Cyberattack Disrupts Operations of First American, Subsidiaries
Several individuals have complained on social media about financial losses indirectly resulting from the downtime, as well as the company’s handling of the incident and communication with customers.
@Cyber_Security_Channel
Hacker Steals US$30 000 From Premier Tobacco Auction Floors
Prosecutor Grace Mugocheki further alleged that on 04 April, Mutasa hacked the complainant’s Steward Bank account and transferred US$20 000 into the accounts that he had opened.
As a result, the complainant suffered an actual prejudice of US$30 000.
@Cyber_Security_Channel
Google Cloud’s Cybersecurity Predictions of 2024 and Look Back at 2023
Most ransomware attacks initially stemmed from stolen credentials.
Brute force attacks and phishing were the next most common initial infection vectors for ransomware.
@Cyber_Security_Channel
The Latest Data Breach that Compromised Customer Information Has Been Confirmed by Mint Mobile
Mint Mobile disclosed the details of the compromised customer data, which includes names, phone numbers, SIM and IMEI numbers, and a brief description of the customer’s current plan.
Fortunately, sensitive information such as passwords, social security numbers, and credit card details were reportedly not part of the breach.
However, the breach does raise concerns about potential spam messages and calls targeting affected Mint Mobile customers.
@Cyber_Security_Channel
BSNL Data Breach: Hacker 'Perell' Sells Stolen User Data on Dark Web, Posing Serious Risks
BSNL, a prominent Indian telecom operator, is grappling with a significant data breach.
The hacker 'Perell' claims to have obtained approximately 2.9 million lines of sensitive user data, including details of users using fibre and landline connections.
@Cyber_Security_Channel
💎 This is a Gem for Every Start-Up and Business that Wants to Improve Their Cyber Security Posture!
↳ Our partner’s Notion ISMS is your all-in-one solution for efficient Information Security Management according to ISO 27001:2022.
What Do You Get?
The following templates are included in the bundle:
1. Audit
2. Measures
3. Reporting
4. Awareness
5. Security Incidents
6. Risk Management
7. Threat Intelligence
8. Context & Planning
9. Supplier Management
10. Implementation Roadmap
11. ISO 27001 Self-Assessment
12. Information Security Policies
With This System You Can:
- Meet stakeholder requirements
- Assure the security of your information
- Optimize your business processes all at once
Achieving ISO 27001 certification can become hassle-free with Notion ISMS!
🤩 Get lifetime access and secure a peaceful 2024 year for your business:
→ https://gumroad.com/a/792215507/qqkfpn
FBI disrupts Blackcat Ransomware Operation, Creates Decryption Tool
With this access, the FBI silently monitored the ransomware operation for months while siphoning decryption keys.
These decryption keys allowed the FBI to help 500 victims recover their files for free, saving approximately $68 million in ransom demands.
@Cyber_Security_Channel
What Australia’s Digital ID Means to How Citizens Interact With Businesses Online
The Digital ID is the cumulation of a five-year, AUD $200 million (USD $134.18 million) investment as an effort to alleviate security concerns over the amount of data Australians give to companies to prove who they are online.
@Cyber_Security_Channel
🎄 The Cyber Security News Team would like to wish you a Merry Christmas and a wonderful holiday season!
This magical time of year brings a special chance to pause and admire the joys around us.
Now is the ideal moment to appreciate all the great memories we have made, and to reflect on the experiences and adventures that we encountered.
We hope that your festive time period is filled with happiness, laughter and valuable time with friends and family =)
Have a great day and cherish the upcoming celebrations!
@Cyber_Security_Channel
🎁👀 Cyber Security Christmas Gift Ideas — Special Collection Curated by the Cyber Security News Community!
Are You Actively Searching for Some Last Minute Christmas Gifts?
We know, finding the right gift is not an easy task...
