Tag: security-incident
-
Sicherheitsvorfall bei Solo-Med (Sept. 2025)
Tags: security-incidentZum 1. September 2025 muss es einen Sicherheitsvorfall beim Anbieter Solo-Med gegeben haben. SOLO ist im Bereich der Zahngesundheit unterwegs. Beim Sicherheitsvorfall ist es möglicherweise zu einem Abfluss von Patientendaten gekommen, musste der Anbieter eingestehen. Der Anbieter versucht mit Zahnarztpraxen … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/09/06/sicherheitsvorfall-bei-solo-med/
-
Chess.com Confirms Data Breach After Hackers Exploit External System
Chess.com, the world’s leading online chess platform, has confirmed a significant data breach that compromised personal information of thousands of users after hackers successfully exploited an external system connected to their network. The Orem, Utah-based company disclosed that the security incident affected4,541 individualsacross the United States, including one Maine resident. The breach occurred onJune 5,…
-
Pressure on CISOs to stay silent about security incidents growing
Tags: access, breach, business, cio, ciso, corporate, credentials, credit-card, crowdstrike, cybersecurity, data, data-breach, email, finance, framework, group, hacker, iam, identity, incident response, insurance, law, mfa, ransomware, sap, security-incident, software, theft, threat, training‘Intense pressure’ to keep quiet about security incidents: CSO spoke to two other former CISOs who reported pressures to stay silent about suspected security incidents. Both CISOs requested to remain anonymous due to end-of-contract confidentiality agreements made with previous employers.”While working inside a Fortune Global 500 company in Europe, I witnessed this multiple times,” one…
-
When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider
As enterprises continue to shift their operations to the browser, security teams face a growing set of cyber challenges. In fact, over 80% of security incidents now originate from web applications accessed via Chrome, Edge, Firefox, and other browsers. One particularly fast-evolving adversary, Scattered Spider, has made it their mission to wreak havoc on enterprises…
-
Salesforce Publishes Forensic Guide After Series of Cyberattacks
Salesforce has published a comprehensive forensic investigation guide aimed at empowering organizations to detect, analyze, and remediate security incidents within their Salesforce environments. The new guide distills best practices across three critical areas: activity logs, user permissions, and backup data”, providing a structured framework to answer key questions such as “What did a specific user…
-
Salesforce Publishes Forensic Guide After Series of Cyberattacks
Salesforce has published a comprehensive forensic investigation guide aimed at empowering organizations to detect, analyze, and remediate security incidents within their Salesforce environments. The new guide distills best practices across three critical areas: activity logs, user permissions, and backup data”, providing a structured framework to answer key questions such as “What did a specific user…
-
State of Nevada Faces IT Outage Amid Cyberattack, Offices Suspended
Tags: breach, cyber, cyberattack, government, infrastructure, network, office, security-incident, technologyThe State of Nevada became the target of a significant cyberattack which resulted in a substantial network security incident impacting government infrastructure across multiple agencies. According to an official communication from the Governor’s Technology Office, state officials rapidly identified the breach and immediately commenced continuous recovery efforts aimed at containing the incident and restoring affected…
-
Das kostet ein Data Breach 2025
Tags: ai, api, breach, ciso, cyberattack, cyersecurity, data, data-breach, germany, ibm, infrastructure, intelligence, ransomware, risk, security-incident, siem, supply-chain, threat, usa, vulnerabilityLaut einer aktuellen Studie liegen die durchschnittlichen Kosten einer Datenpanne in Deutschland bei 3,87 Millionen Euro.Laut dem aktuellen ‘Cost of a Data Breach”- Report von IBM sind die Kosten einer Datenpanne in Deutschland auf 3,87 Millionen Euro (ca. 4,03 Millionen Dollar) pro Vorfall gesunken im Vorjahr lagen sie noch bei 4,9 Millionen Euro (ca. 5,31…
-
TechTalk: So lässt sich das mögliche Risiko eines Sicherheitsvorfalls quantifizieren
Auf dem neu geschaffenen Security-Eventformat »Candy Cyber Club« der Münchner PR-Agentur »Milk Honey« war auch das Startup-Unternehmen Squalify anwesend. Hierbei handelt es sich um eine strategische Plattform zur Quantifizierung von Cyberrisiken. Dessen CEO Asdrúbal Pichardo stand uns während der Veranstaltung Rede und Antwort. First seen on ap-verlag.de Jump to article: ap-verlag.de/techtalk-so-laesst-sich-das-moegliche-risiko-eines-sicherheitsvorfalls-quantifizieren/98356/
-
What is the cost of a data breach?
