DataBreachToday.com
FBI Updates on Vast Chinese Hack on Telecom Networks
4 months 3 weeks ago
US Probe of Chinese Hack Reveals 'Broad and Significant Cyberespionage Campaign'
The FBI and Cybersecurity and Infrastructure Security Agency released an update on their ongoing investigation into a Chinese-linked "broad and significant cyberespionage campaign" that the agencies said targeted private communications of government and political figures.
The FBI and Cybersecurity and Infrastructure Security Agency released an update on their ongoing investigation into a Chinese-linked "broad and significant cyberespionage campaign" that the agencies said targeted private communications of government and political figures.
Cryptohack Roundup: FTX Files Lawsuits to Recover Funds
4 months 3 weeks ago
Also: Arrests in $232M Scam, Guilty Plea in $73M Pig-Butchering Case
This week, FTX sued to recover money, FTX's Caroline Ellison began her prison sentence, South Korea arrested hundreds in $232M scam, a guilty plea in a $73M pig-butchering case, BlueNoroff launched a new attack campaign, GodFather malware and WonderFi CEO kidnapped and released after ransom payment.
This week, FTX sued to recover money, FTX's Caroline Ellison began her prison sentence, South Korea arrested hundreds in $232M scam, a guilty plea in a $73M pig-butchering case, BlueNoroff launched a new attack campaign, GodFather malware and WonderFi CEO kidnapped and released after ransom payment.
NIST Still Struggling to Clear Massive Vulnerability Backlog
4 months 3 weeks ago
Agency Calls Former Deadline to Clear Major Vulnerability Backlog Too 'Optimistic'
The National Institute of Standards and Technology is still struggling with a backlog of over 19,000 security vulnerabilities in its National Vulnerability Database, according to a recent announcement, which acknowledged initial projections to clear the unassessed software flaws were too optimistic.
The National Institute of Standards and Technology is still struggling with a backlog of over 19,000 security vulnerabilities in its National Vulnerability Database, according to a recent announcement, which acknowledged initial projections to clear the unassessed software flaws were too optimistic.
Cybersecurity Education Needs a Team: Better Partner Up!
4 months 3 weeks ago
Here's How Schools, Certification Bodies, Boot Camps and Leaders Can Lend a Hand
Across the security landscape, partnerships are becoming a cornerstone in developing agile, prepared professionals who can not only react to threats but anticipate and neutralize them. Here's how universities, certification bodies, boot camps and industry leaders can drive the industry forward.
Across the security landscape, partnerships are becoming a cornerstone in developing agile, prepared professionals who can not only react to threats but anticipate and neutralize them. Here's how universities, certification bodies, boot camps and industry leaders can drive the industry forward.
Feds Warn of Godzilla Webshell Threats to Health Sector
4 months 3 weeks ago
Stealthy Backdoor Publicly Available on GitHub Can Be Weaponized for Larger Attacks
Godzilla webshell, a Chinese-language backdoor known for its stealth and ability to execute commands and manipulate files, is publicly available on GitHub, and federal authorities have issued a stern warning to the healthcare sector to prepare for this threat and inevitable cyberattacks.
Godzilla webshell, a Chinese-language backdoor known for its stealth and ability to execute commands and manipulate files, is publicly available on GitHub, and federal authorities have issued a stern warning to the healthcare sector to prepare for this threat and inevitable cyberattacks.
Schneider Electric Warns of Critical Modicon Flaws
4 months 3 weeks ago
Multiple Critical Vulnerabilities Expose Industrial Control Risks
French multinational Schneider Electric disclosed critical vulnerabilities in its Modicon M340, Momentum and MC80 programmable automation controllers. The vulnerabilities could allow unauthorized access, data manipulation and system interruptions.
French multinational Schneider Electric disclosed critical vulnerabilities in its Modicon M340, Momentum and MC80 programmable automation controllers. The vulnerabilities could allow unauthorized access, data manipulation and system interruptions.
US Prosecutors Charge Hackers in Snowflake Data Theft
4 months 3 weeks ago
DOJ Accuses Alleged Hackers of Stealing Terabytes of Data From Snowflake Victims
The Justice Department unsealed an indictment against alleged hackers Connor Moucka and John Binns, accusing them of stealing data from the cloud platform Snowflake, extorting millions in bitcoin and stealing sensitive personal information from over 165 organizations and millions of individuals.
The Justice Department unsealed an indictment against alleged hackers Connor Moucka and John Binns, accusing them of stealing data from the cloud platform Snowflake, extorting millions in bitcoin and stealing sensitive personal information from over 165 organizations and millions of individuals.
1Password’s New Co-CEO Model to Drive Growth, Security Focus
4 months 3 weeks ago
CEOs Jeff Shiner, David Faugno Eye Extended Access Management, Enterprise Scale
With a new co-CEO model, 1Password's Jeff Shiner and David Faugno align product and operational leadership to build on the extended access management platform. Focusing on global partnerships and expansion, the company targets enhanced security for diverse workplace environments.
With a new co-CEO model, 1Password's Jeff Shiner and David Faugno align product and operational leadership to build on the extended access management platform. Focusing on global partnerships and expansion, the company targets enhanced security for diverse workplace environments.
