Tag: data
-
Fewer data breaches in Australia, but human error now a bigger threat
Privacy commissioner warns that the human factor is a growing threat as notifications caused by staff mistakes rose significantly even as total breaches declined 10% from a record high First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366633983/Fewer-data-breaches-in-Australia-but-human-error-now-a-bigger-threat
-
Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
A new security issue discovered by researchers reveals that Anthropic’s Claude AI system can be exploited through indirect prompts, allowing attackers to exfiltrate user data via its built”‘in File API. The attack, documented in a detailed technical post on October 28, 2025, demonstrates how Claude’s Code Interpreter and API features could be manipulated to send…
-
Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
A new security issue discovered by researchers reveals that Anthropic’s Claude AI system can be exploited through indirect prompts, allowing attackers to exfiltrate user data via its built”‘in File API. The attack, documented in a detailed technical post on October 28, 2025, demonstrates how Claude’s Code Interpreter and API features could be manipulated to send…
-
Synthetic Identity Theft in 2025: How Digital Identity Intelligence Detects Fraud That Doesn’t Exist
Synthetic identity theft, where criminals combine real and fabricated data to create entirely new “people”, is one of the fastest-growing forms of digital fraud. Unlike traditional identity theft, which steals from real individuals, synthetic identity fraud manufactures fake identities that appear legitimate to verification systems. This sophisticated type of fraud is costing organizations… First seen…
-
Synthetic Identity Theft in 2025: How Digital Identity Intelligence Detects Fraud That Doesn’t Exist
Synthetic identity theft, where criminals combine real and fabricated data to create entirely new “people”, is one of the fastest-growing forms of digital fraud. Unlike traditional identity theft, which steals from real individuals, synthetic identity fraud manufactures fake identities that appear legitimate to verification systems. This sophisticated type of fraud is costing organizations… First seen…
-
Synthetic Identity Theft in 2025: How Digital Identity Intelligence Detects Fraud That Doesn’t Exist
Synthetic identity theft, where criminals combine real and fabricated data to create entirely new “people”, is one of the fastest-growing forms of digital fraud. Unlike traditional identity theft, which steals from real individuals, synthetic identity fraud manufactures fake identities that appear legitimate to verification systems. This sophisticated type of fraud is costing organizations… First seen…
-
Data Theft Hits Behavioral Health Network in 3 States
Oglethorpe Notifying 92,000 Patients of June Hack of Mental Health, Addiction Info. A Florida-based firm that operates in-patient mental health and addiction recovery treatment facilities in three states is notifying more than 92,000 patients that their personal and sensitive health information may have been compromised in a data theft hack discovered in June. First seen…
-
Randall Munroe’s XKCD ”Physics Insight<<
Tags: datavia the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/11/randall-munroes-xkcd-physics-insight/
-
Defense in Depth for AI: The MCP Security Architecture You’re Missing
As AI agents become integral to cloud native applications, the Model Context Protocol (MCP) has emerged as a leading standard for enabling these agents to interact with external tools and data sources. But with this new architectural pattern comes a critical security challenge: MCP-based systems require protection at three distinct layers, not just one. The..…
-
Defense in Depth for AI: The MCP Security Architecture You’re Missing
As AI agents become integral to cloud native applications, the Model Context Protocol (MCP) has emerged as a leading standard for enabling these agents to interact with external tools and data sources. But with this new architectural pattern comes a critical security challenge: MCP-based systems require protection at three distinct layers, not just one. The..…
-
Shortfall in Cyber Workforce Leads to Skills Gap
Fortinet’s da Gama on Global Cyber Skill Shortage. The global cybersecurity skills shortage is leaving organizations open to more risk than ever, including increased data breach rates, higher recovery costs and prolonged disruptions. According to Fortinet’s latest Global Cybersecurity Skills Gap Report, 86% of organizations experienced some type of breach in 2024 a number only…
-
Sketchy Graphics: Windows GDI Flaws Open RCE and Data Loss
Check Point finds Windows GDI bugs enabling RCE and data leaks. Learn how Microsoft patched and how to protect your systems. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/windows-gdi-vulnerabilities/
-
Data breach costs lead to 90% drop in operating profit at South Korean telecom giant
