#1 Trending Cyber Security News & Magazine
Saturday, May 27, 2023
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Invicta Stealer

    Invicta Stealer Developers Exploit Facebook to Advertise Malware

    Cyber attack on the City of Augusta

    Cyber Attack on the City of Augusta: BlackByte Ransomware Group Claims Hit

    Mirai botnet cyber attack

    Linux Devices Attacked Via a Mirai Botnet Variant ‘IZ1H9’

    Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

    Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    Cyber Attack on ETECSA, GlostSec

    GhostSec Hacker Group Claims Cyber Attack on ETECSA, Partial Database Leaked

    Iranian Cybercriminals Targeting UAE Government

    Iranian Cybercriminals Targeting UAE Government Websites Traced with Backdoor Data

    Volt Typhoon

    Chinese Espionage Operation ‘Volt Typhoon’ Targets US Critical Infrastructure

    UAE banking sector

    Cyber Attack on UAE Banking Sector: Mysterious Team Bangladesh Claims to Hit First Abu Dhabi Bank

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    StopRansomware Guide

    Updated StopRansomware Guide Warns of Ransomware’s Shape Shifting Tactics

    Microsoft Entra

    Microsoft Build 2023: Microsoft Entra Introduced With New Identity and Access Features

    Data Protection Commission

    Irish Data Protection Commission imposes $1.3bn Fine on Meta

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    disclosing cybersecurity incidents

    Why Victims Fail to Disclose Cybersecurity Incidents, And Why They Should

    Stakeholder Communication During Crisis

    Stakeholder Communication During Crisis: How to Get It Right

    Government Regulation of AI businesses

    Government Regulation of AI businesses: UK Competition Watchdog Launches Review

    national cybersecurity strategy

    US National Cybersecurity Strategy: Businesses, Let’s Start with Disclosure!

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    IBM Acquired Polar Security

    IBM Acquires Polar Security Reportedly For $60 Million

    World CyberCon Middle East 2023

    World CyberCon Middle East 2023: The Premier Cybersecurity Conference in the Region

    ODIN by Cyble

    Cyble Launches ODIN: A Revolutionary Tool for Unparalleled Internet Exploration

    cybersecurity investments

    Cybersecurity Investments Up in April, Market Watchers Predict Growth of Over $700 billion

    OilRig APT

    Experts Warn of Increased IT Supply Chain Attacks by OilRig APT in Middle East

    World Password Day 2023

    World Password Day 2023: Protect Your Password, Create an Unbreakable One

    national cybersecurity strategy

    US National Cybersecurity Strategy: Businesses, Let’s Start with Disclosure!

    Stack Identity

    Silicon Valley Startup, Stack Identity Receives $4 Million to Detect Shadow Access in Cloud

    Cyble Wins at the Global InfoSec Awards 2023

    Cyble Triumphs Yet Again With 9 Category Wins at the Global InfoSec Awards 2023, Including Editor’s Choice for Cybersecurity Startup

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
SUBSCRIBE
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Invicta Stealer

    Invicta Stealer Developers Exploit Facebook to Advertise Malware

    Cyber attack on the City of Augusta

    Cyber Attack on the City of Augusta: BlackByte Ransomware Group Claims Hit

    Mirai botnet cyber attack

    Linux Devices Attacked Via a Mirai Botnet Variant ‘IZ1H9’

    Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

    Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    Cyber Attack on ETECSA, GlostSec

    GhostSec Hacker Group Claims Cyber Attack on ETECSA, Partial Database Leaked

    Iranian Cybercriminals Targeting UAE Government

    Iranian Cybercriminals Targeting UAE Government Websites Traced with Backdoor Data

    Volt Typhoon

    Chinese Espionage Operation ‘Volt Typhoon’ Targets US Critical Infrastructure

    UAE banking sector

    Cyber Attack on UAE Banking Sector: Mysterious Team Bangladesh Claims to Hit First Abu Dhabi Bank

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    StopRansomware Guide

    Updated StopRansomware Guide Warns of Ransomware’s Shape Shifting Tactics

    Microsoft Entra

    Microsoft Build 2023: Microsoft Entra Introduced With New Identity and Access Features

    Data Protection Commission

    Irish Data Protection Commission imposes $1.3bn Fine on Meta

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    disclosing cybersecurity incidents

    Why Victims Fail to Disclose Cybersecurity Incidents, And Why They Should

    Stakeholder Communication During Crisis

    Stakeholder Communication During Crisis: How to Get It Right

    Government Regulation of AI businesses

    Government Regulation of AI businesses: UK Competition Watchdog Launches Review

    national cybersecurity strategy

    US National Cybersecurity Strategy: Businesses, Let’s Start with Disclosure!

