Tag: data-breach
-
A pickle in Meta’s LLM code could allow RCE attacks
Tags: ai, attack, breach, cve, cvss, data, data-breach, exploit, flaw, framework, github, LLM, malicious, ml, network, open-source, rce, remote-code-execution, software, supply-chain, technology, theft, vulnerabilityMeta’s large language model (LLM) framework, Llama, suffers a typical open-source coding oversight, potentially allowing arbitrary code execution on servers leading to resource theft, data breaches, and AI model takeover.The flaw, tracked as CVE-2024-50050, is a critical deserialization bug belonging to a class of vulnerabilities arising from the improper use of the open-source library (pyzmq)…
-
Change Healthcare Data Breach Impact Grows to 190 Million Individuals
The impact of the Change Healthcare ransomware-caused data breach has increased from 100 million to 190 million individuals. The post Change Healthcare Data Breach Impact Grows to 190 Million Individuals appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/change-healthcare-data-breach-impact-grows-to-190-million-individuals/
-
TalkTalk investigating data breach after hacker claims theft of customer data
A hacker claims to be selling the data of 18.8 million TalkTalk customers, but the telecoms giant says this figure is ‘significantly overstated’ First seen on techcrunch.com Jump to article: techcrunch.com/2025/01/27/talktalk-investigating-data-breach-after-hacker-claims-theft-of-customer-data/
-
Researchers Exploited Windows Charset Conversion Feature to Execute Remote Code
Researchers have exposed a systemic vulnerability within the Windows operating system, leveraging its >>Best-Fit>Best-Fit
-
Cybersecurity needs women, and it needs to treat them better
Tags: cio, ciso, computer, cyber, cyberattack, cybersecurity, data-breach, group, healthcare, jobs, service, skills, technology, trainingThe participation of women in cybersecurity is vital, a non-negotiable proposition. Forget any current handwringing over diversity and equity; it’s fundamental that the contribution of women to the profession has made cybersecurity better.The proverbial door was kicked open long ago for women, who have made major contributions to the development of information security. But it’s…
-
Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed
In this episode, we discuss the latest issues with data brokers, focusing on a breach at Gravy Analytics that leaked 30 million location data points online. We also explore a vulnerability in Subaru’s Starlink system that allows unrestricted access to vehicle controls and customer data using just a last name and license plate number. Co-host……
-
Innovative Approaches to Secrets Scanning
Is Traditional Cybersecurity Enough in the Age of Automation? Imagine this. You’re in charge of your company’s cybersecurity, and you’ve invested in the best protection money can buy. But a data breach happens, and you’re left wondering where things went wrong. Could the intrusion have been prevented? Is there a better way to safeguard your……
-
Data breach hitting PowerSchool looks very, very bad
Schools are now notifying families their data has been stolen. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/01/students-parents-and-teachers-still-smarting-from-breach-exposing-their-info/
-
Subaru Security Flaws Exposed Its System for Tracking Millions of Cars
Now-fixed web bugs allowed hackers to remotely unlock and start millions of Subarus. More disturbingly, they could also access at least a year of cars’ location histories”, and Subaru employees still can. First seen on wired.com Jump to article: www.wired.com/story/subaru-location-tracking-vulnerabilities/
-
Rails Apps Arbitrary File Write Vulnerability Let Attackers Execute Code Remotely
A newly exposed vulnerability in Ruby on Rails applications allows attackers to achieve Remote Code Execution (RCE) through a flaw that permits arbitrary file writing. This vulnerability, which leverages the Rails libraryBootsnap, underscores the critical importance of secure file handling in web applications. What Happened? A case study, shared by security researchers, demonstrated how an…
-
WordPress Plugin Vulnerability Exposes 23k+ Websites to Hacking
Researchers from Patchstack have warned that over 23,000 real estate websites using the popular RealHomes WordPress theme and its bundled Easy Real Estate plugin are exposed to critical security vulnerabilities. These vulnerabilities allow unauthenticated attackers to escalate privileges, take over administrator accounts, and compromise websites. Let’s dive into the technical details of these vulnerabilities and…
-
Zendesk’s Subdomain Registration Exposed to Phishing, Pig Butchering Scams