SK Telecom said the sharp decline stemmed from compensation and recovery costs following a large-scale cyberattack disclosed in April that exposed the personal data of about 27 million customers. First seen on therecord.media Jump to article: therecord.media/data-breach-costs-lead-to-profit-decline-south-korea-telecom
-
NDSS 2025 Statically Discover Cross-Entry Use-After-Free Vulnerabilities In The Linux Kernel
SESSION Session 1D: System-Level Security Authors, Creators & Presenters: Hang Zhang (Indiana University Bloomington), Jangha Kim (The Affiliated Institute of ETRI, ROK), Chuhong Yuan (Georgia Institute of Technology), Zhiyun Qian (University of California, Riverside), Taesoo Kim (Georgia Institute of Technology) PAPER Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux Kernel Use-After-Free (UAF) is one of…
-
NDSS 2025 Statically Discover Cross-Entry Use-After-Free Vulnerabilities In The Linux Kernel
SESSION Session 1D: System-Level Security Authors, Creators & Presenters: Hang Zhang (Indiana University Bloomington), Jangha Kim (The Affiliated Institute of ETRI, ROK), Chuhong Yuan (Georgia Institute of Technology), Zhiyun Qian (University of California, Riverside), Taesoo Kim (Georgia Institute of Technology) PAPER Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux Kernel Use-After-Free (UAF) is one of…
-
Japanese retailer Askul confirms data leak after cyberattack claimed by Russia-linked group
The company said the breach exposed contact information and inquiry details from users of its online stores, Askul, Lohaco and Soloel Arena, as well as supplier data stored on its internal servers. First seen on therecord.media Jump to article: therecord.media/askul-confirms-data-breach-ransomware-incident
-
Nation-State Hackers Breach Major Telecom Provider Ribbon Communications
Nation-state hackers breached Ribbon Communications, exposing data and highlighting rising cyber threats to critical infrastructure. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/nation-state-hackers-breach-major-telecom-provider-ribbon-communications/
-
Android Apps misusing NFC and HCE to steal payment data on the rise
Zimperium zLabs found 760+ Android apps abusing NFC and HCE to steal payment data, showing a surge in NFC relay fraud since April 2024. Zimperium zLabs researchers spotted over 760 Android apps abusing Near-Field Communication (NFC) and Host Card Emulation (HCE) to steal payment data and commit fraud, showing rapid growth in NFC relay attacks…
-
Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
The volume of threat intelligence data has grown exponentially, but the ability to interpret and act on it has not. Every day brings new CVE disclosures, exploit releases, and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/03/product-showcase-cogent-security-community/
-
Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
The volume of threat intelligence data has grown exponentially, but the ability to interpret and act on it has not. Every day brings new CVE disclosures, exploit releases, and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/03/product-showcase-cogent-security-community/
-
Hacktivists increasingly target industrial control systems, Canada Cyber Centre warns
Tags: authentication, control, cyber, cybersecurity, data, data-breach, government, hacker, infrastructure, Internet, leak, mfa, military, service, technology, vpn, vulnerabilityHacked fuel tank gauges can lead to dangerous situations: In another incident reported by the Canadian Centre for Cyber Security, attackers accessed an internet-exposed automated tank gauge (ATG) belonging to a Canadian oil and gas company and manipulated its values, triggering false alarms.ATGs are used to monitor fuel level, pressure, and temperature inside fuel tanks.…
-
Hacktivists increasingly target industrial control systems, Canada Cyber Centre warns
Tags: authentication, control, cyber, cybersecurity, data, data-breach, government, hacker, infrastructure, Internet, leak, mfa, military, service, technology, vpn, vulnerabilityHacked fuel tank gauges can lead to dangerous situations: In another incident reported by the Canadian Centre for Cyber Security, attackers accessed an internet-exposed automated tank gauge (ATG) belonging to a Canadian oil and gas company and manipulated its values, triggering false alarms.ATGs are used to monitor fuel level, pressure, and temperature inside fuel tanks.…
-
Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data
Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting sensitive data from compromised devices.According to CYFIRMA, which analyzed three different samples of BankBot-YNRK, the malware incorporates features to sidestep analysis efforts by first checking its running within a virtualized or emulated environment First seen on…
-
Standing to Sue The Elephant in the Room
When Elephant Insurance was hacked and millions of driver’s license numbers were exposed, the Fourth Circuit confronted a crucial privacy law dilemma: Is data theft alone enough to sue, or must harm be public and provable? This case exposes how U.S. courts still undervalue privacy in the digital age, and why the elephant in the…

