DataBreachToday.com
D-Link Botnet Attacks Surge in Global Spike
5 months 2 weeks ago
Mirari and Kaiten Botnet Variants Exploit Unpatched Routers
Attackers exploiting nearly decade-old D-Link router vulnerabilities drove a sharp rise in botnet activity in 2024 through variants of the Mirari and Kaiten taking advantage of unpatched devices. Operators of botnets known as Ficora and Capsaicin exploit nearly decade-old flaws.
Attackers exploiting nearly decade-old D-Link router vulnerabilities drove a sharp rise in botnet activity in 2024 through variants of the Mirari and Kaiten taking advantage of unpatched devices. Operators of botnets known as Ficora and Capsaicin exploit nearly decade-old flaws.
Ransomware Group Hits Substance Abuse Treatment Service
5 months 2 weeks ago
American Addiction Centers Says 422,424 Individuals' Private Details Exposed
Substance abuse treatment company American Addiction Centers is warning nearly half a million patients that ransomware-wielding attackers stole their personal details, including names and Social Security numbers. The Rhysida ransomware operation claimed to perpetrate the attack.
Substance abuse treatment company American Addiction Centers is warning nearly half a million patients that ransomware-wielding attackers stole their personal details, including names and Social Security numbers. The Rhysida ransomware operation claimed to perpetrate the attack.
Feds Identify Ninth Telecom Victim in Salt Typhoon Hack
5 months 2 weeks ago
Officials Say Chinese Hackers Maintained 'Broad and Full' Access to Telecom Systems
Federal officials told reporters Friday that ongoing investigations into the Salt Typhoon cyberespionage campaign have identified a ninth victim company affected by the attack, in which hackers maintained "broad and full" access to vulnerable communications infrastructure across the country.
Federal officials told reporters Friday that ongoing investigations into the Salt Typhoon cyberespionage campaign have identified a ninth victim company affected by the attack, in which hackers maintained "broad and full" access to vulnerable communications infrastructure across the country.
US Finalizes Rule Throttling Bulk Data Sales to China
5 months 2 weeks ago
Rule Aims to Stymie Weaponization of Americans' Data
The U.S. federal government finalized Friday regulations throttling the bulk commercial transfer to China and Russia of data pinpointing Americans' location, their health data, or biometric and genomic identifiers. The rule implements a February executive order from President Joe Biden.
The U.S. federal government finalized Friday regulations throttling the bulk commercial transfer to China and Russia of data pinpointing Americans' location, their health data, or biometric and genomic identifiers. The rule implements a February executive order from President Joe Biden.
Contingency Planning for Attacks on Critical Third Parties
5 months 2 weeks ago
One of the most important lessons emerging in 2024 for the healthcare sector is that entities should diligently prepare contingency plans for potential cyberattacks that seriously disrupt their critical third-party vendors, advises regulatory attorney Betsy Hodge of the law firm Akerman.
Cryptohack Roundup: FBI Fingers TraderTraitor for $308M Hack
5 months 2 weeks ago
Also: Bitfinex Hacker Lichtenstein's Social Media Post From Prison
This week's stories include updates on hackers in the DMM Bitcoin and Bitfnex cases, South Korea sanctioning North Korean hackers, Trump naming an exec director for Digital Assets Council, Craig Wright's prison sentence and the Interpol's red notice for Hex founder.
This week's stories include updates on hackers in the DMM Bitcoin and Bitfnex cases, South Korea sanctioning North Korean hackers, Trump naming an exec director for Digital Assets Council, Craig Wright's prison sentence and the Interpol's red notice for Hex founder.
Year In Review: Australia Expands Cyber Regulation
5 months 2 weeks ago
2024 Marked the Government's Increasing Role Mandating Cybersecurity
Australia announced a flurry of cybersecurity legislation and regulations in 2024, spotlighting the government's intent to fortify the nation's cybersecurity in the wake of the Medibank and Optus incidents. The government vowed to transform the country into the world's "most cyber-secure."
Australia announced a flurry of cybersecurity legislation and regulations in 2024, spotlighting the government's intent to fortify the nation's cybersecurity in the wake of the Medibank and Optus incidents. The government vowed to transform the country into the world's "most cyber-secure."
US Congress Authorizes $3B to Replace Chinese Telecom Gear
5 months 2 weeks ago
Federal 'Rip-and-Replace' Program Gets Funding Boost in Defense Bill
The 2025 National Defense Authorization Act includes $3 billion to fund an FCC program aimed at replacing Chinese-made telecommunications equipment across the country amid heightened threats from Beijing following the discovery of the Salt Typhoon cyberespionage campaign.
The 2025 National Defense Authorization Act includes $3 billion to fund an FCC program aimed at replacing Chinese-made telecommunications equipment across the country amid heightened threats from Beijing following the discovery of the Salt Typhoon cyberespionage campaign.
Finland Boards Tanker Suspected of Rupturing Undersea Cables
5 months 2 weeks ago
The 'Eagle S' Forms Part of Sanctions-Busting Russian Shadow Fleet, Says EU
Finnish police boarded Thursday an oil tanker suspected of rupturing telecommunications and electricity cables running beneath the Baltic Sea in a Christmas Day incident. They escorted the tanker, the Eagle S, into Finnish waters as part of a criminal investigation into damage caused on Wednesday.
Finnish police boarded Thursday an oil tanker suspected of rupturing telecommunications and electricity cables running beneath the Baltic Sea in a Christmas Day incident. They escorted the tanker, the Eagle S, into Finnish waters as part of a criminal investigation into damage caused on Wednesday.
