Tag: security-incident
-
Agency that provides budget data to Congress hit with security incident
Suspected foreign hackers reportedly breached Congressional Budget Office, possibly exposing communications with lawmakers. First seen on cyberscoop.com Jump to article: cyberscoop.com/congressional-budget-office-cybersecurity-incident/
-
Hacktivist-Driven DDoS Dominates Attacks on Public Sector
ENISA report reveals DDoS accounted for 60% of public sector security incidents last year First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/hacktivistdriven-ddos-attacks/
-
Open VSX Registry Responds to Leaked Tokens and Malicious Extension Incident
The Open VSX team and Eclipse Foundation have addressed a significant security incident involving leaked authentication tokens and malicious extensions on their popular code marketplace. The organization has now contained the situation and outlined concrete steps to prevent future attacks. Earlier this month, security researchers at Wiz identified several developer tokens that had been accidentally…
-
Open VSX Registry Responds to Leaked Tokens and Malicious Extension Incident
The Open VSX team and Eclipse Foundation have addressed a significant security incident involving leaked authentication tokens and malicious extensions on their popular code marketplace. The organization has now contained the situation and outlined concrete steps to prevent future attacks. Earlier this month, security researchers at Wiz identified several developer tokens that had been accidentally…
-
Open VSX Registry Responds to Leaked Tokens and Malicious Extension Incident
The Open VSX team and Eclipse Foundation have addressed a significant security incident involving leaked authentication tokens and malicious extensions on their popular code marketplace. The organization has now contained the situation and outlined concrete steps to prevent future attacks. Earlier this month, security researchers at Wiz identified several developer tokens that had been accidentally…
-
Ernst Young (EY): 4TB DB-Backup im Internet gefunden
Kleiner Nachtrag von voriger Woche. Bei Ernst & Young (kurz EY) hat es mutmaßlich einen veritablen Datenschutz- und Sicherheitsvorfall gegeben. Sicherheitsforscher sind im Internet auf eine Backup-Datei für einen SQL-Server gestoßen, die unverschlüsselt und ungeschützt erreichbar war. Die über 4 … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/11/03/ernst-young-ey-4tb-db-backup-im-internet-gefunden/
-
Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness
Tags: access, ai, api, attack, awareness, breach, business, ceo, cloud, compliance, computer, control, corporate, crime, cryptography, cyber, cybersecurity, data, data-breach, encryption, exploit, finance, framework, germany, google, governance, guide, hacking, ibm, identity, india, infrastructure, intelligence, jobs, law, leak, metric, microsoft, network, penetration-testing, privacy, risk, risk-management, scam, security-incident, skills, strategy, technology, threat, tool, training, vulnerability, vulnerability-managementMany organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, managing and governing AI cyber risks. Key takeaways Most organizations’ AI adoption is dangerously outpacing their security strategies and…
-
Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness
Tags: access, ai, api, attack, awareness, breach, business, ceo, cloud, compliance, computer, control, corporate, crime, cryptography, cyber, cybersecurity, data, data-breach, encryption, exploit, finance, framework, germany, google, governance, guide, hacking, ibm, identity, india, infrastructure, intelligence, jobs, law, leak, metric, microsoft, network, penetration-testing, privacy, risk, risk-management, scam, security-incident, skills, strategy, technology, threat, tool, training, vulnerability, vulnerability-managementMany organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, managing and governing AI cyber risks. Key takeaways Most organizations’ AI adoption is dangerously outpacing their security strategies and…
-
Survey Surfaces Rise in Email Security Incidents Tied to Ransomware
A survey of 2,000 senior security decision-makers published this week finds more than three quarters (78%) work for organizations that experienced an email security breach in the past 12 months. Conducted by the market research firm Vanson Bourne on behalf of Barracuda Networks, the survey also finds that on average the cost of recovering from..…
-
Survey Surfaces Rise in Email Security Incidents Tied to Ransomware
