#unauthorized-access

[ follow ]
#cybersecurity

200k+ with links to Arizona tech school have data stolen

EVIT experienced a data breach involving unauthorized access to personal information, likely by the LockBit ransomware group, affecting over 200,000 individuals.

After seeing Wi-Fi network named "STINKY," Navy found hidden Starlink dish on US warship

Unauthorized IT solutions in government agencies can lead to serious consequences.
Navy personnel sought access to the internet through illegal means because of frustrations with policy.
Creative tech solutions can often conflict with security protocols, illustrating a tension in government IT.

Critical Vulnerability Found in Ray AI Framework

A critical vulnerability in the Ray compute framework for AI allows unauthorized access to all nodes.
The vulnerability allows attackers to submit or delete jobs without authentication and retrieve sensitive information.
Ray does not enforce authentication by default and does not support any type of authorization model.

$2.4 trillion securities platform owner hacked. EquiLend admits "unauthorised access"

Financial technology company EquiLend experienced unauthorized access to its systems on January 22, disrupting some of its services.
EquiLend is working to restore the affected services and has enlisted the help of external cybersecurity firms and advisers.

Park'N Fly reveals data breach affecting 1 million customer files | CBC News

Unauthorized access to Park'N Fly's network compromised personal data of one million customers, but payment information remains secure.

Young Consulting and Blue Shield of California announce data breach

Young Consulting experienced a significant data breach affecting Blue Shield of California subscribers.

200k+ with links to Arizona tech school have data stolen

EVIT experienced a data breach involving unauthorized access to personal information, likely by the LockBit ransomware group, affecting over 200,000 individuals.

After seeing Wi-Fi network named "STINKY," Navy found hidden Starlink dish on US warship

Unauthorized IT solutions in government agencies can lead to serious consequences.
Navy personnel sought access to the internet through illegal means because of frustrations with policy.
Creative tech solutions can often conflict with security protocols, illustrating a tension in government IT.

Critical Vulnerability Found in Ray AI Framework

A critical vulnerability in the Ray compute framework for AI allows unauthorized access to all nodes.
The vulnerability allows attackers to submit or delete jobs without authentication and retrieve sensitive information.
Ray does not enforce authentication by default and does not support any type of authorization model.

$2.4 trillion securities platform owner hacked. EquiLend admits "unauthorised access"

Financial technology company EquiLend experienced unauthorized access to its systems on January 22, disrupting some of its services.
EquiLend is working to restore the affected services and has enlisted the help of external cybersecurity firms and advisers.

Park'N Fly reveals data breach affecting 1 million customer files | CBC News

Unauthorized access to Park'N Fly's network compromised personal data of one million customers, but payment information remains secure.

Young Consulting and Blue Shield of California announce data breach

Young Consulting experienced a significant data breach affecting Blue Shield of California subscribers.
morecybersecurity

Social Media Accounts: The Weak Link in Organizational SaaS Security

Organizations often neglect social media account security, risking reputational damage and financial losses.
Understanding social media risks is critical for protecting brand identity and reputation.

Met Police officer charged with making 10,000 blackmail demand

A former Met Police officer was charged with blackmail and unauthorized computer access, involving a ÂŁ10,000 demand from a family related to an investigation.
from Theregister
3 months ago

Mobile device management vendor Mobile Guardian attacked

Mobile Guardian suffered a security incident leading to 13,000 devices being remotely wiped by unauthorized access, resulting in Singapore's Education Ministry terminating ties.

The imperative of fortifying police stations with secured entry solutions

Securing police building perimeters and entrances is crucial for safety against external threats while allowing seamless public movement.
#security-breach

Hugging Face says it detected 'unauthorized access' to its AI model hosting platform | TechCrunch

Hugging Face AI startup announced unauthorized access to its Spaces platform, prompting token revocation and security policy review.

Information security incident reporting policy

PURPOSE This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees.The goal is to facilitate the security response and remediation process to ensure the least amount of potential damage to systems, networks, customers and business reputation.

Hugging Face says it detected 'unauthorized access' to its AI model hosting platform | TechCrunch

Hugging Face AI startup announced unauthorized access to its Spaces platform, prompting token revocation and security policy review.

Information security incident reporting policy

PURPOSE This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees.The goal is to facilitate the security response and remediation process to ensure the least amount of potential damage to systems, networks, customers and business reputation.
moresecurity-breach

Spyware found on US hotel check-in computers | TechCrunch

Consumer-grade spyware pcTattletale exposed Wyndham hotel guest details due to a security flaw, highlighting risks of unauthorized data access.