Securing the Next Wave of AI with Palo Alto Networks and Google Cloud
4 months 3 weeks ago
How the Trump Administration May Reshape Security, Privacy
4 months 3 weeks ago
Attorney Lisa Sotto on Anticipated Changes in Regulatory Focus at FTC and CISA
Donald Trump's return to the White House with a renewed focus on deregulation may shift the priorities of federal agencies in enforcing data privacy and cybersecurity policy, said Lisa Sotto, partner at Hunton Andrews Kurth and chairperson of the DHS Data Privacy and Integrity Advisory Committee.
Donald Trump's return to the White House with a renewed focus on deregulation may shift the priorities of federal agencies in enforcing data privacy and cybersecurity policy, said Lisa Sotto, partner at Hunton Andrews Kurth and chairperson of the DHS Data Privacy and Integrity Advisory Committee.
Protect Your Small & Mid-Sized Business from Cyber Threats This Holiday
4 months 3 weeks ago
Cybercriminals don’t take the holidays off
Watch this timely webinar to prepare your business against rising holiday cyber threats.
Watch this timely webinar to prepare your business against rising holiday cyber threats.
Australia on Track to Ban Social Media Access for Minors
4 months 3 weeks ago
Advocacy Groups Call for Government to Regulate Social Media Platforms
The Australian government is on track to introduce a bill in the Parliament to ban youths under the age of 16 from accessing social media platforms, but critics say age verification technologies are not accurate and a ban may push children into unsafe, less visible parts of the Internet.
The Australian government is on track to introduce a bill in the Parliament to ban youths under the age of 16 from accessing social media platforms, but critics say age verification technologies are not accurate and a ban may push children into unsafe, less visible parts of the Internet.
Hamas Tied to October Wiper Attacks Using Eset Email
4 months 3 weeks ago
'Wirte' Threat Actor Used Wiper That Checks if Victim Is Located in Israel
Hackers likely connected to Palestinian militants Hamas were behind wiper attacks detected in October against Israeli organizations including hospitals and municipalities. Israeli cybersecurity firm Check Point on Tuesday attributed the attacks to a group tracked as Wirte.
Hackers likely connected to Palestinian militants Hamas were behind wiper attacks detected in October against Israeli organizations including hospitals and municipalities. Israeli cybersecurity firm Check Point on Tuesday attributed the attacks to a group tracked as Wirte.
US Still Backing UN Cybercrime Treaty Despite Criticism
4 months 3 weeks ago
US to Advocate for Human Rights Safeguards from Supporting Member Nations
The United States will support a controversial cybercrime convention initially proposed by Russia that is currently making its way through the United Nations, officials told reporters, while seeking out human rights assurances from supporting member nations.
The United States will support a controversial cybercrime convention initially proposed by Russia that is currently making its way through the United Nations, officials told reporters, while seeking out human rights assurances from supporting member nations.
SpyNote Malware Targets Android Antivirus Users
4 months 3 weeks ago
Malware Spotted Masquerading as Avast Antivirus
Android Spynote malware is masquerading as antivirus software to exploit Android processes to infiltrate devices, seize control and steal sensitive information from unsuspecting users. A report from Cyfirma shows the malware disguising itself as "Avast Mobile Security" in a recent campaign.
Android Spynote malware is masquerading as antivirus software to exploit Android processes to infiltrate devices, seize control and steal sensitive information from unsuspecting users. A report from Cyfirma shows the malware disguising itself as "Avast Mobile Security" in a recent campaign.
CHERI Alliance Adds to Memory Safety Hardware Coalition
4 months 3 weeks ago
UK Government Agencies, Google Join Group that Promotes
Two British government agencies and computing giant Google joined the CHERI Alliance, a group dedicated to promoting a hardware architecture that prevents buffer overflows and heap use-after-free vulnerabilities. Adoption of the architecture is miniscule.
Two British government agencies and computing giant Google joined the CHERI Alliance, a group dedicated to promoting a hardware architecture that prevents buffer overflows and heap use-after-free vulnerabilities. Adoption of the architecture is miniscule.
Snyk Acquires Probely to Strengthen API Security for AI Apps
4 months 3 weeks ago
Snyk Boosts API Security with Enhanced Dynamic App Security Testing Capabilities
By buying DAST provider Probely, Snyk bolsters its platform with advanced API security testing for early SDLC stages. This acquisition aims to help developers identify and reduce vulnerabilities in AI-driven and API-heavy applications. Full integration into Snyk's platform is slated for early 2025.
By buying DAST provider Probely, Snyk bolsters its platform with advanced API security testing for early SDLC stages. This acquisition aims to help developers identify and reduce vulnerabilities in AI-driven and API-heavy applications. Full integration into Snyk's platform is slated for early 2025.
Webinar | Prisma Access Browser: Boosting Security for Browser-Based Work
4 months 3 weeks ago
Embargo Ransomware Gang Sets Deadline to Leak Hospital Data
4 months 4 weeks ago
Georgia-Based Memorial Hospital and Manor Among Embargo Group's Latest Victims
Embargo, a newcomer group to the ransomware scene, is threatening to begin publishing 1.15 terabytes of data belonging to a small rural Georgia hospital and nursing home attacked last week unless a ransom is paid before Tuesday. Experts say the double extortion gang disables victims' security tools.
Embargo, a newcomer group to the ransomware scene, is threatening to begin publishing 1.15 terabytes of data belonging to a small rural Georgia hospital and nursing home attacked last week unless a ransom is paid before Tuesday. Experts say the double extortion gang disables victims' security tools.
Checked
8 hours 33 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed