Tag: data
-
Princeton University Confirms Data Breach Affecting Advancement Records
Princeton University has confirmed a breach of its Advancement database and is urging vigilance as investigators assess the exposed information. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/princeton-university-confirms-data-breach-affecting-advancement-records/
-
Can a Global, Decentralized System Save CVE Data?
As vulnerabilities in the Common Vulnerabilities and Exposures ecosystem pile up, one Black Hat Europe presenter hopes for a global, distributed alternative. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/can-global-decentralized-system-save-cve-data
-
WhatsApp Screen-Sharing Scam: How Attackers Are Deceiving Users to Expose Sensitive Information
Scams and threats circulating on messaging apps like WhatsApp demonstrate how easily trusted platforms can be weaponized against users. One deceptive tactic gaining traction involves tricking people into sharing their phone screens during WhatsApp video calls. The screen-sharing feature, available since 2023, is increasingly being turned against users to steal data, identities, and money. Cases…
-
Authorities Dismantle Thousands of Servers from Illicit Hosting Company Linked to Cyberattacks
In a landmark operation targeting cybercriminal infrastructure, the East Netherlands cybercrime team conducted a major takedown of a rogue hosting company suspected of facilitating a broad spectrum of malicious activities. During the coordinated enforcement action on November 12th, law enforcement seized approximately 250 physical servers located in data centers across The Hague and Zoetermeer. The…
-
WhatsApp Screen-Sharing Scam: How Attackers Are Deceiving Users to Expose Sensitive Information
Scams and threats circulating on messaging apps like WhatsApp demonstrate how easily trusted platforms can be weaponized against users. One deceptive tactic gaining traction involves tricking people into sharing their phone screens during WhatsApp video calls. The screen-sharing feature, available since 2023, is increasingly being turned against users to steal data, identities, and money. Cases…
-
Everest Ransomware Alleges Major Data Breach Targeting Under Armour
The alleged Everest ransomware breach could expose millions of Under Armour customers to serious security and privacy risks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/everest-ransomware-alleges-major-data-breach-targeting-under-armour/
-
Tenable Cloud Vulnerability Management: Reducing Vulnerability Risk in the Cloud Era
Tags: access, ai, api, attack, ciso, cloud, compliance, container, data, exploit, flaw, google, identity, infrastructure, intelligence, oracle, privacy, risk, risk-assessment, service, software, technology, threat, training, vulnerability, vulnerability-managementTenable has launched Tenable Cloud Vulnerability Management, a powerful new offering within Tenable One, to help vulnerability management leaders identify, prioritize, and remediate exposures across multi-cloud and hybrid environments. Key takeaways Agentless inventory and visibility: Achieve complete asset inventory and coverage across all existing virtual machines, virtual machine images and container images in AWS, Azure,…
-
Tenable Cloud Vulnerability Management: Reducing Vulnerability Risk in the Cloud Era
Tags: access, ai, api, attack, ciso, cloud, compliance, container, data, exploit, flaw, google, identity, infrastructure, intelligence, oracle, privacy, risk, risk-assessment, service, software, technology, threat, training, vulnerability, vulnerability-managementTenable has launched Tenable Cloud Vulnerability Management, a powerful new offering within Tenable One, to help vulnerability management leaders identify, prioritize, and remediate exposures across multi-cloud and hybrid environments. Key takeaways Agentless inventory and visibility: Achieve complete asset inventory and coverage across all existing virtual machines, virtual machine images and container images in AWS, Azure,…
-
Prioritizing Executive Security to Manage Risk
Executives and their families have become high-value targets for cyberthreats, and the risks now extend beyond the corporate network. As threat actors leverage easily accessible personal data, organizations face growing challenges in protecting senior leaders whose personal digital lives often fall outside traditional security controls. Techstrong Research polled our community of security, cloud and DevOps..…
-
NDSS 2025 Spatial-Domain Wireless Jamming With Reconfigurable Intelligent Surfaces
Tags: attack, control, data, infrastructure, Internet, network, service, technology, threat, vulnerability, wifiSESSION Session 3B: Wireless, Cellular & Satellite Security ———– ———– Authors, Creators & Presenters: Philipp Mackensen (Ruhr University Bochum), Paul Staat (Max Planck Institute for Security and Privacy), Stefan Roth (Ruhr University Bochum), Aydin Sezgin (Ruhr University Bochum), Christof Paar (Max Planck Institute for Security and Privacy), Veelasha Moonsamy (Ruhr University Bochum) ———– PAPER ———–…
-
Prioritizing Executive Security to Manage Risk
Executives and their families have become high-value targets for cyberthreats, and the risks now extend beyond the corporate network. As threat actors leverage easily accessible personal data, organizations face growing challenges in protecting senior leaders whose personal digital lives often fall outside traditional security controls. Techstrong Research polled our community of security, cloud and DevOps..…
-
French agency Pajemploi reports data breach affecting 1.2M people
Pajemploi, the French social security service for parents and home-based childcare providers, has suffered a data breach that may have exposed personal information of 1.2 million individuals. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/french-agency-pajemploi-reports-data-breach-affecting-12m-people/
-