Don't want people stealing your home WiFi? Here's how to to keep them off

Regularly audit your WiFi connections to prevent unauthorized access.
#security-measures

Mugger take your phone? Cash apps too easily let thieves drain accounts, DA says

Popular financial apps like Venmo, Zelle, and Cash App are not adequately protecting consumers from fraud that occurs when unauthorized users gain access to unlocked devices.
The Manhattan District Attorney is urging app makers to implement additional protections to prevent financial and physical harm to customers.
The District Attorney's office is interested in discussing Apple's 'Stolen Device Protection' feature as a potential security measure.

Hugging Face issues warning after detecting 'unauthorized access' to its Spaces platform

Hugging Face issued a warning to users after detecting unauthorized access to its ML Spaces platform, emphasizing the importance of securing access tokens and sensitive data.

Dropbox Sign user information accessed in data breach | Computer Weekly

Dropbox Sign (formerly HelloSign) faced a data breach leading to unauthorized access to customer data, prompting security measures and notifications to impacted users.

Mugger take your phone? Cash apps too easily let thieves drain accounts, DA says

Popular financial apps like Venmo, Zelle, and Cash App are not adequately protecting consumers from fraud that occurs when unauthorized users gain access to unlocked devices.
The Manhattan District Attorney is urging app makers to implement additional protections to prevent financial and physical harm to customers.
The District Attorney's office is interested in discussing Apple's 'Stolen Device Protection' feature as a potential security measure.

Hugging Face issues warning after detecting 'unauthorized access' to its Spaces platform

Hugging Face issued a warning to users after detecting unauthorized access to its ML Spaces platform, emphasizing the importance of securing access tokens and sensitive data.

Dropbox Sign user information accessed in data breach | Computer Weekly

Dropbox Sign (formerly HelloSign) faced a data breach leading to unauthorized access to customer data, prompting security measures and notifications to impacted users.
moresecurity-measures

AWS customer faces staggering charges over S3 bucket misfire

AWS S3 bucket owners can face high charges due to misconfigurations beyond their control.

Kate: watchdog investigating if hospital delayed data breach report

The ICO is investigating delayed reporting of privacy breach at the London Clinic
Unauthorized access to medical records can lead to fines and prosecutions
#unauthorized access

Mission Community Hospital issues notification for May 1 ransomware attack

Deanco Healthcare LLC, also known as Mission Community Hospital, has issued a breach notification about a ransomware attack it discovered in early May.
The unauthorized party accessed files containing patient information, including addresses, dates of birth, Social Security numbers, and financial account information.
The hospital did not detect the ransomware attackers in their network until it was too late.

Toyota confirms breach after Medusa ransomware threatens to leak data

Toyota Financial Services detected unauthorized access on its systems in Europe and Africa after being targeted by the Medusa ransomware.
The hackers are demanding $8 million from Toyota and threaten to leak stolen data if the ransom is not paid.
Toyota Financial Services has taken systems offline to investigate the incident and is working with law enforcement.

Mission Community Hospital issues notification for May 1 ransomware attack

Deanco Healthcare LLC, also known as Mission Community Hospital, has issued a breach notification about a ransomware attack it discovered in early May.
The unauthorized party accessed files containing patient information, including addresses, dates of birth, Social Security numbers, and financial account information.
The hospital did not detect the ransomware attackers in their network until it was too late.

Toyota confirms breach after Medusa ransomware threatens to leak data

Toyota Financial Services detected unauthorized access on its systems in Europe and Africa after being targeted by the Medusa ransomware.
The hackers are demanding $8 million from Toyota and threaten to leak stolen data if the ransom is not paid.
Toyota Financial Services has taken systems offline to investigate the incident and is working with law enforcement.
moreunauthorized access
T-Mobile discloses its second data breach of 2023

T-Mobile has suffered yet another data breach

T-Mobile has experienced another data breach, reporting that personal information belonging to hundreds of account holders was exposed in an attack between late February and March 2023.The company disclosed in notification letters issued to impacted customers on April 28th that a hacker managed to access information such as full names, dates of birth, addresses, contact information, government IDs, social security numbers, and T-Mobile account pins.
#applications

Mortgage fintech Maxwell launches SSO tool for lenders

Maxwell, the mortgage fintech backed by Wells Fargo and Fin Capital, has launched Maxwell Single-Sign On, an SSO (single sign-on) tool for lenders to enhance security and reduce the risk of data breaches, the company announced on Monday.The tool is designed to address the issue of sensitive data being handled by lenders and loan officers on a daily basis, including social security numbers, paystubs, and tax returns.

