200k+ with links to Arizona tech school have data stolen
EVIT experienced a data breach involving unauthorized access to personal information, likely by the LockBit ransomware group, affecting over 200,000 individuals.
After seeing Wi-Fi network named "STINKY," Navy found hidden Starlink dish on US warship
Unauthorized IT solutions in government agencies can lead to serious consequences.
Navy personnel sought access to the internet through illegal means because of frustrations with policy.
Creative tech solutions can often conflict with security protocols, illustrating a tension in government IT.
Critical Vulnerability Found in Ray AI Framework
A critical vulnerability in the Ray compute framework for AI allows unauthorized access to all nodes.
The vulnerability allows attackers to submit or delete jobs without authentication and retrieve sensitive information.
Ray does not enforce authentication by default and does not support any type of authorization model.
Financial technology company EquiLend experienced unauthorized access to its systems on January 22, disrupting some of its services.
EquiLend is working to restore the affected services and has enlisted the help of external cybersecurity firms and advisers.
Park'N Fly reveals data breach affecting 1 million customer files | CBC News
Unauthorized access to Park'N Fly's network compromised personal data of one million customers, but payment information remains secure.
Young Consulting and Blue Shield of California announce data breach
Young Consulting experienced a significant data breach affecting Blue Shield of California subscribers.
200k+ with links to Arizona tech school have data stolen
EVIT experienced a data breach involving unauthorized access to personal information, likely by the LockBit ransomware group, affecting over 200,000 individuals.
After seeing Wi-Fi network named "STINKY," Navy found hidden Starlink dish on US warship
Unauthorized IT solutions in government agencies can lead to serious consequences.
Navy personnel sought access to the internet through illegal means because of frustrations with policy.
Creative tech solutions can often conflict with security protocols, illustrating a tension in government IT.
Critical Vulnerability Found in Ray AI Framework
A critical vulnerability in the Ray compute framework for AI allows unauthorized access to all nodes.
The vulnerability allows attackers to submit or delete jobs without authentication and retrieve sensitive information.
Ray does not enforce authentication by default and does not support any type of authorization model.
Social Media Accounts: The Weak Link in Organizational SaaS Security
Organizations often neglect social media account security, risking reputational damage and financial losses.
Understanding social media risks is critical for protecting brand identity and reputation.
Met Police officer charged with making 10,000 blackmail demand
A former Met Police officer was charged with blackmail and unauthorized computer access, involving a ÂŁ10,000 demand from a family related to an investigation.
Mobile device management vendor Mobile Guardian attacked
Mobile Guardian suffered a security incident leading to 13,000 devices being remotely wiped by unauthorized access, resulting in Singapore's Education Ministry terminating ties.
The imperative of fortifying police stations with secured entry solutions
Securing police building perimeters and entrances is crucial for safety against external threats while allowing seamless public movement.
Hugging Face says it detected 'unauthorized access' to its AI model hosting platform | TechCrunch
Hugging Face AI startup announced unauthorized access to its Spaces platform, prompting token revocation and security policy review.
Information security incident reporting policy
PURPOSE This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees.The goal is to facilitate the security response and remediation process to ensure the least amount of potential damage to systems, networks, customers and business reputation.
Hugging Face says it detected 'unauthorized access' to its AI model hosting platform | TechCrunch
Hugging Face AI startup announced unauthorized access to its Spaces platform, prompting token revocation and security policy review.
Information security incident reporting policy
PURPOSE This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees.The goal is to facilitate the security response and remediation process to ensure the least amount of potential damage to systems, networks, customers and business reputation.
Mugger take your phone? Cash apps too easily let thieves drain accounts, DA says
Popular financial apps like Venmo, Zelle, and Cash App are not adequately protecting consumers from fraud that occurs when unauthorized users gain access to unlocked devices.
The Manhattan District Attorney is urging app makers to implement additional protections to prevent financial and physical harm to customers.
The District Attorney's office is interested in discussing Apple's 'Stolen Device Protection' feature as a potential security measure.
