Links to 110+ August 2024 Stories
3 Major Cybersecurity Challenges Facing Critical Infrastructure and OT
47% of US firms suffered data breach resulting in severe financial loss | CFO Dive
About Right of Boom | Right of Boom
Adopting strategic patch management tactics across ICS environments amid escalating cyber threats – Industrial Cyber
After cybersecurity lab wouldn’t use AV software, US accuses Georgia Tech of fraud | Ars Technica
AI-fueled phishing scams raise alarm ahead of U.S. presidential election – Help Net Security
Almost Three-quarters of Ransomware Victims Hit Multiple Times
America’s Leaky Data Rattles the U.S. Intelligence Community | Lawfare
Apple Intelligence is marking phishing scams as priority emails — here’s what you need to know | Tom’s Guide
Are cybersecurity professionals OK? | Cybersecurity Dive
Are cybersecurity professionals OK? | Cybersecurity Dive
At Black Hat, cybersecurity faces an AI conundrum amid a glut of defensive weapons – SiliconANGLE
Australian Police Investigate Crypto Phishing Scams Impacting 2,000 Wallets | Coinspeaker
Best Zero Trust Network Access Reviews 2024 | Gartner Peer Insights
BlackSuit ransomware is back with ‘improved capabilities’
Canada’s food supply — under threat?
Chrome-stored passwords targeted by notorious ransomware group | Cybernews
CISA Names First Chief Artificial Intelligence Officer | CISA
CISA warns of active exploits hitting popular CI/CD tool Jenkins | Cybersecurity Dive
CISA-FBI Cybersecurity Update Warns of New Royal Ransomware Tactics
Cisco cuts thousands of jobs as it shifts focus to AI, cybersecurity
Columbus mayor wants national cybersecurity plan, cites company urging ransom payment ban
Cybersecurity expert urges people to take precautions after massive data breach
Cybersecurity expert weighs in on how city handled ransomware attack and what’s next – YouTube
Cybersecurity experts issue warnings after SSN breach at National Public Data
Cybersecurity for Lawyers: A Series | Perkins on Privacy
Cybersecurity for Lawyers: Our New Blog Series | Perkins Coie
Cybersecurity tool sprawl is out of control – and it’s only going to get worse – SiliconANGLE
Darktrace report highlights rising dominance of MaaS and RaaS in escalating cyber threat landscape – Industrial Cyber
Deleteme – Secure Your Information And Privacy — For Consumers
‘Devastating:’ Stolen Columbus data leaked by ransomware group after auction gets no bids – YouTube
dmarc bypass attacks – Google Search
DoD proposes CMMC 2.0 rule to enhance cybersecurity in defense industrial base, seeks comment – Industrial Cyber
DOJ files federal complaint, accusing Georgia Tech of failing to meet cybersecurity requirements – WSB-TV Channel 2 – Atlanta
Donald Trump’s Campaign Says Its Emails Were Hacked – SecurityWeek
Easterly: Cybersecurity is a software quality problem | CyberScoop
Email attacks rose by 293% compared to the first half of 2023 | Security Magazine
Email attacks skyrocket 293% – Help Net Security
Energy leaders face escalating ransomware and phishing threats – Intelligent CISO
Enterprises struggle to find business value with GenAI | TechTarget
Enterprises struggle to find business value with GenAI | TechTarget
Experts Exchange | TWiT
Fact Sheet: Biden-Harris Administration Releases End of Year Report on Open-Source Software Security Initiative | ONCD | The White House
Generative AI phishing: Why cybersecurity training must evolve | Frontier Enterprise
Hospital cyberattack incidents rise: How to protect yourself
Hospital system in Michigan hit by cyberattack for second time in a year
How cloud services, SaaS, can add vulnerabilities to cybersecurity
How C-Suite Leaders Can Set The Cybersecurity Tone
how many Managed Service Providers are there in the world? – Google Search
Information Security Policy Templates | SANS Institute
Insights from Pierluigi Paganini on Quantum Computing’s Future Impact on Cybersecurity
Intelligence bill would elevate ransomware to a terrorist threat | CyberScoop
ISMG Editors: Is Russia Waging War Through Ransomware Gangs?