Protect Your Site from Bots with CAPTCHAs and JavaScript Challenges

Bot is short for "robot," and bots are applications that perform automated actions on the Internet.Although not all bots are bad, most have malicious purposes, from stealing sensitive information to attempting unauthorized access.Thus, bots can represent a security threat to any website.For this reason, you should consider "antibot" solutions to protect your site from bots.

Mortgage fintech Maxwell launches SSO tool for lenders

Maxwell, the mortgage fintech backed by Wells Fargo and Fin Capital, has launched Maxwell Single-Sign On, an SSO (single sign-on) tool for lenders to enhance security and reduce the risk of data breaches, the company announced on Monday.The tool is designed to address the issue of sensitive data being handled by lenders and loan officers on a daily basis, including social security numbers, paystubs, and tax returns.

Protect Your Site from Bots with CAPTCHAs and JavaScript Challenges

Bot is short for "robot," and bots are applications that perform automated actions on the Internet.Although not all bots are bad, most have malicious purposes, from stealing sensitive information to attempting unauthorized access.Thus, bots can represent a security threat to any website.For this reason, you should consider "antibot" solutions to protect your site from bots.
moreapplications
#information

Most Weaponized Vulnerabilities of 2022 and 5 Key Risks: Report

The Qualys 2023 TruRisk Research Report discusses the five most exploited vulnerabilities of calendar year 2022, and the five key 'Risk Facts' that security teams need to consider.To compile the report, the Qualys Threat Research Unit analyzed more than 13 billion events to gain insight into the vulnerabilities found on devices, the security of web apps, and the misconfiguration of on-premise devices.

Security firm Rubrik is latest to be felled by GoAnywhere vulnerability

Rubrik, the Silicon Valley data security company, said that it experienced a network intrusion made possible by a zero-day vulnerability in a product it used called GoAnywhere.In an advisory posted on Tuesday, Rubrik CISO Michael Mestrovich said an investigation into the breach found that the intruders gained access to mainly internal sales information, including company names and contact information, and a limited number of purchase orders from Rubrik distributors.

Data Security Firm Rubrik Targeted With GoAnywhere Zero-Day Exploit

Cloud data management and data security firm Rubrik has confirmed being targeted in an attack exploiting a recent GoAnywhere zero-day vulnerability after a ransomware group named the company on its leak website.Fortra, previously known as HelpSystems, alerted users of its GoAnywhere managed file transfer (MFT) software on February 1 about a zero-day remote code injection exploit.

Millions of AT&T Customers Notified of Data Breach at Third-Party Vendor

US mobile phone carrier AT&T is notifying millions of wireless customers that their customer proprietary network information (CPNI) was compromised in a data breach at a third-party vendor.One of the largest carriers in the US, AT&T has roughly 200 million wireless customers, but only a percentage of the total has been impacted by the incident.

AT&T confirms 9m wireless accounts exposed by third part

AT&T has confirmed that miscreants accessed nine million of its wireless customers' accounts after one of its vendor's networks suffered a security failure in January.The telecommunications giant told us that these users' customer proprietary network information accessed - but said the data said was "several years old," and "mostly relating to device upgrade eligibility."

Acer Confirms Breach After Hacker Offers to Sell Stolen Data

Electronics giant Acer has confirmed getting hacked after a hacker offered to sell 160 Gb of files allegedly stolen from the company's systems."We have recently detected an incident of unauthorized access to one of our document servers for repair technicians.While our investigation is ongoing, there is currently no indication that any consumer data was stored on that server," Acer told SecurityWeek in an emailed statement.

Most Weaponized Vulnerabilities of 2022 and 5 Key Risks: Report

The Qualys 2023 TruRisk Research Report discusses the five most exploited vulnerabilities of calendar year 2022, and the five key 'Risk Facts' that security teams need to consider.To compile the report, the Qualys Threat Research Unit analyzed more than 13 billion events to gain insight into the vulnerabilities found on devices, the security of web apps, and the misconfiguration of on-premise devices.