Hugging Face issues warning after detecting 'unauthorized access' to its Spaces platform
Hugging Face issued a warning to users after detecting unauthorized access to its ML Spaces platform, emphasizing the importance of securing access tokens and sensitive data.
Dropbox Sign user information accessed in data breach | Computer Weekly
Dropbox Sign (formerly HelloSign) faced a data breach leading to unauthorized access to customer data, prompting security measures and notifications to impacted users.
Mugger take your phone? Cash apps too easily let thieves drain accounts, DA says
Popular financial apps like Venmo, Zelle, and Cash App are not adequately protecting consumers from fraud that occurs when unauthorized users gain access to unlocked devices.
The Manhattan District Attorney is urging app makers to implement additional protections to prevent financial and physical harm to customers.
The District Attorney's office is interested in discussing Apple's 'Stolen Device Protection' feature as a potential security measure.
Hugging Face issues warning after detecting 'unauthorized access' to its Spaces platform
Hugging Face issued a warning to users after detecting unauthorized access to its ML Spaces platform, emphasizing the importance of securing access tokens and sensitive data.
Dropbox Sign user information accessed in data breach | Computer Weekly
Dropbox Sign (formerly HelloSign) faced a data breach leading to unauthorized access to customer data, prompting security measures and notifications to impacted users.
Mission Community Hospital issues notification for May 1 ransomware attack
Deanco Healthcare LLC, also known as Mission Community Hospital, has issued a breach notification about a ransomware attack it discovered in early May.
The unauthorized party accessed files containing patient information, including addresses, dates of birth, Social Security numbers, and financial account information.
The hospital did not detect the ransomware attackers in their network until it was too late.
Toyota confirms breach after Medusa ransomware threatens to leak data
Toyota Financial Services detected unauthorized access on its systems in Europe and Africa after being targeted by the Medusa ransomware.
The hackers are demanding $8 million from Toyota and threaten to leak stolen data if the ransom is not paid.
Toyota Financial Services has taken systems offline to investigate the incident and is working with law enforcement.
Mission Community Hospital issues notification for May 1 ransomware attack
Deanco Healthcare LLC, also known as Mission Community Hospital, has issued a breach notification about a ransomware attack it discovered in early May.
The unauthorized party accessed files containing patient information, including addresses, dates of birth, Social Security numbers, and financial account information.
The hospital did not detect the ransomware attackers in their network until it was too late.
Toyota confirms breach after Medusa ransomware threatens to leak data
Toyota Financial Services detected unauthorized access on its systems in Europe and Africa after being targeted by the Medusa ransomware.
The hackers are demanding $8 million from Toyota and threaten to leak stolen data if the ransom is not paid.
Toyota Financial Services has taken systems offline to investigate the incident and is working with law enforcement.
T-Mobile has experienced another data breach, reporting that personal information belonging to hundreds of account holders was exposed in an attack between late February and March 2023.The company disclosed in notification letters issued to impacted customers on April 28th that a hacker managed to access information such as full names, dates of birth, addresses, contact information, government IDs, social security numbers, and T-Mobile account pins.
Mortgage fintech Maxwell launches SSO tool for lenders
Maxwell, the mortgage fintech backed by Wells Fargo and Fin Capital, has launched Maxwell Single-Sign On, an SSO (single sign-on) tool for lenders to enhance security and reduce the risk of data breaches, the company announced on Monday.The tool is designed to address the issue of sensitive data being handled by lenders and loan officers on a daily basis, including social security numbers, paystubs, and tax returns.
Protect Your Site from Bots with CAPTCHAs and JavaScript Challenges
Bot is short for "robot," and bots are applications that perform automated actions on the Internet.Although not all bots are bad, most have malicious purposes, from stealing sensitive information to attempting unauthorized access.Thus, bots can represent a security threat to any website.For this reason, you should consider "antibot" solutions to protect your site from bots.
Mortgage fintech Maxwell launches SSO tool for lenders
Maxwell, the mortgage fintech backed by Wells Fargo and Fin Capital, has launched Maxwell Single-Sign On, an SSO (single sign-on) tool for lenders to enhance security and reduce the risk of data breaches, the company announced on Monday.The tool is designed to address the issue of sensitive data being handled by lenders and loan officers on a daily basis, including social security numbers, paystubs, and tax returns.