A survey of 2,000 senior security decision-makers published this week finds more than three quarters (78%) work for organizations that experienced an email security breach in the past 12 months. Conducted by the market research firm Vanson Bourne on behalf of Barracuda Networks, the survey also finds that on average the cost of recovering from..…
-
Volvo’s recent security breach: 5 tips to speed incident response while preserving forensic integrity
Tags: access, automation, breach, business, cio, ciso, cloud, compliance, control, cyber, cybersecurity, data, data-breach, detection, endpoint, finance, framework, gartner, GDPR, guide, incident, incident response, insurance, metric, mitigation, nist, resilience, risk, risk-management, saas, security-incident, siem, soar, supply-chain, vulnerabilityIdentify and catalog your evidence sources in advance (endpoints, memory, logs, cloud assets)Stage scripts or agents that can snapshot memory and archive logs immediately when an IR trigger firesMake forensic collection part of containment, not something you tack on afterwardModern approaches and even NIST’s updated guidance emphasize that evidence gathering should begin during, not after,…
-
Volvo’s recent security breach: 5 tips to speed incident response while preserving forensic integrity
Tags: access, automation, breach, business, cio, ciso, cloud, compliance, control, cyber, cybersecurity, data, data-breach, detection, endpoint, finance, framework, gartner, GDPR, guide, incident, incident response, insurance, metric, mitigation, nist, resilience, risk, risk-management, saas, security-incident, siem, soar, supply-chain, vulnerabilityIdentify and catalog your evidence sources in advance (endpoints, memory, logs, cloud assets)Stage scripts or agents that can snapshot memory and archive logs immediately when an IR trigger firesMake forensic collection part of containment, not something you tack on afterwardModern approaches and even NIST’s updated guidance emphasize that evidence gathering should begin during, not after,…
-
Toys “R” Us Canada warns customers’ info leaked in data breach
Toys “R” Us Canada has sent notices of a data breach to customers informing them of a security incident where threat actors leaked customer records they had previously stolen from its systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/toys-r-us-canada-warns-customers-info-leaked-in-data-breach/
-
Self-propagating worm found in marketplaces for Visual Studio Code extensions
Tags: access, application-security, attack, backdoor, backup, best-practice, blockchain, breach, ciso, control, credentials, crime, crypto, cyber, data, data-breach, endpoint, framework, github, gitlab, google, government, identity, incident response, infrastructure, intelligence, least-privilege, login, malicious, malware, marketplace, network, open-source, resilience, risk, sans, security-incident, software, supply-chain, threat, tool, update, wormMarketplaces targeted: The Koi Security report is the latest in a series of warnings that threat actors are increasingly targeting VS Code marketplaces in supply chain attacks. Last week, Koi Security exposed a threat actor dubbed TigerJack spreading malicious extensions. And researchers at Wiz just published research showing the widespread abuse of the OpenVSX and…
-
Britisches Militär von Cyberattacke getroffen
Großbritannien wird immer häufiger Ziel von schwerwiegenden Cyberangriffen. Jetzt hat es das Militär getroffen.Laut einem Bericht der britischen Zeitung Daily Mail ist es russischen Hackern gelungen, Hunderte sensibler Militärdokumente zu ergaunern. Darunter befinden sich demnach Informationen zu acht Stützpunkten der Royal Air Force und der Royal Navy.Der von der Boulevardzeitung als ‘katastrophal” bezeichnete Sicherheitsvorfall geht auf…
-
Britisches Militär von Cyberattacke getroffen
Großbritannien wird immer häufiger Ziel von schwerwiegenden Cyberangriffen. Jetzt hat es das Militär getroffen.Laut einem Bericht der britischen Zeitung Daily Mail ist es russischen Hackern gelungen, Hunderte sensibler Militärdokumente zu ergaunern. Darunter befinden sich demnach Informationen zu acht Stützpunkten der Royal Air Force und der Royal Navy.Der von der Boulevardzeitung als ‘katastrophal” bezeichnete Sicherheitsvorfall geht auf…
-
Cybersecurity Snapshot: F5 Breach Prompts Urgent U.S. Gov’t Warning, as OpenAI Details Disrupted ChatGPT Abuses