But you are in the right place to end the hassle and make your loved ones happy during this holiday season =)
To commemorate the upcoming festivities, Cyber Security News has put together a collection of Cyber Security related gifts to pick up for:
- Industry colleagues
- Friends
- Family
🎅 This guide aims to provide you with inspiration and simplify the process of selecting the perfect gift for Christmas or the New Year's celebration.
🌲 Here is the link to the full collection:
→ https://linktr.ee/cybersecuritynews
Parliament Security Breach Serious Issue, Everyone Should Avoid Squabbling Over It: PM Modi
In his first remarks since the December 13 incident, PM Modi said the Parliament security breach is painful and a matter of concern.
He called for no squabbling over the issue amid the opposition's protests over it in Parliament.
@Cyber_Security_Channel
Delta Dental Says Data Breach Exposed 7 Million Customers
In an incident notice posted on its website, Delta Dental says it was alerted of the MOVEit hack on June 1, and that its investigation determined in July that the attackers had access to its information on the service between May 27 and May 30.
@Cyber_Security_Channel
LogoFAIL – Critical UEFI Vulnerabilities Exposes Devices to Stealthy Malware Attack
The impact of these flaws spans multiple vendors and ecosystems, especially affecting IBVs (Independent BIOS vendor) reference code.
LogoFAIL affects both x86 and ARM devices, focusing on UEFI and IBV due to vulnerable image parsers.
@Cyber_Security_Channel
Ten Years Later, New Clues in the Target Breach
That reporting was based on clues from an early Russian cybercrime forum in which a hacker named Rescator — using the same profile image that Rescator was known to use on other forums — claimed to have originally been known as “Helkern,” the nickname chosen by the administrator of a cybercrime forum called Darklife.
@Cyber_Security_Channel
Hershey Data Breach Affects Thousands With Company Emails
Hershey has also taken steps to improve its data security going forward, including by forcing password changes and implementing additional detection safeguard into its “corporate email environment,” according to its letter.
@Cyber_Security_Channel
Burlington, Ont., Recovers Most of $500K lost in 2019 Phishing Scam
Last month, it recovered $100,000 of the lost money, following criminal court proceedings against one person connected with the fraud, according to a Dec. 6 report to the city's audit committee from Justyna Boroch Hidalgo in Burlington's legal department.
The money was paid back to city as part of a plea negotiation.
@Cyber_Security_Channel
Chameleon Android Malware Can Bypass Biometric Security
Employing a proxy feature and abusing Accessibility Services, it could perform actions on behalf of the victim, allowing attackers to engage in Account Takeover (ATO) and Device Takeover (DTO) attacks, mainly targeting banking and cryptocurrency applications.
@Cyber_Security_Channel
2️⃣0️⃣2️⃣4️⃣ Happy New Year from the Cyber Security News Team!
We would like to say thank you for supporting our community throughout the year of 2023.
Together we have managed to reach important milestones and expand our professional networks even further.
♥️ We are grateful for all the members, partners and supporters that engaged with our content, purchased digital products and showed love to our channels =)
Our team hopes that all the content on this channel was useful and enjoyable for you.
We are planning to diligently continue our mission next year, and are always open to your feedback!
Thank you once again, and see you in the New Year of 2024!
@Cyber_Security_Channel 🎅🏻
😏🎁 Looking for an Original New Year's Gift?
To simplify your research, we have put together our Top 3 Recommendations Guide:
🛠 #1 — HACKPROOF: How to Beat Fraudsters, Prevent Identity Theft, and Say Goodbye to Cybercrime
→ https://gumroad.com/a/468645587/hnoppk
💻 #2 — JavaScript | Programming Notes and Flashcards
→ https://gumroad.com/a/94518995/hppst
🔓 #3 — Unlocking DevOps: From Beginners to Advanced | Hands-On Projects for Complete Mastery
→ https://gumroad.com/a/621772755/yjlec
🚨Special 50% SALE Offer — CareerSec: Securing Your Advancement in the Cyber Workforce
↳ https://gumroad.com/a/570834643/hhdcg
-----
You can find 30+ more Present Ideas here.