The Data Privacy Risk Lurking in Paperless Government
The world is becoming increasingly paperless, and most organizations, including federal agencies, are following suit. Switching from paper-based processes to digital ones offers great benefits. However, the security and compliance challenges that come with this shift aren’t to be taken lightly. As the federal government goes paperless to cut costs and modernize operational processes, a..…
-
Energiesektor im Visier von Hackern
Tags: ai, awareness, bsi, cisa, cyber, cyberattack, cybersecurity, data, ddos, defense, detection, germany, hacker, infrastructure, intelligence, Internet, iot, nis-2, password, ransomware, resilience, risk, risk-analysis, risk-management, soc, threat, ukraine, update, usa, vulnerabilityEnergieversorger müssen ihre Systeme vor immer raffinierteren Cyberangriffen schützen.Die Energieversorgung ist das Rückgrat moderner Gesellschaften. Stromnetze, Gaspipelines und digitale Steuerungssysteme bilden die Grundlage für Industrie, Transport und öffentliche Dienstleistungen. Doch mit der zunehmenden Digitalisierung wächst auch die Angriffsfläche. In den vergangenen Jahren ist der Energiesektor verstärkt ins Visier von Cyberkriminellen und staatlich unterstützten Angreifern geraten.…
-
5 Big AI Announcements At OpenText World 2025
OpenText unveiled a series of new AI-related products Tuesday that aims to give the company a higher profile in the fast-growing AI space, leveraging the vendor’s decades of experience in the data business, company executives said. First seen on crn.com Jump to article: www.crn.com/news/security/2025/5-big-ai-announcements-at-opentext-world-2025
-
5 Big AI Announcements At OpenText World 2025
OpenText unveiled a series of new AI-related products Tuesday that aims to give the company a higher profile in the fast-growing AI space, leveraging the vendor’s decades of experience in the data business, company executives said. First seen on crn.com Jump to article: www.crn.com/news/security/2025/5-big-ai-announcements-at-opentext-world-2025
-
DoorDash Confirms Data Breach Exposing Customer Personal Information
DoorDash has confirmed an October 2025 data breach that exposed customer names, phone numbers, addresses and email details First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/doordash-confirms-data-breach/
-
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
You’ve probably already moved some of your business to the cloud”, or you’re planning to. That’s a smart move. It helps you work faster, serve your customers better, and stay ahead.But as your cloud setup grows, it gets harder to control who can access what.Even one small mistake”, like the wrong person getting access”, can…
-
A miracle: A company says sorry after a cyber attack and donates the ransom to cybersecurity research
One of the sad truths about this world of seemingly endless hacks and data breaches is that companies just won’t apologise. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/a-miracle-a-company-says-sorry-after-a-cyber-attack-and-donates-the-ransom-to-cybersecurity-research
-
Understanding India’s Digital Personal Data Potection Act 2025: A Complete Overview
India’s Digital Personal Data Protection Act (DPDP), 2023, signaled the country’s commitment to building a modern and globally aligned privacy framework. But as with any legislation, the true operational impact becomes clear only when detailed rules are published. With the release of the Digital Personal Data Protection Rules (DPDP), 2025, organisations now have a clear,……
-
Master how to report a breach for fast and effective cyber incident response
For every organization, no matter the size or industry, the integrity and security of data is more crucial than ever as it faces the possibility of a cyber breach everyday. But what separates a company that bounces back quickly from one that suffers irreparable damage? The answer largely resides in how promptly and accurately the…The…
-
Dr. Richard Zhao from NSFOCUS Selected into 2025 Top 10 Cybersecurity Professionals by Leading Consulting Company
SANTA CLARA, Calif., Nov 18, 2025, International Data Corporation (IDC) officially released the “2025 IDC China Top 10 Cybersecurity Professionals” at the 10th IDC China CIO Summit last month. This honor is intended to recognize outstanding individuals who have made significant contributions to China’s cybersecurity market this year. Dr. Richard Zhao, Chief Strategy Officer…The post…
-
Governing the Unseen Risks of GenAI: Why Bias Mitigation and Human Oversight Matter Most
From prompt injection to cascading agent failures, GenAI expands the enterprise attack surface. A governance-first, security-focused approach”, rooted in trusted data, guardrails, and ongoing oversight”, is now critical for responsible AI adoption. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/governing-the-unseen-risks-of-genai-why-bias-mitigation-and-human-oversight-matter-most/
-
Governing the Unseen Risks of GenAI: Why Bias Mitigation and Human Oversight Matter Most
From prompt injection to cascading agent failures, GenAI expands the enterprise attack surface. A governance-first, security-focused approach”, rooted in trusted data, guardrails, and ongoing oversight”, is now critical for responsible AI adoption. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/governing-the-unseen-risks-of-genai-why-bias-mitigation-and-human-oversight-matter-most/
-
Threat Actors Use Compromised RDP to Deploy Lynx Ransomware After Deleting Backups
A sophisticated threat actor has orchestrated a multi-stage ransomware attack spanning nine days, leveraging compromised Remote Desktop Protocol (RDP) credentials to infiltrate a corporate network, exfiltrate sensitive data, and deploy Lynx ransomware across critical infrastructure. The attack initiated with a successful RDP login using pre-compromised credentials a critical indicator that the threat actor obtained valid…