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    IBM Acquired Polar Security

    IBM Acquires Polar Security Reportedly For $60 Million

    World CyberCon Middle East 2023

    World CyberCon Middle East 2023: The Premier Cybersecurity Conference in the Region

    ODIN by Cyble

    Cyble Launches ODIN: A Revolutionary Tool for Unparalleled Internet Exploration

    cybersecurity investments

    Cybersecurity Investments Up in April, Market Watchers Predict Growth of Over $700 billion

    OilRig APT

    Experts Warn of Increased IT Supply Chain Attacks by OilRig APT in Middle East

    World Password Day 2023

    World Password Day 2023: Protect Your Password, Create an Unbreakable One

    national cybersecurity strategy

    US National Cybersecurity Strategy: Businesses, Let’s Start with Disclosure!

    Stack Identity

    Silicon Valley Startup, Stack Identity Receives $4 Million to Detect Shadow Access in Cloud

    Cyble Wins at the Global InfoSec Awards 2023

    Cyble Triumphs Yet Again With 9 Category Wins at the Global InfoSec Awards 2023, Including Editor’s Choice for Cybersecurity Startup

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

2023 Biggest Cyber Attacks So Far And How to Protect Against Them

The first months of 2023 have been an absolute hive of cyber attack activity, clearly demonstrating it is not slowing down anytime soon. Here are just a few of the threats that have hit the headlines so far

Editorial by Editorial
May 27, 2023
in Features, Firewall Daily
0
2023 Biggest Cyber Attacks
585
SHARES
3.2k
VIEWS
Share on LinkedInShare on Twitter

by Joshua Moore, Senior Investigator – DarkInvader

The internet continues to be a dark place for businesses. In fact, organizations need to be super vigilant when it comes to the threat landscape in 2023.

You might also like

Cybertech Africa: The Pan-African Event for Innovation and Networking

Invicta Stealer Developers Exploit Facebook to Advertise Malware

Cyber Attack on the City of Augusta: BlackByte Ransomware Group Claims Hit

In a recent poll, nearly half (48.8%) of C-suite and other executives expect the number and size of cyber events targeting their organization’s accounting and financial data to increase in the year ahead, but just 20.3% work closely and consistently with their peers in cybersecurity.

This is a worrying stat, especially as with the increasing reliance on digital technologies and the rise of hybrid working, cybercriminals are finding new ways to exploit vulnerabilities to gain access to sensitive information.

The first months of 2023 have been an absolute hive of cyber attack activity, clearly demonstrating it is not slowing down anytime soon. Here are just a few of the threats that have hit the headlines so far:

Lockbit vs. Royal Mail

The recent cyber incident involving Royal Mail, served as a wake-up call regarding state-sponsored threats targeting international businesses.

The attack was carried out by Lockbit-3, a notorious Russia-linked ransomware operator known for targeting large corporations. Unusually, the ransomware gang published the attack and an ‘absurd’ ransom demand on their dark web blog, along with the subsequent chat logs with Royal Mail.

Despite Lockbit initially demanding $80 million, which they believed was a small percentage of the company’s turnover, it became evident from the chat logs that they had mistakenly targeted a subsidiary rather than the parent company, leading to disruptions in international shipping operations and global industry repercussions.

The Guardian Cyber Attack

The Guardian newspaper experienced a ransomware attack involving unauthorized access to parts of its network. As a result, employees were instructed to work remotely while internal systems were disconnected and assessed.

The attack affected various systems, including internal staff communication tools and staff canteen tills. The attack was initiated through email phishing, and while some staff information was accessed, specific details remain unknown.

This incident highlights the significance of regular phishing training to mitigate such risks and demonstrates how a single email can disrupt an entire company, leading to remote work arrangements and operational challenges.

ChatGPT Breach

In late March, ChatGPT, known for its groundbreaking AI capabilities, faced a data breach. OpenAI, the parent company, revealed that due to a bug in an open-source library, some users were able to view another user’s first and last name, email address, payment address, the last four digits of a credit card, and credit card expiration date.

Fortunately, full credit card numbers were not exposed. OpenAI promptly addressed the issue by notifying affected users, verifying emails, and implementing additional security measures.

This incident underscores how even a small vulnerability can be exploited by threat actors, causing disruptions for both users and the organization.

Eurovision becomes a target

This year’s Eurovision attracted many visitors to Liverpool with the cyber darkside taking advantage and according to booking.com, there was evidence of phishing emails being sent to some accommodation partners.

Scammers often exploit popular events to deceive customers, but while booking.com denied experiencing a security breach, travel agents still recommended visitors contact hotels directly if any concerns arise.

The organizers were also preparing themselves for pro-Russian hackers or other bad actors to attack the voting systems. Organizers were so concerned that the UK’s National Cyber Security Centre (NCSC) was brought in to protect the competition’s public vote.

