as ransomware attack follows backlogs, long lines | News from WDRB | wdrb.com
Judge Dismisses Most of SEC SolarWinds Lawsuit | Perigon
Law firm investigating Patelco Credit Union ransomware, data breach | ATM Marketplace
Microsoft Says Ransomware Gangs Exploiting Just-Patched VMware ESXi Flaw – SecurityWeek
Microsoft Windows Deadline—Update Your PC By July 30
MSP Update: XDR or MDR? Plus DLP Reveal Platform Tackles Insider Threats | MSSP Alert
NaaS buyer’s guide: Who is selling network as a service and what do you get? | Network World
Navigating Cybersecurity: Lessons From Restaurant Data Breaches
Nearly 1 in 3 software development professionals unaware of secure practices | Cybersecurity Dive
New Linux Play ransomware targets ESXi servers
New research reveals that cybersecurity burnout costs US enterprises over $626 million annually and UK enterprises over £130 million annually
Newsline | CISA Proposes New Cybersecurity Requirements for Criti
No leads in Apex ransomware attack
North Korean Hackers Targeted KnowBe4 with Fake IT Worker – Infosecurity Magazine
NVD – CVE-2024-38112
OneDrive Phishing Scam Tricks Users into Running Malicious PowerShell Script
Outpost24 Launches AI Domain Discovery in External Attack Surface Management | Business Wire
owasp top 10 vulnerabilities – Google Search
Pair of new reports see glaring data, cybersecurity, content-sharing vulnerabilities | Smart Industry
Patelco Credit Union says network ‘stabilized’ after crippling cyberattack
Police Digital Service employees arrested on suspicion of fraud, bribery and misconduct | Computer Weekly
Ransomware attack allegedly strikes accounting firm | Accountants Daily
Ransomware attacks are hitting energy, oil and gas sectors especially hard, report finds | CyberScoop
Ransomware attacks at all-time high, hackers have businesses, tech giants in crosshairs – Firstpost
Ransomware attacks: warning over new ‘Volcano Demon’ attack
Ransomware Encryption Ransomware Recovery – Tech to Prevent and Remediate – YouTube
Ransomware targeting FinServ: What you need to know | SC Media
Ransomware: A Silent Threat to Data Security | Formtek Blog
Re-Extortion: How Ransomware Gangs Re-Victimize Victims | Tripwire
regreSSHion Vulnerability: Key Insights & Strategies to De-risk Your Environment
Rethinking Cybersecurity in the Age of AI – Security Boulevard
Russian-linked cybercampaigns put a bull’s-eye on France. Their focus? The Olympics and elections | Stars and Stripes
SEC.gov | SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies
Security Update: Cybersecurity 101 – MDR vs. XDR, Plus TeamViewer Confirms Cyberattack | ChannelE2E
Senator Warner pushes for immediate action on mandatory cybersecurity standards for healthcare sector – Industrial Cyber
SentinelOne CEO: Cybersecurity Shouldn’t Require Constant Updates
SentinelOne: cybersecurity shouldn’t require constant updates – Security – CRN Australia
Snowflake: All Customers
Supreme Court Ruling Disrupts AI Rules; New Cybersecurity Bill Introduced | The Daily Scoop Podcast – YouTube
Supreme Court ruling on Chevron doctrine may upend future cybersecurity regulation | Cybersecurity Dive
The future of threat intelligence is here and it’s automated – Intelligent CISO
The Good, the Bad and the Ugly in Cybersecurity – Week 27
The Good, the Bad and the Ugly in Cybersecurity – Week 28
The Good, the Bad and the Ugly in Cybersecurity – Week 29
The Growing Threat of Ransomware Attacks: How Today’s Criminal Groups are Holding Your Data Hostage – Gizchina.com
The Spread of Ransomware Attacks is Widening Amid Threat Actor Power Struggle, GuidePoint Security Finds | Business | standard-journal.com
The State of Ransomware in Critical Infrastructure 2024 – Sophos News
UK ‘desperately exposed’ to cyber-threats and pandemics, says minister | UK security and counter-terrorism | The Guardian
UK arrests suspected Scattered Spider hacker linked to MGM attack
Veeam Launches Extension to Monitor Infrastructure Security
VlveSiGiSUamq4z2GRra_Webinar Calendar July 2024 – GTS.pdf
Water supplies remain ‘too weak’ when it comes to cybersecurity – Digital Journal
What Is Immutable Storage and Why Should You Use It? | Seagate US
What is InfoStealer Malware and How Does It Work?
What is OpenSSH?
What’s Real About AI in Cybersecurity?
