1/21-23/2022 January 24, 2022January 24, 2022 ~ The Cyber Beat Russia Hatching Plot to Replace Ukraine Government, U.K. SaysBlinken Says ‘A Single Additional Russian Force’ Entering Ukraine Would Trigger U.S. ResponseU.S. Orders Diplomats’ Families to Leave Ukraine, Urges Americans to DepartExperts Find Strategic Similarities b/w NotPetya and WhisperGate Attacks on UkraineIsrael’s Attorney General Orders Probe Into Police Spyware AllegationsKrebs: Crime Shop Sells Hacked Logins to Other Crime ShopsRansomware Group Exploits Parler’s Hands-off Approach to Shake Down VictimsAfter Ransomware Arrests, Some Dark Web Criminals Are Getting WorriedAre Embedded Devices the Next Ransomware Target?How to Protect Your PC From Ransomware Using Windows’ Built-in ProtectionRansomware and Phishing: Google Drive Will Now Warn You About Suspicious FilesOzzy Osbourne’s NFT Project Shared a Scam Link, and Followers Lost Thousands of DollarsFederal Reserve Is Taking the Next Step Toward Possibly Launching a Digital DollarHow the U.S. Messed Up Its New 5G Rollout: ‘It Wasn’t Our Finest Hour’Merck Wins $1.4bn NotPetya Payout from InsurerIllinois School District Reports a 334% Hike in Cybersecurity Insurance CostsHomelife of Connecticut Residents Secretly RecordedNow Is a Good Time to Update Your Recovery Email AddressesLooking Beyond Biden’s Binding Security DirectivePennsylvania Confirms ‘Bank Hijacking’ of Unemployment SystemJefferson Health (PA) Data Breach Exposed Billing Info of 9,000 PatientsLuminis Health (MD) Patient Information Exposed in Email BreachRansomware Incident Launched Against YMCA of Greater Charlotte (NC)Hackers Broke Into Pembroke Pines (FL) City Hall ComputersMemorial Health System (OH) Confirms Data BreachSacramento County Phishing Scam Data Breach Exposed Health and Personal InfoValley Regional Transit (ID): Cyber Attack Put Personal Information at RiskFBI Warns of Malicious QR Codes Used to Steal Your MoneyPhishing Impersonates Shipping Giant Maersk to Push STRRAT MalwareSpyware Blitzes Compromise, Cannibalize ICS NetworksMolerats Hackers Hiding New Espionage Attacks Behind Public Cloud InfrastructureOver 90 WordPress Themes, Plugins Backdoored in Supply Chain AttackMcAfee Bug Can Be Exploited to Gain Windows SYSTEM PrivilegesDark Souls 3 Exploit Could Let Hackers Take Control of Your Entire ComputerMicrosoft Disables Excel 4.0 Macros by Default to Block MalwareCISA Adds 17 Vulnerabilities to List of Bugs Exploited in AttacksDutch Cybersecurity Agency Warns of Lingering Log4j Risks Share this:TwitterFacebookWhatsAppRedditLinkedInEmailLike this:Like Loading... Published by The Cyber Beat View all posts by The Cyber Beat