New dark web market STYX

A new DarkWeb marketplace called ‘STYX’ has emerged, specializing in illegal services, stolen data, money laundering, and hacking tutorials.

Like other illicit sites, STYX relies on cryptocurrency payments to maintain anonymity. This marketplace may be a response to the recent FBI crackdown on breached forums, serving as an alternative platform for users seeking illegal data and services.

It highlights the challenge of shutting down sites like STYX or Breached, as new ones quickly replace those seized by authorities.

UNC3886 threat actor

Mandiant highlighted the activities of a Chinese espionage threat actor known as UNC3886 in a detailed report. The actor targets firewalls, IoT devices, hypervisors, and VPN technologies, taking advantage of the lack of endpoint detection response support.

By exploiting zero-day vulnerabilities and deploying custom malware, the actor gains persistence and infiltrates the target environment.

The report emphasizes the importance of communication and collaboration between organizations, vendors, and investigators to effectively mitigate these activities.

Protecting your business

The supply chain continues to be one of the biggest headaches for organizations. The UK government has been urging businesses to enhance their supply chain security.

The National Cyber Security Centre (NCSC) recently released new guidance to assist businesses in understanding and managing information obtained from suppliers.

Building upon existing supply chain recommendations, the guidance acknowledges the significant cybersecurity risks associated with weaknesses in the supply chain, as evidenced by several notable attacks in recent years.

The Cyber Security and infrastructure agency (CISA), in collaboration with MITRE, has introduced Decider, a free tool designed to facilitate the mapping of threat actor behavior to the MITRE ATT&CK framework.

This global knowledge base enables the identification and categorization of actor tactics, techniques, and procedures.

The tool simplifies the mapping process through guided questions, search and filter capabilities, and easy result export. Accompanying resources are provided to support users in getting started with the tool.

To effectively protect your organization from the barrage of oncoming cyber threats, it is crucial to implement comprehensive protective measures.

These have to include ensuring all security measures are in place and up-to-date to support the corporate infrastructure and networks, such as deploying robust firewalls and updating anti-malware solutions.

Regular software updates to address newly discovered vulnerabilities is now absolutely essential. Restricting access to sensitive data and educating employees on identifying and reporting suspicious emails from unknown sources are important steps.

Additionally, establishing an incident response plan, which involves backing up critical data, establishing communication protocols with customers and stakeholders, and collaborating with authorities for investigations, is imperative. By implementing these measures, businesses can proactively mitigate the risk of cyber attacks in 2023 and beyond.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: 2023 Biggest Cyber Attacks
Previous Post

Cybertech Africa: The Pan-African Event for Innovation and Networking

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

Cybertech Africa
Firewall Daily

Cybertech Africa: The Pan-African Event for Innovation and Networking

by Editorial
May 27, 2023
Invicta Stealer
Firewall Daily

Invicta Stealer Developers Exploit Facebook to Advertise Malware

by Vishwa Pandagle
May 26, 2023
Cyber attack on the City of Augusta
Firewall Daily

Cyber Attack on the City of Augusta: BlackByte Ransomware Group Claims Hit

by Chandu Gopalakrishnan
May 26, 2023
Mirai botnet cyber attack
Firewall Daily

Linux Devices Attacked Via a Mirai Botnet Variant ‘IZ1H9’

by Vishwa Pandagle
May 26, 2023
Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note
Data Breach News

Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

by Vishwa Pandagle
May 26, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Issue is Out. Subscribe Now

Download Now

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

mailchimp

Latest Cyber News

Invicta Stealer
Firewall Daily

Invicta Stealer Developers Exploit Facebook to Advertise Malware

May 26, 2023
Cyber attack on the City of Augusta
Firewall Daily

Cyber Attack on the City of Augusta: BlackByte Ransomware Group Claims Hit

May 26, 2023
Mirai botnet cyber attack
Firewall Daily

Linux Devices Attacked Via a Mirai Botnet Variant ‘IZ1H9’

May 26, 2023
Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note
Data Breach News

Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

May 26, 2023

Categories

Web Stories

Top 10 CISOs to Follow in 2023
Top 10 CISOs to Follow in 2023
Top 10 Ransomware Gangs in 2023
Top 10 Ransomware Gangs in 2023
Top 5 IoT Security Risks in 2023
Top 5 IoT Security Risks in 2023
Top 10 CTF Platforms in 2023
Top 10 CTF Platforms in 2023
Types of Risks Covered by Cyber Insurance
Types of Risks Covered by Cyber Insurance

About

The Cyber Express by Cyble

#1 Trending Cyber Security News and Magazine

The Cyber Express  by Cyble is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

For Events & Conferences related information: [email protected]

 

Quick Links

  • About Us
  • Advertise With Us
  • Contact Us
  • Editorial Calendar

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News
  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • Products
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by Cyber Insurance