LeakBase: India Swachhata Platform Breached, 16 Million User PII Records Exposed
Data samples contain email addresses, hashed passwords and user IDs, other PII
Cyber NewsData samples contain email addresses, hashed passwords and user IDs, other PII
Cyber News2,700 cybersecurity career pursuers have already passed the (ISC)2 Certified in Cybersecurity℠ exam, with more than 53,000 more people registered for a free course and exam.
Cyber NewsEvery year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or in data dumps shared by cybercriminals. These credentials are often used for account takeover attacks, exposing organizations to breaches, ransomware, and data theft. While CISOs are aware of growing identity threats and have multiple tools in their […]
Cyber NewsA new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing emails to trigger a multi-stage infection process designed to deploy an unknown payload on compromised machines. The highly-targeted intrusions, dubbed STEEP#MAVERICK by Securonix, also targeted a strategic supplier to the F-35 Lightning II fighter aircraft. “The attack was carried out
Cyber NewsOrganizations looking to get ahead in cloud security have gone down the path of deploying CSPM tooling with good results. Still, there’s a clear picture that data security and security operations are next key areas of interest.
Cyber NewsACM.65 Yes, you need a VPC. This is a continuation of my series on Automating Cybersecurity Metrics. I used to say when I was a lead developer at Capital One that communication was the hardest part of my job. Writing the code was the easy part. Sometimes I think I explain things clearly and then people […]
Cyber NewsBugs in Canon Medical’s Virea View could allow cyberattackers to access several sources of sensitive patient data.
Cyber NewsCall it cross-border enlightened self-interest: As one of the US’s premier trade partners and closest neighbors, what’s bad for Mexico is bad for the US.
Cyber NewsSeveral hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran to bypass regime censorship restrictions amid ongoing unrest in the country following the death of Mahsa Amini in custody. “Key activities are data leaking and selling, including officials’ phone numbers and emails, and maps of sensitive locations,” Israeli cybersecurity firm Check Point said in
Cyber News