Tags: ai, attack, awareness, backdoor, breach, business, chatgpt, china, cisa, cloud, control, corporate, cve, cyber, cybersecurity, data, data-breach, defense, detection, exploit, framework, fraud, governance, government, group, hacker, incident, infrastructure, Internet, iran, law, LLM, malicious, malware, mitigation, monitoring, network, openai, organized, phishing, privacy, resilience, risk, russia, scam, security-incident, service, software, strategy, supply-chain, technology, threat, training, update, vulnerabilityF5’s breach triggers a CISA emergency directive, as Tenable calls it “a five-alarm fire” that requires urgent action. Meanwhile, OpenAI details how attackers try to misuse ChatGPT. Plus, boards are increasing AI and cyber disclosures. And much more! Key takeaways A critical breach at cybersecurity firm F5, attributed to a nation-state, has triggered an urgent…
-
Hacker attackieren Vergabeportal für öffentliche Aufträge
Prorussische Hacker haben die Internetseite des Deutschen Vergabeportals fast eine Woche lang lahmgelegt.Prorussische Hacker haben nach einem Bericht der Süddeutschen Zeitung (SZ) die Webseite des Deutschen Vergabeportals des Bundes in die Knie gezwungen. Durch die Cyberattacke war diese wichtige Schnittstelle zwischen Staat und Wirtschaft fast eine Woche lang nicht erreichbar. Am Dienstagnachmittag war das Portal…
-
Datenleck bei SonicWall betrifft alle CloudKunden
Tags: backup, cloud, cyberattack, data-breach, dns, encryption, firewall, intelligence, Internet, ransomware, risk, security-incident, threat, updateDer Sicherheitsvorfall bei SonicWall ist umfangreicher als bisher angenommen.Am 17. September gab der Security-Anbieter SonicWall bekannt, dass Cyberkriminelle Backup-Dateien entwendet hätten, die für die Cloud-Sicherung konfiguriert waren. Damals behauptete das Unternehmen, der Vorfall sei auf “weniger als fünf Prozent” der Kunden beschränkt. Nun muss der Firewall-Anbieter einräumen, dass “alle Kunden”, die die MySonicWall-Cloud-Backup-Funktion nutzten, von…
-
Datenleck bei SonicWall betrifft alle CloudKunden
Tags: backup, cloud, cyberattack, data-breach, dns, encryption, firewall, intelligence, Internet, ransomware, risk, security-incident, threat, updateDer Sicherheitsvorfall bei SonicWall ist umfangreicher als bisher angenommen.Am 17. September gab der Security-Anbieter SonicWall bekannt, dass Cyberkriminelle Backup-Dateien entwendet hätten, die für die Cloud-Sicherung konfiguriert waren. Damals behauptete das Unternehmen, der Vorfall sei auf “weniger als fünf Prozent” der Kunden beschränkt. Nun muss der Firewall-Anbieter einräumen, dass “alle Kunden”, die die MySonicWall-Cloud-Backup-Funktion nutzten, von…
-
Sicherheitsvorfall bei Schufa-Tochter – Kriminelle erbeuten Videoident-Daten von Bonify-Nutzern
Tags: security-incidentFirst seen on security-insider.de Jump to article: www.security-insider.de/datenleck-schufa-tochter-bonify-identitaetsdiebstahl-risiko-a-8b9ea8a16e6cfd95e5ae0063461fe5cb/
-
localmind.ai: KI-Sicherheitsvorfall, es ist noch nicht vorbei Teil 3
Der Sicherheitsvorfall beim KI-Anbieter localmind.ai scheint noch nicht ausgestanden. Der Anbieter schreibt zwar, dass die Kernsysteme der Localmind-Plattform selbst nicht kompromittiert wurden, und man glaubt, die Infrastruktur gesichert zu haben. Es hat aber den Anschein, dass dies nicht ganz zutreffend … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/10/09/localmind-ai-ki-sicherheitsvorfall-es-ist-noch-nicht-vorbei-teil-3/
-
localmind.ai: KI-Sicherheitsvorfall, es ist noch nicht vorbei Teil 3
Der Sicherheitsvorfall beim KI-Anbieter localmind.ai scheint noch nicht ausgestanden. Der Anbieter schreibt zwar, dass die Kernsysteme der Localmind-Plattform selbst nicht kompromittiert wurden, und man glaubt, die Infrastruktur gesichert zu haben. Es hat aber den Anschein, dass dies nicht ganz zutreffend … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/10/09/localmind-ai-ki-sicherheitsvorfall-es-ist-noch-nicht-vorbei-teil-3/
-
Desaster: Sicherheitsvorfall KI-Anbieter localmind.ai Teil 1
Es ist ein Sicherheitsvorfall mit Ansage, war nur die Frage, wie schnell es eintritt. Der KI-Anbieter localmind.ai hat momentan alle Dienste abgeschaltet. Über eine “leicht zu vermeidende Sicherheitslücke” hätten Dritte sensible Daten von Kunden abziehen können. Ein Leser hat mich … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/10/06/desaster-sicherheitsvorfall-ki-anbieter-localmind-ai/
-
Desaster: Sicherheitsvorfall KI-Anbieter localmind.ai Teil 1
Es ist ein Sicherheitsvorfall mit Ansage, war nur die Frage, wie schnell es eintritt. Der KI-Anbieter localmind.ai hat momentan alle Dienste abgeschaltet. Über eine “leicht zu vermeidende Sicherheitslücke” hätten Dritte sensible Daten von Kunden abziehen können. Ein Leser hat mich … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/10/06/desaster-sicherheitsvorfall-ki-anbieter-localmind-ai/