White House mandates stricter cybersecurity for R&D institutions
White House Memo Details Cybersecurity Investment Priorities for FY 2026 Budget – GovCon Wire
White House, CISA name key cybersecurity officials as national resilience strategy rollout continues | Cybersecurity Dive
Why Firewalls Are Not Enough in Today’s Cybersecurity Landscape | MSSP Alert
Why Microsoft Is To Blame For The Crowdstrike Outage (Not The EU) – YouTube
Why the United Nations Is Chasing Its Tail on Cybersecurity
Windows detected GandCrab ransomware in Ovagames “The Red Lantern” game : r/PiratedGames
You Are the Weakest Link: Protecting Human Element in Cybersecurity | Cybersecurity Dive
83% of cybersecurity managers are looking into AI | Security Magazine
9.9 Billion-Password Leak Was Partly a Fluke, Cybersecurity Researcher Says | Extremetech
After AT&T breach, here’s how to protect yourself from cybersecurity attack – YouTube
AI fuelling more sophisticated phishing attempts, cyberattacks – CNA
AI-generated deepfake attacks force companies to reassess cybersecurity – Help Net Security
AT&T cybersecurity breach potentially posed ‘risk to national security’
AT&T says criminals stole phone records of ‘nearly all’ customers in new data breach | TechCrunch
Avoiding The Next CrowdStrike: 10 Essential Lessons
Basta Ransomware Operator Tactics Undergo ‘Notable Shift’ | Decipher
Booking.com reports 900% surge in travel scams | ITIJ
ChatGPT Isn’t ‘Hallucinating’—It’s Bullshitting! | Scientific American
CISA calls for elimination of OS command injection vulnerabilities | Cybersecurity Dive
CISA Confirms Cyberattack on Critical Chemical Security Tool
Class Action Lawsuit Alleges Pruitt Health Ransomware Attack Due to Negligence
CrowdStrike to vendors: Sorry for the global tech outage. Here’s a $10 Uber Eats voucher | CNN Business
Cyber 101: Understanding Cybersecurity Basics for Facility Staff | Department of Energy
Cyber-Insurance Premiums Decline as Firms Build Resilience – Infosecurity Magazine
Cybersecurity & Health Care, New Bill Sponsored By Sen. Young – YouTube
Cybersecurity Best Practices in the Manufacturing Sector – Industrial Cyber
Cybersecurity for water utilities isn’t a game of (bad) luck. It’s a game of skill – One Water Blog
Cybersecurity incident reporting rule would exclude insurers, vendors
Cybersecurity Is a Communications Problem
Cybersecurity Strategies For Smart Agriculture Initiatives
Cybersecurity Tech: Do MSPs Need XDR, or is MDR Enough? | ChannelE2E
Cybersecurity: hackers don’t go on holiday, cyber attacks in tourism are growing – FIRSTonline
Dismissal of Much of SEC’s SolarWinds Complaint Has Potentially Broad Implications for SEC Cybersecurity Enforcement – Gibson Dunn
Escalating ransomware and phishing threatening UK’s most critical industries – Telecom Reseller / Technology Reseller News
Europol Breached: Secret Documents for Sale on the Dark Web
Evolve Bank & Trust LockBit attack hit 7.6 million • The Register
Exclusive: Why creating phishing-resistant users is key to cybersecurity
Fact vs. fiction: Dispelling Zero Trust Misconceptions – Infosecurity Magazine
FBI, NSA and GCHQ Warn Organisations of Hack Threat | Cyber Magazine
Federal Register :: Public Safety and Homeland Security Bureau Requests Comment on Implementation of the Cybersecurity Labeling for Internet of Things Program
Free Webinar: Cybersecurity for Dairy Farmers | Morning Ag Clips
Giant Cybersecurity Threat Discovered Lurking in Plain Sight : ScienceAlert
Global cyber outage grounds flights, hits banks, telecoms, media | Reuters
Global tech outage eases after widespread disruption, new focus seen on risks | Reuters
Google Confirms Play Store Update, App Deletion Starts In Just 5 Weeks
Grassley wants more details on breach of CISA system | SC Media
HardBit Ransomware – What You Need to Know | Tripwire
How attackers evade your EDR/XDR system — and what you can do about it | CSO Online
How to Write a Generative AI Cybersecurity Policy | Trend Micro (US)
It’s Time to Reassess Your Cybersecurity Priorities – SecurityWeek
Jefferson County clerk waits for ‘dark cloud’ to lift as ransomware attack follows backlogs, long lines | News from WDRB | wdrb.com
Judge Dismisses Most of SEC SolarWinds Lawsuit | Perigon
Law firm investigating Patelco Credit Union ransomware, data breach | ATM Marketplace
Microsoft Says Ransomware Gangs Exploiting Just-Patched VMware ESXi Flaw – SecurityWeek
Microsoft Windows Deadline—Update Your PC By July 30
MSP Update: XDR or MDR? Plus DLP Reveal Platform Tackles Insider Threats | MSSP Alert
