Category

Blog
School systems in Monroe, Morehouse Parish, and Sabine Parish, were impacted by the ransomware attacks.The state has hired cybersecurity experts from the Louisiana National Guard, Louisiana State Police, and the Office of Technology Services in order to resolve and prevent cyberattacks. Louisiana Governor John Bel Edwards has issued an emergency declaration on July 24, 2019,...
Read More
Slack is resetting roughly 100,000 user passwords for accounts that were active in 2015. The company has only recently learned that an old security breach from four years ago was perhaps worse than previously thought. The news, first reported by ZD Net and confirmed by Slack in an announcement on its website, will only affect about 1...
Read More
“The cloud? Sure, we’re in the cloud. We ported our on-prem solution to a virtual machine.” Heard that from your network hardware vendor recently? Don’t blame Jane Salesperson. She’s been selling appliances for years. It’s what she knows. It’s what she’s commissioned on. For her, and for the appliance company for which she works, the cloud...
Read More
A phishing attack using a novel technique to steal credentials from American Express customers was recently found in an email inbox protected using Microsoft’s Office 365 Advanced Threat Protection (ATP) by Cofense Phishing Defense Center researchers. The phishing campaign targeted both corporate and consumer cardholders with phishing emails full of grammatical errors but with a small but...
Read More
US mobile network operator Sprint said hackers broke into an unknown number of customer accounts via the Samsung.com “add a line” website. “On June 22, Sprint was informed of unauthorized access to your Sprint account using your account credentials via the Samsung.com ‘add a line’ website,” Sprint said in a letter it is sending impacted customers....
Read More
97% of all email users do not know what a phishing email looks like. 21% of all ransomware is sent through email and 92% of all malware is sent through emails. The average financial cost of a data breach is $3.86m. Email phishing is a very dangerous and also very common way for cyber criminals...
Read More
The AWS database was exposed on the internet for several years until it was secured on July 1, 2019.The compromised data included users’ full names, birth dates, genetic health information, and other medical conditions. A misconfigured Amazon Web Services (AWS) database had left more than 3,000 client health reports exposed to the internet for several...
Read More
Apple has disabled the Walkie Talkie app from its Apple Watch products after a vulnerability was discovered enabling bad actors to eavesdrop on iPhone conversations. Apple has temporarily disabled the Walkie-Talkie feature from the Apple Watch due to a vulnerability that could allow potential attackers to eavesdrop in on iPhone calls, a TechCrunch report said....
Read More
The data breach occurred after Nemadji Research Corporation, a contractor of the L.A. County Department of Health Services fell victim to a phishing attack in March 2019.The exposed data includes patient names, addresses, dates of birth, medical record numbers and Medi-Cal identification numbers. Almost 14,591 patients who received medical care through Los Angeles County’s hospitals...
Read More
The server contained source code, passwords, configuration details, and other sensitive information related to GE Aviation’s internal infrastructure.It was one of the 5,495 publicly available Jenkins instances as indexed by Shodan. A publicly available Jenkins server of GE Aviation was found spilling sensitive data out in the open. Security researcher Bob Diachenko came across this...
Read More
1 2 3 4 12