Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Volkswagen Data Brea ...

 Security

The data was collected for sales and marketing purposes between 2014 and 2019 and was stored in an electronic file that a vendor left unprotected, says NBC News.  According to Volkswagen North American, more than 3.3 million customers and prospective buyers have been affected by a data leak at a supplier.   The   show more ...

majority of those affected were current or potential Audi customers, one of the German automaker's luxury brands.   Volkswagen Group of America said Friday that an unauthorized third party obtained limited personal information about customers and prospective buyers from a vendor used by the Audi Volkswagen brand along with some U.S. and Canadian dealers for digital sales and marketing. Only a few clients' phone numbers and email addresses were compromised  According to the company, the vast major... (read more)

image for Spy Agency Chief War ...

 Security

According to the head of cybersecurity at GCHQ, ransomware is the biggest cybersecurity threat to most people and organizations in the UK, says The Guardian.   Lindy Cameron, CEO of National Cyber Security Center, points out that the problem of hackers encrypting data and demanding cash for recovery is escalating and   show more ...

becoming more professionalized.   Cameron plans to tell the Rusi think tank on Monday that while Internet surveillance by Russia, China, and other hostile states remains a malign strategic threat, the ransomware epidemic has become increasingly pressing.  Cameron stated, “For the vast majority of UK citizens and businesses, and indeed for the vast majority of critical national infrastructure providers and government service providers, the primary key threat is not state actors but cybercriminals"... (read more)

image for Ransomware Struck Te ...

 Security

When Teamsters became the target of a ransomware attack on Labor Day 2019, hackers demanded a seven-figure ransom, says NBC News.   Unlike many other organizations that have been the target of high-profile ransomware attacks in recent months, the union refused to pay, according to three people familiar with the   show more ...

previously disclosed cyberattack.  "They locked down the entire system and said if we paid them they would give us the encryption code to unlock it," said one of the sources, who spoke to NBC News on condition of anonymity because they were not authorized to speak publicly about the incident.  Up to the present day, the union organization kept the hack hidden from the public. This points to a truth that cybersecurity experts believe lies beneath the surface of recent high-profile attacks: An unknown number of comp... (read more)

image for Minecraft

 Security

Minecraft fans are advised to exercise extreme caution when installing mods and add-ons for the game, according to Tech Radar.  Despite Minecraft being a well-known video game that continues to attract many new users, it is also a favorite target for the hacking community. In fact, Kaspersky researchers have recently   show more ...

noticed a huge increase in malicious malware hidden in Minecraft mods, on Google Play.   The malicious apps, masquerading as Minecraft mods, render the game unusable. However, they can also make tablet or smartphone inoperable due to an increase in unwanted and unnecessary advertisements.   Unfortunately, fake Minecraft mods spread like ... (read more)

image for McDonald

 Security

McDonald's Corp, the iconic fast-food restaurant, has been hit by a data breach leading to stolen in the United States, South Korea, and Taiwan.   The exact nature of the data breach has not been disclosed. According to Wall Street Journal, the leak includes certain business contact information of U.S. employees   show more ...

along with franchisees and restaurant information such as seating capacity and square footage.   Customer data from the United States was not leaked, but data from South Korea and Taiwan was. In Taiwan, the attack also resulted in the loss of personnel data, such as names and contact information.  McDonald’s said, "While we were able to close off access quickly after identification, our investigation has determined that a small number of files were accessed, some of which contained personal data".  The cyberattack was discovere... (read more)

image for Italy Sets Up Cybers ...

 Security

Following the warning that Europe needed to better protect itself from Russian meddling, Italy created a national cybersecurity organization, says Security Week.   The new agency was approved by the cabinet in an all-night meeting on Thursday.   The Italian government said in a statement that it must defend national   show more ...

interests along with the resilience of the state's services and critical activities from cyber threats.  Draghi noted on May 25 in Brussels that urgent action is needed to combat digital risks. Mario Draghi stated, "We need to strengthen ourselves, we need to strengthen ourselves a lot, especially in terms of cybersecurity, all of us, at national level and at EU level... because the level of Russian interference both with spies and with manipulation of the web has become truly alarming".  Earlier this year, investigators arre... (read more)

image for Cyberpunk 2077 Data  ...

 Security

Four months after a cyberattack on Witcher and Cyberpunk 2077, CD Projekt Red has admitted that employee and game-related data appears to be circulating in the cyber underground, according to Threat Post.  CD Projekt Red was the victim of a ransomware attack earlier this year, carried out by a cybercriminal group   show more ...

believed to be the HelloKitty gang.  The gaming developing company stated at the time that cybercriminals “gained access to our internal network, collected certain data belonging to CD PROJEKT Capital Group and left a ransom note".  The ransomware also encrypted the computers, but CD Projekt Red was able to restore everything from the backup, so the stolen data was the real problem.... (read more)

 Trends, Reports, Analysis

The email system is “totally safe and secure”, the IT ministry said while dismissing a report claiming that breaches at Air India, Big Basket, and Domino’s had exposed credentials of NIC emails.

 Trends, Reports, Analysis

During the pandemic, attackers targeted industries providing connectivity, services, and entertainment, resulting in a 341% year-over-year increase in DDoS attacks, according to Nexusguard.

 Breaches and Incidents

Sol Oriens, a subcontractor for the U.S. Department of Energy that works on nuclear weapons with the National Nuclear Security Administration (NNSA), was hit by a cyberattack by the REvil RaaS gang.

 Trends, Reports, Analysis

A report by Check Point Research revealed a 168% year-on-year surge in cyberattacks in APAC in 2021 as compared to May 2020. There has been a 53% rise in cyberattacks in APAC between April and May 2021 alone. This significant rise is largely attributed to unsecured work networks.

 Malware and Vulnerabilities

A massive trove of sensitive data has been discovered by researchers. This database consists of 1.2TB of login credentials, autofill data, browser cookies, and payment information extracted by a mysterious malware. The data was pulled from three million PCs between 2018 and 2020.

 Feed

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals   show more ...

to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

 Feed

Red Hat Security Advisory 2021-2405-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP   show more ...

service required to enable and administer DHCP on a network. Issues addressed include a buffer overflow vulnerability.

 Feed

Even as a massive data breach affecting Air India came to light the previous month, India's flag carrier airline appears to have suffered a separate cyber assault that lasted for a period of at least two months and 26 days, new research has revealed, which attributed the incident with moderate confidence to a Chinese nation-state threat actor called APT41. Group-IB dubbed the campaign "ColunmTK"

 Feed

A new cyber espionage group named Gelsemium has been linked to a supply chain attack targeting the NoxPlayer Android emulator that was disclosed earlier this year. The findings come from a systematic analysis of multiple campaigns undertaken by the APT crew, with evidence of the earliest attack dating back all the way to 2014 under the codename Operation TooHash based on malware payloads

 Feed

In response to malicious actors targeting US federal IT systems and their supply chain, the President released the "Executive Order on Improving the Nation’s Cybersecurity (Executive Order)." Although directed at Federal departments and agencies, the Executive Order will likely have a ripple effect through the Federal technology supply stream. Private companies and enterprises will look to the

 Feed

Google on Monday announced that it's rolling out client-side encryption to Google Workspace (formerly G Suite), thereby giving its enterprise customers direct control of encryption keys and the identity service they choose to access those keys. "With client-side encryption, customer data is indecipherable to Google, while users can continue to take advantage of Google's native web-based

 Guest blog

The head of the UK's National Cyber Security Centre has warned that ransomware has become the biggest threat to British people and businesses. And says ransomware gangs "are often enabled and facilitated by states acting with impunity." Read more in my article on the Tripwire State of Security blog.

2021-06
TUE
WED
THU
FRI
SAT
SUN
MON
JuneJulyAugust