Security firm Rubrik is latest to be felled by GoAnywhere vulnerability

Rubrik, the Silicon Valley data security company, said that it experienced a network intrusion made possible by a zero-day vulnerability in a product it used called GoAnywhere.In an advisory posted on Tuesday, Rubrik CISO Michael Mestrovich said an investigation into the breach found that the intruders gained access to mainly internal sales information, including company names and contact information, and a limited number of purchase orders from Rubrik distributors.

Data Security Firm Rubrik Targeted With GoAnywhere Zero-Day Exploit

Cloud data management and data security firm Rubrik has confirmed being targeted in an attack exploiting a recent GoAnywhere zero-day vulnerability after a ransomware group named the company on its leak website.Fortra, previously known as HelpSystems, alerted users of its GoAnywhere managed file transfer (MFT) software on February 1 about a zero-day remote code injection exploit.

Millions of AT&T Customers Notified of Data Breach at Third-Party Vendor

US mobile phone carrier AT&T is notifying millions of wireless customers that their customer proprietary network information (CPNI) was compromised in a data breach at a third-party vendor.One of the largest carriers in the US, AT&T has roughly 200 million wireless customers, but only a percentage of the total has been impacted by the incident.

AT&T confirms 9m wireless accounts exposed by third part

AT&T has confirmed that miscreants accessed nine million of its wireless customers' accounts after one of its vendor's networks suffered a security failure in January.The telecommunications giant told us that these users' customer proprietary network information accessed - but said the data said was "several years old," and "mostly relating to device upgrade eligibility."

Acer Confirms Breach After Hacker Offers to Sell Stolen Data

Electronics giant Acer has confirmed getting hacked after a hacker offered to sell 160 Gb of files allegedly stolen from the company's systems."We have recently detected an incident of unauthorized access to one of our document servers for repair technicians.While our investigation is ongoing, there is currently no indication that any consumer data was stored on that server," Acer told SecurityWeek in an emailed statement.
moreinformation

Hiring kit: Cybersecurity engineer

PURPOSE Recruiting a cybersecurity engineer with the right combination of technical and industry experience will require a comprehensive screening process.This hiring kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job.
#people

President Joe Biden says US can't buy spyware that other countries have used against it

The Biden administration is trying to clamp down on the government's use of any commercial spyware that could also be used by other countries to harm its interests.The president has signed an executive order saying that federal agencies can't use spyware "that poses significant counterintelligence or security risks to the United States Government or significant risks of improper use by a foreign government or foreign person."

Dole Says Employee Information Compromised in Ransomware Attack

Produce giant Dole admitted in a document submitted on Wednesday to the US Securities and Exchange Commission (SEC) that the recent ransomware attack resulted in unauthorized access to employee information.The Ireland-based company said in February that it was forced to shut down some plants due to the cyberattack, but still claimed that impact on its operations was limited.

Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm

Sustainable energy giant Hitachi Energy has blamed a data breach affecting employees on the exploitation of a recently disclosed zero-day vulnerability in Fortra's GoAnywhere managed file transfer (MFT) software.In a press release published on Friday, Hitachi Energy said the Cl0p ransomware gang targeted the GoAnywhere product and may have gained unauthorized access to employee data in some countries.

Pepsi Bottling Ventures Discloses Data Breach

Pepsi Bottling Ventures, the largest privately-held bottler of Pepsi-Cola products in the United States, says personal information was stolen from its systems following a malware attack.Founded in 1943, the company operates 18 bottling and distribution facilities in North and South Carolina, Maryland, Virginia, and Delaware, and employs more than 2,300 people.

Someone's Converting Millions of the Stolen FTX Funds Into Bitcoin

Hackathon
In the hours after the FTX cryptocurrency exchange filed for bankruptcy, opportunistic hackers - or possibly an insider - took advantage of the chaos and began looting hundreds of millions of dollars worth of crypto.Now, it appears, they're hard at work laundering it.As CNBC reports, the exchange's new CEO, John Ray III, admitted when the company filed for bankruptcy earlier in the month that "unauthorized access to certain assets has occurred."

President Joe Biden says US can't buy spyware that other countries have used against it

The Biden administration is trying to clamp down on the government's use of any commercial spyware that could also be used by other countries to harm its interests.The president has signed an executive order saying that federal agencies can't use spyware "that poses significant counterintelligence or security risks to the United States Government or significant risks of improper use by a foreign government or foreign person."

Dole Says Employee Information Compromised in Ransomware Attack

Produce giant Dole admitted in a document submitted on Wednesday to the US Securities and Exchange Commission (SEC) that the recent ransomware attack resulted in unauthorized access to employee information.The Ireland-based company said in February that it was forced to shut down some plants due to the cyberattack, but still claimed that impact on its operations was limited.

Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm

Sustainable energy giant Hitachi Energy has blamed a data breach affecting employees on the exploitation of a recently disclosed zero-day vulnerability in Fortra's GoAnywhere managed file transfer (MFT) software.In a press release published on Friday, Hitachi Energy said the Cl0p ransomware gang targeted the GoAnywhere product and may have gained unauthorized access to employee data in some countries.

Pepsi Bottling Ventures Discloses Data Breach

Pepsi Bottling Ventures, the largest privately-held bottler of Pepsi-Cola products in the United States, says personal information was stolen from its systems following a malware attack.Founded in 1943, the company operates 18 bottling and distribution facilities in North and South Carolina, Maryland, Virginia, and Delaware, and employs more than 2,300 people.

Someone's Converting Millions of the Stolen FTX Funds Into Bitcoin

Hackathon
In the hours after the FTX cryptocurrency exchange filed for bankruptcy, opportunistic hackers - or possibly an insider - took advantage of the chaos and began looting hundreds of millions of dollars worth of crypto.Now, it appears, they're hard at work laundering it.As CNBC reports, the exchange's new CEO, John Ray III, admitted when the company filed for bankruptcy earlier in the month that "unauthorized access to certain assets has occurred."
morepeople
#years

Editorial: Congress is all talk and no action on federal tech privacy law

Don't expect Congress to act on President Biden's call for stricter privacy protections by Big Tech firms.Never mind that polls showing more than 80% of Americans have concerns about the safety and privacy of the personal data they provide on the internet.Biden made pretty much the same demand a year ago in his State of the Union address.

India: School surveillance prompts data protection concerns DW 12/05/2022

At the Adarsh public school in Delhi, students are starting their morning by reciting multiplication tables and reading from textbooks as principal Prashant Sahgal settles into his office.All of this is happening under the watchful eye of closed-circuit television (CCTV) cameras."Every room has a CCTV, every staircase has it, the gates have it," Sahgal told DW. "Not that we boast about it, it is mandatory," he added.

Editorial: Congress is all talk and no action on federal tech privacy law

Don't expect Congress to act on President Biden's call for stricter privacy protections by Big Tech firms.Never mind that polls showing more than 80% of Americans have concerns about the safety and privacy of the personal data they provide on the internet.Biden made pretty much the same demand a year ago in his State of the Union address.

India: School surveillance prompts data protection concerns DW 12/05/2022

At the Adarsh public school in Delhi, students are starting their morning by reciting multiplication tables and reading from textbooks as principal Prashant Sahgal settles into his office.All of this is happening under the watchful eye of closed-circuit television (CCTV) cameras."Every room has a CCTV, every staircase has it, the gates have it," Sahgal told DW. "Not that we boast about it, it is mandatory," he added.
moreyears

Northern Essex Community College closed for 5th day due to cyberattack

Local "We are still working through details and continuing to put protections in place."Northern Essex Community College closed its campuses for a fifth day on Tuesday due to a cyberattack that began last week."We are still working through details and continuing to put protections in place," the school said in a statement on Monday of the ongoing closure.

Auditing and logging policy

Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems.This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data.From the policy:
Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various activities.
#vulnerabilities

A Deep Dive into Path Traversal Vulnerabilities | HackerNoon

Path traversal is a vulnerability in web applications allowing unauthorized access to files outside the web root folder.

Logfile nightmare deepens thanks to critical VMware flaws

VMware has issued fixes for four vulnerabilities, including two critical 9.8-rated remote code execution bugs, in its vRealize Log Insight software.There are no reports (yet) of nation-state thugs or cybercriminals finding and exploiting these bugs, according to VMware.However, it's a good idea to patch sooner than later to avoid being patient zero.

A Deep Dive into Path Traversal Vulnerabilities | HackerNoon

Path traversal is a vulnerability in web applications allowing unauthorized access to files outside the web root folder.

Logfile nightmare deepens thanks to critical VMware flaws

VMware has issued fixes for four vulnerabilities, including two critical 9.8-rated remote code execution bugs, in its vRealize Log Insight software.There are no reports (yet) of nation-state thugs or cybercriminals finding and exploiting these bugs, according to VMware.However, it's a good idea to patch sooner than later to avoid being patient zero.
morevulnerabilities
[ Load more ]