Lateral movement: Clearest sign of unfolding ransomware attack – Help Net Security
Leaving passwords behind and developing phishing-resistant users | TechRadar
Malwarebytes Releases “ThreatDown 2024 State of Ransomware” Report Highlighting Surge in Malicious Activity Across the USA (63% increase) and UK (67% increase)
McLaren cyberattack fallout: Canceled cancer treatments, cardiac tests
Michigan Hospital System Victim of Ransomware Attack
Microsoft 365 Phishing Alert Can Be Hidden with CSS – Infosecurity Magazine
Microsoft Sway abused in massive QR code phishing campaign
Mistakes To Avoid Before And After A Ransomware Attack
More than half of phishing bypasses all security – Techzine Global
MSSP Resource Library | MSSP Alert
Nearly one in three genAI projects will be scrapped – Computerworld
New Android Malware NGate Steals NFC Data to Clone Contactless Payment Cards
New Linux Malware ‘sedexp’ Hides Credit Card Skimmers Using Udev Rules
New Malware Hits 300,000 Users with Rogue Chrome and Edge Extensions
New Password Hacking Warning For Gmail, Facebook And Amazon Users
New Phishing Scam Uses Google Drawings and WhatsApp Shortened Links
NIST Releases First 3 Finalized Post-Quantum Encryption Standards | NIST
npd.pentester.com
Organizations fail to log 44% of cyber attacks, major exposure gaps remain – Help Net Security
PEAKLIGHT Downloader Deployed in Attacks Targeting Windows with Malicious Movie Downloads
PSA: Watch out for phishing attacks with fake banking app updates – 9to5Mac
Quantum Computing: Transforming The Future Of Cybersecurity
Quantum Resistant Algorithms RELEASED! #quantum #quantumcomputers #encryption #nist #cybersecurity – YouTube
Ransomware attack causes outages at 60 credit unions, federal agency says
Ransomware Attack Cost Keytronic Over $17 Million – SecurityWeek
Ransomware firms had some basic security flaws that meant victims never had to pay up | TechRadar
Ransomware Gang Targets Google Chrome Users In Surprise New Threat Twist
Ransomware Risk Report – Semperis
Ransomware Surge Exploits Cybersecurity Gaps Caused by M&A – Security Boulevard
Researchers Uncover 10 Flaws in Google’s File Transfer Tool Quick Share
Rhysida ransomware takes responsibility for Bayhealth Hospital compromise | SC Media
Rising cybersecurity demands reshape ICS procurement strategies across critical infrastructure – Industrial Cyber
RTL Today – Update – Scam uncovered: Caritas has allegedly been the victim of ‘executive phishing’
Russia’s luxury car phish continues to prove effective | Computer Weekly
Russian Ransomware Gangs Grab $500 Million In Ransom Crypto Payments
Scam of the Week – CrowdStrike Phishing Scams – DiscoverWestman.com – Local news, Weather, Sports, Free Classifieds and Business Listings for Westman region, Manitoba
Seattle-Tacoma Airport suffers through third day of disruptions following possible ransomware attack – SiliconANGLE
Security Now! #988 – 08-20-24 – National Public Data
Senate Committee passes Peters-Lankford bipartisan bill to harmonize federal cybersecurity regulations – Industrial Cyber
The big cybersecurity themes at Black Hat 2024 — and why they matter – Security Boulevard
The Good, the Bad and the Ugly in Cybersecurity – Week 30
The Good, the Bad and the Ugly in Cybersecurity – Week 31
The Good, the Bad and the Ugly in Cybersecurity – Week 32
The Good, the Bad and the Ugly in Cybersecurity – Week 33
The Good, the Bad and the Ugly in Cybersecurity – Week 34
The Good, the Bad and the Ugly in Cybersecurity – Week 35
The Rise of Renewable Energy Has Made Cybersecurity More Critical Than Ever | OilPrice.com
The top new cybersecurity products at Black Hat USA 2024 | CSO Online
UK proposes New Cyber Security and Resilience Bill to Boost the UK’s Cyber Defences | Data Matters Privacy Blog
Understanding Dropper Malware: Types, Examples, Detection, and Prevention
Unveiling the Top 4 Cyber Threats in 2024 | Flashpoint
US Water Cybersecurity Improvement Efforts at Loggerheads
Users: Microsoft must update Outlook’s friendly name feature • The Register
What is a data breach and how do I avoid it? Cybersecurity expert explains
What is a data breach and how do I avoid it? Cybersecurity expert explains
Why All-in-One Solutions are the Future of Cybersecurity
Wind, solar farms offer unique cybersecurity challenges | Texas Standard
With Renewable Energy on the Rise, Critical Cybersecurity Concerns Must Be Addressed | Tech Times