The list has been compiled by the Cyber Security News Team, and contains digital products from our trusted partners.
Enjoy the Holiday Shopping!
-----
Have questions or a specific request?
📮Contact us: @cybersecadmin
@Cyber_Security_Channel
Comcast’s Xfinity Discloses Massive Data Breach Linked to CitrixBleed Vulnerability
After launching an investigation and contacting law enforcement, on Nov. 16 the company determined that customer data was likely stolen.
On Dec. 6, Xfinity determined the compromised data included user names and hashed passwords.
In some cases, names, contact information, the last four digits of Social Security numbers, dates of birth and secret questions and answers were accessed.
@Cyber_Security_Channel
Sony's Insomniac Games Leaked by Rhysida Ransom Gang
Insomniac Games is an American video game developer based in Burbank, California.
The company became part of PlayStation Studios after Sony Interactive Entertainment acquired it for $229 million in 2019.
@Cyber_Security_Channel
12 Essential Steps Mac Users Need To Take At Year End
After ensuring your Mac’s files are properly backed up, confirm the Mac itself is operating properly.
Using an Apple silicon Mac, run Apple Diagnostics by pressing and holding the Mac’s power button until you see the Options icon display on screen, then release the power button and press and hold both the Command and D keys.
@Cyber_Security_Channel
BlackCat Ransomware Raises Ante After FBI Disruption
“With a decryption tool provided by the FBI to hundreds of ransomware victims worldwide, businesses and schools were able to reopen, and health care and emergency services were able to come back online,” Deputy Attorney General Lisa O. Monaco said.
“We will continue to prioritize disruptions and place victims at the center of our strategy to dismantle the ecosystem fueling cybercrime.”
@Cyber_Security_Channel
10 Tips For Cultivating Security Awareness In 2024
The key to robust security lies in what employees know (and are trained to know), the technology at their disposal and how they behave.
This perspective shifts the focus to a vital but often overlooked aspect of cybersecurity: human behavior.
@Cyber_Security_Channel
As the SEC’s New Data Breach Disclosure Rules Take Effect, Here’s What You Need to Know
In an 8-K filing, breached organizations must describe the incident’s nature, scope, timing and material impact, including financial and operational.
Notably, the regulation does not require companies to disclose any information “regarding the incident’s remediation status, whether it is ongoing, and whether data were compromised,” as this could compromise ongoing recovery efforts.
@Cyber_Security_Channel
MongoDB Confirms Hack, Says Customer Data Stolen
In a notice to customers, MongoDB Chief Information Security Officer Lena Smart said the company was not aware of any exposure to the data that customers store in its flagship MongoDB Atlas product.
@Cyber_Security_Channel
U.S. Nuclear Research Lab Data Breach Impacts 45,000 People
While the laboratory is still investigating the incident's full impact, it said that multiple forms of sensitive personally identifiable information (PII) was affected, including names, social security numbers, salary information, and banking details.
@Cyber_Security_Channel
Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware
The website employs filtering mechanisms to assess whether the subsequent phase of the attack should be initiated.
If the criteria for filtering are not met, the user is presented with a plain text resume. If the filtering checks are successfully passed, the user is redirected to the candidate website, where they are prompted to solve a CAPTCHA.
@Cyber_Security_Channel
Red Roof Announces Data Breach
The breach did not involve any Red Roof guest data.
Red Roof determined that the categories of personal information in the copied data included, but were limited to, name, date of birth, social security number, driver's license number, passport number, financial account number, credit and/or debit card number, medical information and health insurance information.
@Cyber_Security_Channel
Apple Study Shows 2.6 Billion Personal Records Hit by Data Breaches in Two Years
The most obvious reason is that it guarantees the security and privacy of content being shared between users.
But this is not just limited to regular users: businesses can also largely benefit from E2EE, as it can protect sensitive data and information such as financial and legal documents.
@Cyber_Security_Channel