Tags: access, ai, api, attack, automation, breach, business, ciso, compliance, cyber, cyberattack, cybersecurity, data, data-breach, detection, finance, fraud, healthcare, ibm, identity, incident response, india, infrastructure, insurance, intelligence, jobs, law, metric, privacy, programming, ransom, ransomware, regulation, risk, security-incident, service, skills, software, supply-chain, technology, theft, threat, tool, vulnerabilityCanada ($4.84 million) and the UK ($4.14million) remain in the top 10 hardest hit, with ASEAN or Association of Southeast Asian Nations ($3.67 million), Australia ($2.55 million), and India ($2.51 million) among the top 15. Breaches by industry: Healthcare remains the industry hit with the highest costs per breach by far, at $7.42 million despite…
-
Cyberangriff auf einen Technologie-Anbieter für Online-Spiele aus Kanada
Bragg Gaming Group Announces Cyber Security Incident First seen on investors.bragg.group Jump to article: investors.bragg.group/pr/news-details/2025/Bragg-Gaming-Group-Announces-Cyber-Security-Incident/default.aspx
-
SonicWall VPN Cyberattack Linked to Known Access Control Vulnerability
SonicWall identified under 40 security incidents and determined the access control problem was related to a vulnerability published last year. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-sonicwall-vpn-threat-activity/
-
Three Ways to Ensure Regulatory and Legislative Compliance with non-Oracle Java
Many global regulations and legislations have strict requirements around Java application security, incident reporting, and more. Azul has an unmatched set of solutions. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/08/three-ways-to-ensure-regulatory-and-legislative-compliance-with-non-oracle-java/
-
An organization without a response plan will be hit harder by a security incident
Security leaders shared advice gleaned from customer engagements, and reinforced the importance of planning and following fundamentals for defense. First seen on cyberscoop.com Jump to article: cyberscoop.com/microsoft-threat-intel-response-tips/
-
What is a CISO? The top IT security leader role explained
Tags: access, authentication, breach, business, ceo, cio, cisa, ciso, compliance, computer, container, control, corporate, credentials, cyber, cybersecurity, data, ddos, defense, dns, encryption, exploit, finance, firewall, framework, fraud, guide, Hardware, healthcare, infosec, infrastructure, intelligence, international, jobs, kubernetes, mitigation, msp, mssp, network, nist, programming, RedTeam, regulation, risk, risk-management, security-incident, service, skills, software, strategy, technology, threat, training, vpn, zero-day, zero-trust. You’ll often hear people say the difference between the two is that CISOs focus entirely on information security issues, while a CSOs remit is wider, also taking in physical security as well as risk management.But reality is messier. Many companies, especially smaller ones, have only one C-level security officer, called a CSO, with IT…
-
Durch Datenlecks verursachte Kosten sind gefallen
Tags: ai, breach, cyberattack, data, data-breach, deep-fake, fraud, germany, ibm, infrastructure, phishing, risk, security-incident, service, usaDurch KI unterstützte Angriffe wie Phishing und Deepfakes nehmen weiter zu, doch Unternehmen zögern in gleichem Maße nachzurüsten.Die gute Nachricht zuerst: Wie IBM in seinem jährlich erscheinenden Cost of a Data Breach Report herausfand, sind die durchschnittlichen Kosten eines Datenlecks in Deutschland erstmals seit fünf Jahren wieder gesunken. Ein einzelner Vorfall kostete demnach 2024 im…
-
Durch Datenlecks verursachte Kosten sind gefallen
Tags: ai, breach, cyberattack, data, data-breach, deep-fake, fraud, germany, ibm, infrastructure, phishing, risk, security-incident, service, usaDurch KI unterstützte Angriffe wie Phishing und Deepfakes nehmen weiter zu, doch Unternehmen zögern in gleichem Maße nachzurüsten.Die gute Nachricht zuerst: Wie IBM in seinem jährlich erscheinenden Cost of a Data Breach Report herausfand, sind die durchschnittlichen Kosten eines Datenlecks in Deutschland erstmals seit fünf Jahren wieder gesunken. Ein einzelner Vorfall kostete demnach 2024 im…
-
MCP: securing the backbone of Agentic AI
Tags: access, ai, attack, authentication, business, ciso, control, credentials, cyber, data, detection, injection, least-privilege, mfa, monitoring, RedTeam, risk, security-incident, service, supply-chain, trainingFour cornerstones for securing MCP servers: CISOs can largely rely on the proven basic principles of cyber security for MCP they just need to adapt them in a few places. Pure checklists fall short here. Instead, a clear, principles-based approach is required. Four central pillars have proven themselves in practice: Strong authentication and clean credential…
-
Doch Sicherheitsvorfall bei Logitech-Partnerliste
Es hat einen Sicherheitsvorfall bei einem Dienstleister gegeben, der für die Firma Logitech die Logitech-Partner betreut. Logitech-Partner erhielten die Tage eine Betrugs-Mail, die vor dem Risiko eines Angriffs auf eine MetaMask-Wallet warnte, aber einen Phishing-Link enthielt. Nun hat Logitech bestätigt, … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/08/03/doch-sicherheitsvorfall-bei-logitech-partnerliste/
-
Building the Perfect Post-Security Incident Review Playbook
By creating a safe environment for open discussion, prioritizing human context alongside technical data, and involving diverse stakeholders, organizations can turn security incidents into accelerators of resilience. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/perfect-post-security-incident-review-playbook
-
MetaMask-Warnung an Logitech-Partner: Angeblich Sicherheitsvorfall?