Protect Your Site from Bots with CAPTCHAs and JavaScript Challenges
Bot is short for "robot," and bots are applications that perform automated actions on the Internet.Although not all bots are bad, most have malicious purposes, from stealing sensitive information to attempting unauthorized access.Thus, bots can represent a security threat to any website.For this reason, you should consider "antibot" solutions to protect your site from bots.
Most Weaponized Vulnerabilities of 2022 and 5 Key Risks: Report
The Qualys 2023 TruRisk Research Report discusses the five most exploited vulnerabilities of calendar year 2022, and the five key 'Risk Facts' that security teams need to consider.To compile the report, the Qualys Threat Research Unit analyzed more than 13 billion events to gain insight into the vulnerabilities found on devices, the security of web apps, and the misconfiguration of on-premise devices.
Security firm Rubrik is latest to be felled by GoAnywhere vulnerability
Rubrik, the Silicon Valley data security company, said that it experienced a network intrusion made possible by a zero-day vulnerability in a product it used called GoAnywhere.In an advisory posted on Tuesday, Rubrik CISO Michael Mestrovich said an investigation into the breach found that the intruders gained access to mainly internal sales information, including company names and contact information, and a limited number of purchase orders from Rubrik distributors.
Data Security Firm Rubrik Targeted With GoAnywhere Zero-Day Exploit
Cloud data management and data security firm Rubrik has confirmed being targeted in an attack exploiting a recent GoAnywhere zero-day vulnerability after a ransomware group named the company on its leak website.Fortra, previously known as HelpSystems, alerted users of its GoAnywhere managed file transfer (MFT) software on February 1 about a zero-day remote code injection exploit.
Millions of AT&T Customers Notified of Data Breach at Third-Party Vendor
US mobile phone carrier AT&T is notifying millions of wireless customers that their customer proprietary network information (CPNI) was compromised in a data breach at a third-party vendor.One of the largest carriers in the US, AT&T has roughly 200 million wireless customers, but only a percentage of the total has been impacted by the incident.
AT&T confirms 9m wireless accounts exposed by third part
AT&T has confirmed that miscreants accessed nine million of its wireless customers' accounts after one of its vendor's networks suffered a security failure in January.The telecommunications giant told us that these users' customer proprietary network information accessed - but said the data said was "several years old," and "mostly relating to device upgrade eligibility."
Acer Confirms Breach After Hacker Offers to Sell Stolen Data
Electronics giant Acer has confirmed getting hacked after a hacker offered to sell 160 Gb of files allegedly stolen from the company's systems."We have recently detected an incident of unauthorized access to one of our document servers for repair technicians.While our investigation is ongoing, there is currently no indication that any consumer data was stored on that server," Acer told SecurityWeek in an emailed statement.
Most Weaponized Vulnerabilities of 2022 and 5 Key Risks: Report
The Qualys 2023 TruRisk Research Report discusses the five most exploited vulnerabilities of calendar year 2022, and the five key 'Risk Facts' that security teams need to consider.To compile the report, the Qualys Threat Research Unit analyzed more than 13 billion events to gain insight into the vulnerabilities found on devices, the security of web apps, and the misconfiguration of on-premise devices.
Security firm Rubrik is latest to be felled by GoAnywhere vulnerability
Rubrik, the Silicon Valley data security company, said that it experienced a network intrusion made possible by a zero-day vulnerability in a product it used called GoAnywhere.In an advisory posted on Tuesday, Rubrik CISO Michael Mestrovich said an investigation into the breach found that the intruders gained access to mainly internal sales information, including company names and contact information, and a limited number of purchase orders from Rubrik distributors.
Data Security Firm Rubrik Targeted With GoAnywhere Zero-Day Exploit
Cloud data management and data security firm Rubrik has confirmed being targeted in an attack exploiting a recent GoAnywhere zero-day vulnerability after a ransomware group named the company on its leak website.Fortra, previously known as HelpSystems, alerted users of its GoAnywhere managed file transfer (MFT) software on February 1 about a zero-day remote code injection exploit.
Millions of AT&T Customers Notified of Data Breach at Third-Party Vendor
US mobile phone carrier AT&T is notifying millions of wireless customers that their customer proprietary network information (CPNI) was compromised in a data breach at a third-party vendor.One of the largest carriers in the US, AT&T has roughly 200 million wireless customers, but only a percentage of the total has been impacted by the incident.
AT&T confirms 9m wireless accounts exposed by third part
AT&T has confirmed that miscreants accessed nine million of its wireless customers' accounts after one of its vendor's networks suffered a security failure in January.The telecommunications giant told us that these users' customer proprietary network information accessed - but said the data said was "several years old," and "mostly relating to device upgrade eligibility."
Acer Confirms Breach After Hacker Offers to Sell Stolen Data
Electronics giant Acer has confirmed getting hacked after a hacker offered to sell 160 Gb of files allegedly stolen from the company's systems."We have recently detected an incident of unauthorized access to one of our document servers for repair technicians.While our investigation is ongoing, there is currently no indication that any consumer data was stored on that server," Acer told SecurityWeek in an emailed statement.
PURPOSE Recruiting a cybersecurity engineer with the right combination of technical and industry experience will require a comprehensive screening process.This hiring kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job.
President Joe Biden says US can't buy spyware that other countries have used against it
The Biden administration is trying to clamp down on the government's use of any commercial spyware that could also be used by other countries to harm its interests.The president has signed an executive order saying that federal agencies can't use spyware "that poses significant counterintelligence or security risks to the United States Government or significant risks of improper use by a foreign government or foreign person."
Dole Says Employee Information Compromised in Ransomware Attack
Produce giant Dole admitted in a document submitted on Wednesday to the US Securities and Exchange Commission (SEC) that the recent ransomware attack resulted in unauthorized access to employee information.The Ireland-based company said in February that it was forced to shut down some plants due to the cyberattack, but still claimed that impact on its operations was limited.
Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Sustainable energy giant Hitachi Energy has blamed a data breach affecting employees on the exploitation of a recently disclosed zero-day vulnerability in Fortra's GoAnywhere managed file transfer (MFT) software.In a press release published on Friday, Hitachi Energy said the Cl0p ransomware gang targeted the GoAnywhere product and may have gained unauthorized access to employee data in some countries.
Pepsi Bottling Ventures Discloses Data Breach
Pepsi Bottling Ventures, the largest privately-held bottler of Pepsi-Cola products in the United States, says personal information was stolen from its systems following a malware attack.Founded in 1943, the company operates 18 bottling and distribution facilities in North and South Carolina, Maryland, Virginia, and Delaware, and employs more than 2,300 people.
Someone's Converting Millions of the Stolen FTX Funds Into Bitcoin
Hackathon In the hours after the FTX cryptocurrency exchange filed for bankruptcy, opportunistic hackers - or possibly an insider - took advantage of the chaos and began looting hundreds of millions of dollars worth of crypto.Now, it appears, they're hard at work laundering it.As CNBC reports, the exchange's new CEO, John Ray III, admitted when the company filed for bankruptcy earlier in the month that "unauthorized access to certain assets has occurred."
President Joe Biden says US can't buy spyware that other countries have used against it
The Biden administration is trying to clamp down on the government's use of any commercial spyware that could also be used by other countries to harm its interests.The president has signed an executive order saying that federal agencies can't use spyware "that poses significant counterintelligence or security risks to the United States Government or significant risks of improper use by a foreign government or foreign person."
Dole Says Employee Information Compromised in Ransomware Attack
Produce giant Dole admitted in a document submitted on Wednesday to the US Securities and Exchange Commission (SEC) that the recent ransomware attack resulted in unauthorized access to employee information.The Ireland-based company said in February that it was forced to shut down some plants due to the cyberattack, but still claimed that impact on its operations was limited.
Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Sustainable energy giant Hitachi Energy has blamed a data breach affecting employees on the exploitation of a recently disclosed zero-day vulnerability in Fortra's GoAnywhere managed file transfer (MFT) software.In a press release published on Friday, Hitachi Energy said the Cl0p ransomware gang targeted the GoAnywhere product and may have gained unauthorized access to employee data in some countries.
Pepsi Bottling Ventures Discloses Data Breach
Pepsi Bottling Ventures, the largest privately-held bottler of Pepsi-Cola products in the United States, says personal information was stolen from its systems following a malware attack.Founded in 1943, the company operates 18 bottling and distribution facilities in North and South Carolina, Maryland, Virginia, and Delaware, and employs more than 2,300 people.
Someone's Converting Millions of the Stolen FTX Funds Into Bitcoin
Hackathon In the hours after the FTX cryptocurrency exchange filed for bankruptcy, opportunistic hackers - or possibly an insider - took advantage of the chaos and began looting hundreds of millions of dollars worth of crypto.Now, it appears, they're hard at work laundering it.As CNBC reports, the exchange's new CEO, John Ray III, admitted when the company filed for bankruptcy earlier in the month that "unauthorized access to certain assets has occurred."
Editorial: Congress is all talk and no action on federal tech privacy law
Don't expect Congress to act on President Biden's call for stricter privacy protections by Big Tech firms.Never mind that polls showing more than 80% of Americans have concerns about the safety and privacy of the personal data they provide on the internet.Biden made pretty much the same demand a year ago in his State of the Union address.
India: School surveillance prompts data protection concerns DW 12/05/2022
At the Adarsh public school in Delhi, students are starting their morning by reciting multiplication tables and reading from textbooks as principal Prashant Sahgal settles into his office.All of this is happening under the watchful eye of closed-circuit television (CCTV) cameras."Every room has a CCTV, every staircase has it, the gates have it," Sahgal told DW. "Not that we boast about it, it is mandatory," he added.
Editorial: Congress is all talk and no action on federal tech privacy law
Don't expect Congress to act on President Biden's call for stricter privacy protections by Big Tech firms.Never mind that polls showing more than 80% of Americans have concerns about the safety and privacy of the personal data they provide on the internet.Biden made pretty much the same demand a year ago in his State of the Union address.
India: School surveillance prompts data protection concerns DW 12/05/2022
At the Adarsh public school in Delhi, students are starting their morning by reciting multiplication tables and reading from textbooks as principal Prashant Sahgal settles into his office.All of this is happening under the watchful eye of closed-circuit television (CCTV) cameras."Every room has a CCTV, every staircase has it, the gates have it," Sahgal told DW. "Not that we boast about it, it is mandatory," he added.
Northern Essex Community College closed for 5th day due to cyberattack
Local "We are still working through details and continuing to put protections in place."Northern Essex Community College closed its campuses for a fifth day on Tuesday due to a cyberattack that began last week."We are still working through details and continuing to put protections in place," the school said in a statement on Monday of the ongoing closure.
Auditing and logging policy
Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems.This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data.From the policy: Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various activities.
A Deep Dive into Path Traversal Vulnerabilities | HackerNoon
Path traversal is a vulnerability in web applications allowing unauthorized access to files outside the web root folder.
Logfile nightmare deepens thanks to critical VMware flaws
VMware has issued fixes for four vulnerabilities, including two critical 9.8-rated remote code execution bugs, in its vRealize Log Insight software.There are no reports (yet) of nation-state thugs or cybercriminals finding and exploiting these bugs, according to VMware.However, it's a good idea to patch sooner than later to avoid being patient zero.
A Deep Dive into Path Traversal Vulnerabilities | HackerNoon
Path traversal is a vulnerability in web applications allowing unauthorized access to files outside the web root folder.
Logfile nightmare deepens thanks to critical VMware flaws
VMware has issued fixes for four vulnerabilities, including two critical 9.8-rated remote code execution bugs, in its vRealize Log Insight software.There are no reports (yet) of nation-state thugs or cybercriminals finding and exploiting these bugs, according to VMware.However, it's a good idea to patch sooner than later to avoid being patient zero.