NaaS buyer’s guide: Who is selling network as a service and what do you get? | Network World
Navigating Cybersecurity: Lessons From Restaurant Data Breaches
Nearly 1 in 3 software development professionals unaware of secure practices | Cybersecurity Dive
New Linux Play ransomware targets ESXi servers
New research reveals that cybersecurity burnout costs US enterprises over $626 million annually and UK enterprises over £130 million annually
Newsline | CISA Proposes New Cybersecurity Requirements for Criti
No leads in Apex ransomware attack
North Korean Hackers Targeted KnowBe4 with Fake IT Worker – Infosecurity Magazine
NVD – CVE-2024-38112
OneDrive Phishing Scam Tricks Users into Running Malicious PowerShell Script
Outpost24 Launches AI Domain Discovery in External Attack Surface Management | Business Wire
owasp top 10 vulnerabilities – Google Search
Pair of new reports see glaring data, cybersecurity, content-sharing vulnerabilities | Smart Industry
Patelco Credit Union says network ‘stabilized’ after crippling cyberattack
Police Digital Service employees arrested on suspicion of fraud, bribery and misconduct | Computer Weekly
Ransomware attack allegedly strikes accounting firm | Accountants Daily
Ransomware attacks are hitting energy, oil and gas sectors especially hard, report finds | CyberScoop
Ransomware attacks at all-time high, hackers have businesses, tech giants in crosshairs – Firstpost
Ransomware attacks: warning over new ‘Volcano Demon’ attack
Ransomware Encryption Ransomware Recovery – Tech to Prevent and Remediate – YouTube
Ransomware targeting FinServ: What you need to know | SC Media
Ransomware: A Silent Threat to Data Security | Formtek Blog
Re-Extortion: How Ransomware Gangs Re-Victimize Victims | Tripwire
regreSSHion Vulnerability: Key Insights & Strategies to De-risk Your Environment
Rethinking Cybersecurity in the Age of AI – Security Boulevard
Russian-linked cybercampaigns put a bull’s-eye on France. Their focus? The Olympics and elections | Stars and Stripes
SEC.gov | SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies
Security Update: Cybersecurity 101 – MDR vs. XDR, Plus TeamViewer Confirms Cyberattack | ChannelE2E
Senator Warner pushes for immediate action on mandatory cybersecurity standards for healthcare sector – Industrial Cyber
SentinelOne CEO: Cybersecurity Shouldn’t Require Constant Updates
SentinelOne: cybersecurity shouldn’t require constant updates – Security – CRN Australia
Snowflake: All Customers
Supreme Court Ruling Disrupts AI Rules; New Cybersecurity Bill Introduced | The Daily Scoop Podcast – YouTube
Supreme Court ruling on Chevron doctrine may upend future cybersecurity regulation | Cybersecurity Dive
The future of threat intelligence is here and it’s automated – Intelligent CISO
The Good, the Bad and the Ugly in Cybersecurity – Week 27
The Good, the Bad and the Ugly in Cybersecurity – Week 28
The Good, the Bad and the Ugly in Cybersecurity – Week 29
The Growing Threat of Ransomware Attacks: How Today’s Criminal Groups are Holding Your Data Hostage – Gizchina.com
The Spread of Ransomware Attacks is Widening Amid Threat Actor Power Struggle, GuidePoint Security Finds | Business | standard-journal.com
The State of Ransomware in Critical Infrastructure 2024 – Sophos News
UK ‘desperately exposed’ to cyber-threats and pandemics, says minister | UK security and counter-terrorism | The Guardian
UK arrests suspected Scattered Spider hacker linked to MGM attack
Veeam Launches Extension to Monitor Infrastructure Security
VlveSiGiSUamq4z2GRra_Webinar Calendar July 2024 – GTS.pdf
Water supplies remain ‘too weak’ when it comes to cybersecurity – Digital Journal
What Is Immutable Storage and Why Should You Use It? | Seagate US
What is InfoStealer Malware and How Does It Work?
What is OpenSSH?
What’s Real About AI in Cybersecurity?
White House mandates stricter cybersecurity for R&D institutions
White House Memo Details Cybersecurity Investment Priorities for FY 2026 Budget – GovCon Wire
White House, CISA name key cybersecurity officials as national resilience strategy rollout continues | Cybersecurity Dive
Why Firewalls Are Not Enough in Today’s Cybersecurity Landscape | MSSP Alert
Why Microsoft Is To Blame For The Crowdstrike Outage (Not The EU) – YouTube
Why the United Nations Is Chasing Its Tail on Cybersecurity
Windows detected GandCrab ransomware in Ovagames “The Red Lantern” game : r/PiratedGames
You Are the Weakest Link: Protecting Human Element in Cybersecurity | Cybersecurity Dive