Kurze Information für Blog-Leser, die als Partner von Logitech registriert sind. Habt ihr eine Mail mit einer Warnung, angeblich von MetaMask, bekommen, dass eure Daten in Gefahr sind. Ich stelle mal einige Informationen zusammen, die ich auf die Schnelle eruieren … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/08/01/warnung-an-partner-sicherheitsvorfall-bei-logitech/
-
Cyberangriff auf eine Stadtverwaltung in Minnesota, USA
Mayor Carter to Declare State of Emergency in Response to Digital Security Incident First seen on stpaul.gov Jump to article: www.stpaul.gov/news/mayor-carter-declare-state-emergency-response-digital-security-incident
-
Hackers Exploit Official Gaming Mouse Software to Spread Windows-based Xred Malware
Gaming peripheral manufacturer Endgame Gear has disclosed a security incident involving malware-infected software distributed through their official website, affecting users who downloaded the OP1w 4k v2 mouse configuration tool between June 26 and July 9, 2025. The company has issued an urgent security advisory and implemented immediate remediation measures while the investigation into the breach…
-
Half of Organisations Using PAM Report Fewer Security Incidents Tied to Privilege Misuse
Today Keeper Security released its latest Insight Report, Securing Privileged Access: The Key to Modern Enterprise Defence, all about privileged access management (PAM). The report found that nearly half (49%) of organisations with PAM report fewer security incidents tied to privilege misuse. The report also found that, as 94% of organisations now operate in hybrid or…
-
Cyber-Zwischenfall bei einem Medienunternehmen in Deutschland
SWMH von IT-Sicherheitsvorfall betroffen First seen on swmh.de Jump to article: www.swmh.de/pressemitteilungen/swmh-von-it-sicherheitsvorfall-betroffen
-
Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access
Tags: access, advisory, cisco, exploit, flaw, identity, incident response, security-incident, service, vulnerabilityCisco on Monday updated its advisory of a set of recently disclosed security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) to acknowledge active exploitation.”In July 2025, the Cisco PSIRT [Product Security Incident Response Team], became aware of attempted exploitation of some of these vulnerabilities in the wild,” the company said…
-
Dell Data Breach World Leaks Group Hacks Test Lab Platform
Dell Technologies has acknowledged a significant security incident involving its Customer Solution Centers platform, with the World Leaks extortion group successfully infiltrating the isolated demonstration environment used for showcasing products to commercial clients. The breach, which occurred earlier this month, represents another high-profile attack by the newly rebranded threat actor formerly known as Hunters International.…
-
Vodafone von Hackerangriff auf Dienstleister betroffen
Ein Dienstleister von Vodafone Deutschland wurde von einem Cyberangriff getroffen.Hacker haben einen externen Dienstleister von Vodafone angegriffen. Laut einem Bericht der Wirtschaftswoche kämpft der Mobilfunkkonzern in Deutschland deshalb seit rund einer Woche mit einem Ausfall seines Webportals Vodafone Sales World. Der Zeitung zufolge nutzt der Vertrieb des Netztbetreibers die Plattform für den Austausch mit externen…
-
Ransomware actors target patched SonicWall SMA devices with rootkit
Tags: access, attack, backdoor, control, credentials, exploit, flaw, incident response, malware, mandiant, network, password, ransomware, security-incident, startup, vpn, vulnerabilitytemp.db and persist.db, that store sensitive information, including user account credentials, session tokens, and OTP seed values.Although the flaw has been publicly documented and analyzed in detail by researchers as potentially leading to the exposure of admin credentials, GTIG and Mandiant don’t have evidence this is the flaw that was exploited. It is also possible…

