Victims of Finland’s largest psychotherapy data breach are seeking higher compensation. In 2020, a hacker stole sensitive information from 40,000 clients of Vastaamo, including patient records, and used it for extortion. While the Finnish government has offered compensation ranging from €500 to €1500, lawyers argue that this is insufficient, given the severe privacy violations the […]
The UK’s Electoral Commission leaked personal details of 40 million voters due to unpatched vulnerabilities in their Microsoft Exchange Server, spanning registrations from 2014 to 2022. Hackers accessed the server through known ProxyShell vulnerabilities in August and October 2021, installing malware and sending spam before the issues were detected and partially mitigated. The ICO investigation […]
A UK national, Joseph James O’Connor, has pleaded guilty to his involvement in the July 2020 Twitter hack that targeted numerous high-profile accounts and defrauded users of the platform. O’Connor and his co-conspirators seized control of 130 Twitter accounts, including those belonging to Barack Obama, Bill Gates, and Elon Musk, to perpetrate a cryptocurrency scam […]
Irish university MTU Cork has decided to close all four campuses for two days and cancel all classes due to an intrusion into its IT systems. The attack took place last weekend and would have been detected at an early stage. The university gives no details about what kind of attack it is exactly and […]
Twilio, which earlier this month became a sophisticated phishing attack, disclosed last week that the threat actors also managed to gain access to the accounts of 93 individual users of its Authy two-factor authentication (2FA) service.
Propietary software and technical information stolen of LastPass. No effects according to LastPass on 33 million active end-users and more than 100.000 businesses. LastPass says to update customers with transparency. Up2now LastPass didn’t elaborate on the exact mitigation techniques that it used to strengthen its environment. It also reiterated that the break-in had no impact […]
Cisco confirmed it was the victim of a cyberattack on May 24, 2022 after the attackers got hold of an employee’s personal Google account that contained passwords synced from their web browser.“Initial access to the Cisco VPN was achieved via the successful compromise of a Cisco employee’s personal Google account” “The user had enabled password […]
Cloud communications company Twilio says some of its customers’ data was accessed by attackers who breached internal systems after stealing employee credentials in an SMS phishing attack.
Nearly 8,000 digital wallets have been drained of just over $5.2 million in digital coins including solana’s sol token and USD Coin (USDC), according to blockchain analytics firm Elliptic. Engineers from multiple ecosystems, with the help of several security firms, are investigating drained wallets on solana. The suggestion is that there must have been some […]
Hackers are constantly monitoring software vendor bulletin boards for new vulnerability announcements they can leverage for initial access to a corporate network or to perform remote code execution. So how do you manage your vulnerabilities on a periodic basis?
- 1
- 2