CloudSEK uncovers a Zendesk vulnerability allowing cybercriminals to exploit subdomains for phishing and investment scams. Learn about the… First seen on hackread.com Jump to article: hackread.com/zendesk-subdomain-registration-abused-phishing-scams/
-
How to Handle Secrets at the Command Line [cheat sheet included]
Developers need to prevent credentials from being exposed while working on the command line. Learn how you might be at risk and what tools and methods to help you work more safely. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/how-to-handle-secrets-at-the-command-line-cheat-sheet-included/
-
PowerSchool data breach brings claims of negligence, poor cyber hygiene
The K-12 software company is facing legal pushback and criticism following a cyberattack that impacted a still unknown number of districts. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/powerschool-data-breach-lawsuits-negligence/737961/
-
What PowerSchool isn’t saying about its ‘massive’ student data breach
The hack has the potential to be one of the biggest of the year, but the edtech giant is refusing to answer important questions First seen on techcrunch.com Jump to article: techcrunch.com/2025/01/22/what-powerschool-isnt-saying-about-its-massive-student-data-breach/
-
Datenleck bei North Pole Company Canada
Nächstes (bisher vom Unternehmen noch unbestätigtes) Datenleck. Bei der North Pole Company Canada hat es ein Datenleck gegeben, bei dem die Daten von 500.000 Benutzern öffentlich abrufbar waren. Die könnten nun der Gefahr ausgesetzt sein, Opfer von Phishing, Betrug und … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/01/21/datenleck-bei-north-pole-company-canada/
-
HPE Investigates After Alleged Data Breach
The company reports that it is not experiencing any operational issues within its business, so far. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/hpe-investigates-alleged-data-breach
-
Three Keys to Modernizing Data Security: DSPM, AI, and Encryption
Tags: access, ai, automation, best-practice, business, cloud, compliance, container, control, cyber, cybercrime, data, data-breach, detection, encryption, GDPR, incident response, infrastructure, privacy, regulation, risk, saas, security-incident, skills, software, strategy, threat, tool, vulnerabilityThree Keys to Modernizing Data Security: DSPM, AI, and Encryption andrew.gertz@t“¦ Tue, 01/21/2025 – 14:56 Organizations worldwide face a “perfect storm” of increasing and ever-evolving cyber threats. Internal and external factors are at play, elevating cyber risks and their consequences and mandating new approaches to safeguard data. A recent study based on responses from over…
-
Disciplinary and special ed records of Toronto students may have leaked in PowerSchool breach
The data breach at the educational software company may affect millions of students at Toronto public schools, one of thousands of districts using PowerSchool tools. ]]> First seen on therecord.media Jump to article: therecord.media/disciplinary-special-records-toronto-powerschool
-
Over 240K Willow Pays records leaked by unsecured database
Tags: data-breachFirst seen on scworld.com Jump to article: www.scworld.com/brief/over-240k-willow-pays-records-leaked-by-unsecured-database
-
Toronto school district says 40 years of student data stolen in PowerSchool breach
Canada’s largest school board says hackers may have accessed some 40 years’ worth of student data during the recent PowerSchool breach. In a letter sent to parents this week, the Toronto District School Board (TDSB) said that the data breach affected all students enrolled in the district between September 1985 and December 2024. The school…
-
Students, Educators Impacted by PowerSchool Data Breach
PowerSchool says the personal information of students and educators was stolen in a December 2024 data breach. The post Students, Educators Impacted by PowerSchool Data Breach appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/students-educators-impacted-by-powerschool-data-breach/
-
7 top cybersecurity projects for 2025
Tags: access, advisory, ai, backup, best-practice, breach, business, cio, ciso, cloud, compliance, control, cyber, cybersecurity, data, data-breach, detection, encryption, framework, google, governance, infrastructure, intelligence, law, mitigation, monitoring, network, resilience, risk, risk-management, service, strategy, technology, threat, tool, vulnerabilityAs 2025 dawns, CISOs face the grim reality that the battle against cyberattackers never ends. Strong and carefully planned cybersecurity projects are the best way to stay a step ahead of attackers and prevent them gaining the upper hand.”Urgency is the mantra for 2025,” says Greg Sullivan, founding partner of cybersecurity services firm CIOSO Global.…