Cybersecurity Resolutions: Skill Sets to Prioritize in 2025
5 months 2 weeks ago
Key Focus Areas for Cybersecurity Professionals in 2025
As we enter 2025, the cybersecurity landscape demands more than just maintaining the status quo. New threats, evolving technologies, and heightened regulatory scrutiny require professionals to set clear resolutions that sharpen their abilities and expand their impact.
As we enter 2025, the cybersecurity landscape demands more than just maintaining the status quo. New threats, evolving technologies, and heightened regulatory scrutiny require professionals to set clear resolutions that sharpen their abilities and expand their impact.
Demystifying Cyber Resilience: Building a Robust Defense
5 months 2 weeks ago
InfoSec Officer Shervin Evans on Preparing Organizations to Withstand Cyberthreats
Cyber resilience takes a broader approach, emphasizing the ability to withstand, recover and adapt to cyber incidents. The article explains the key components of cyber resilience, its importance and how organizations can implement it to build stronger defenses.
Cyber resilience takes a broader approach, emphasizing the ability to withstand, recover and adapt to cyber incidents. The article explains the key components of cyber resilience, its importance and how organizations can implement it to build stronger defenses.
How Will Health Data Privacy, Cyber Regs Shape Up in 2025?
5 months 2 weeks ago
Washington and Nevada were among states enacting new data privacy laws in 2024, and that trend among states will likely continue into 2025 as the next presidential administration comes into office promising to reduce federal regulations, said attorney Melissa Crespo of law firm Morrison Foerster.
Why Cloud Identity Attacks Outpace On-Premises Risks
5 months 2 weeks ago
Blackpoint Cyber CEO Jon Murchison on MSP Cloud Identity Risks
With a 30-to-1 ratio of cloud to on-premises attacks, Blackpoint Cyber CEO Jon Murchison stresses the importance of enhanced identity detection and AI-driven solutions. He also outlines strategic moves for managed service providers to align with Microsoft’s ecosystem.
With a 30-to-1 ratio of cloud to on-premises attacks, Blackpoint Cyber CEO Jon Murchison stresses the importance of enhanced identity detection and AI-driven solutions. He also outlines strategic moves for managed service providers to align with Microsoft’s ecosystem.
Online Extortion Gang Clop Threatens Cleo Hacking Victims
5 months 2 weeks ago
Cybercriminals Say They Hacked 66 Companies
The Clop cybercriminal group is threatening to make public the companies swept up by its mass hacking of managed file-transfer software built by Cleo Communications. In a Dec. 24 update to its dark web leak site, Clop asserted it has "data of many companies who use Cleo."
The Clop cybercriminal group is threatening to make public the companies swept up by its mass hacking of managed file-transfer software built by Cleo Communications. In a Dec. 24 update to its dark web leak site, Clop asserted it has "data of many companies who use Cleo."
Unpacking OpenAI's Latest Approach to Make AI Safer
5 months 2 weeks ago
New Framework in o3 Models Aims to Better Align With Human Safety Values
OpenAI says its latest o3 series is the most advanced and safest of its "reasoning" AI models yet. The company says the new models take a fresh approach to safety via the deliberative alignment framework, rely more on synthetic data and outperform peers in resisting jailbreaking efforts.
OpenAI says its latest o3 series is the most advanced and safest of its "reasoning" AI models yet. The company says the new models take a fresh approach to safety via the deliberative alignment framework, rely more on synthetic data and outperform peers in resisting jailbreaking efforts.
Why Hackers Love Weekend and Holiday Attacks
5 months 2 weeks ago
About 75% of healthcare sector entities that suffered a ransomware attack over the past year were targeted on a weekend or holiday, highlighting the need for organizations to bolster staffing and related strategies during these vulnerable times, said Jeff Wichman of security firm Semperis.
Why Hackers Love Weekend and Holiday Attacks (Jeff Wichman)
5 months 3 weeks ago
About 75% of healthcare sector entities that suffered a ransomware attack over the past year were targeted on a weekend or holiday, highlighting the need for organizations to bolster staffing and related strategies during these vulnerable times, said Jeff Wichman of security firm Semperis.
North Korean Hackers Tied to $1.3B in Stolen Crypto in 2024
5 months 3 weeks ago
Researchers Trace 61% of Known Losses This Year to Pyongyang-Backed Hackers
Hackers tied to North Korea's cash-strapped totalitarian dictatorship this year stole a record amount of cryptocurrency, totaling $1.34 billion across 47 incidents, or about double their known haul for 2023, reported blockchain analytics firm Chainalysis.
Hackers tied to North Korea's cash-strapped totalitarian dictatorship this year stole a record amount of cryptocurrency, totaling $1.34 billion across 47 incidents, or about double their known haul for 2023, reported blockchain analytics firm Chainalysis.
Turmoil Besets Phishing-as-a-Service Toolkit Rockstar 2FA
5 months 3 weeks ago
Infrastructure Problems Blamed; Users Appear to Move to Similar FlowerStorm Service
As the end of the year approaches, it's out with the old and in with the new as researchers report that Rockstar 2FA, which once facilitated prolific phishing-as-a-service hits, has crashed and burned, apparently leading many one-time users to move to rival FlowerStorm.
As the end of the year approaches, it's out with the old and in with the new as researchers report that Rockstar 2FA, which once facilitated prolific phishing-as-a-service hits, has crashed and burned, apparently leading many one-time users to move to rival FlowerStorm.
Checked
4 hours 31 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed