Tag: security-incident
-
4chan Hack durch Soyjak Forum-Mitglied; Plattform down
Tags: security-incidentDie Plattform 4chan hat einen Sicherheitsvorfall durch einen Nutzer des rivalisierenden Soyjak-Forums erlitten. Der Nutzer behauptete, die 4chan-Webseite gehackt zu haben. Er hat die angeblichen Quellcode von 4chan veröffentlicht. Hackread.com hat interne Discord-Chatprotokolle des Discord-Servers von 4chan einsehen können. Dort … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/04/16/4chan-hack-durch-soyjak-forum-mitglieder/
-
The most dangerous time for enterprise security? One month after an acquisition
Fear of upgrading or purchasing any new security tech. Managers are hesitant to invest because they don’t know what the new parent company will decide, and they don’t want to waste money.Talented security people leave, along with the best people in every business unit. They are worried about being laid off, so they take whatever…
-
What boards want and don’t want to hear from cybersecurity leaders
Tags: access, business, ciso, compliance, control, cyber, cybersecurity, email, malicious, metric, phishing, risk, security-incident, skills, strategy, technology, threat, training, update“It’s only when you report to someone not involved in technology that you realize you’re talking in jargon or not close to talking the language of the business,” says Bennett. Decoding what the board wants from security leaders: Cybersecurity leaders need regular contact with boards to foster familiarity and understanding. Without this, a lack of…
-
Ransomware bei einer County-Verwaltung in Idaho, USA
Notice of Data Security Incident First seen on ag.idaho.gov Jump to article: www.ag.idaho.gov/content/uploads/2025/04/Gooding-Co-ID-AG-Notice120552382.pdf
-
EMail-Konto bei einer Stadtverwaltung in Idaho, USA gehackt
Notice of Data Security Incident First seen on ag.idaho.gov Jump to article: www.ag.idaho.gov/content/uploads/2025/02/Hailey-Initial-AG-Notice120087275.pdf
-
Oracle admits breach of ‘obsolete servers,’ denies main cloud platform affected
Doubts emerge: So far so good regarding Oracle’s denials, except that the hacker subsequently shared data showing their access to login.us2.oraclecloud.com, a service that is part of the Oracle Access Manager, the company’s IAM system used to control access to Oracle-hosted systems.It also emerged that some of the leaked data appeared to be from 2024…
-
Was ist eine Cyber-Versicherung?
Eine Cyber-Versicherung kann ein hilfreiches Tool sein, das im Falle eines digitalen Sicherheitsvorfalls ermöglicht, das Risiko zu übertragen – allerdings nur bei richtiger Anwendung. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2015/06/05/ist-eine-cyber-versicherung/
-
Is HR running your employee security training? Here’s why that’s not always the best idea
Tags: attack, awareness, best-practice, breach, business, ciso, communications, compliance, cyber, cybersecurity, data, finance, guide, healthcare, privacy, resilience, risk, security-incident, service, threat, training, vulnerabilityHR doesn’t have specialized security knowledge: Another limitation is that an organization’s security training can be a component in maintaining certain certifications, compliance, contractual agreements, and customer expectations, according to Hughes.”If that’s important to your organization, then security, IT, and compliance teams will know the subjects to cover and help guide in the importance of…
-
Treasury’s OCC Says Hackers Had Access to 150,000 Emails
The Office of the Comptroller of the Currency (OCC) has disclosed an email security incident in which 100 accounts were compromised for over a year. The post Treasury’s OCC Says Hackers Had Access to 150,000 Emails appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/treasurys-occ-says-hackers-had-access-to-150000-emails/
-
Adobe Security Update: Patches Released for Multiple Product Vulnerabilities
Adobe has announced critical security updates for several of its popular software products, addressing vulnerabilities that could potentially be exploited by attackers. The Product Security Incident Response Team (PSIRT) has urged all users to apply these updates immediately to protect their systems and data. These updates are part of Adobe’s ongoing commitment to ensuring the…
-
Oracle Confirms Breach: Hackers Stole Client Login Credentials
Oracle Corporation has officially confirmed a cybersecurity breach in which hackers infiltrated its systems and stole client login credentials. This marks the second security incident disclosed by the software giant in less than a month, raising alarm among customers and cybersecurity professionals worldwide. According to sources familiar with the matter, Oracle informed certain clients earlier…
-
The Fastest Way to Secure Your APIs? We’ve Got That Covered with CrowdStrike
Tags: api, attack, cloud, crowdstrike, data, data-breach, endpoint, firewall, governance, identity, intelligence, risk, security-incident, siem, threat, tool, vulnerabilityAPIs are the backbone of modern apps, but they also introduce some serious security risks. Attackers are constantly on the lookout for vulnerable APIs, shadow APIs, zombie APIs, and exposed sensitive data”, all of which are tough to track if you don’t have the right tools in place. That’s why we’ve teamed up with CrowdStrike…
-
Check Point Software confirms security incident but pushes back on threat actor claims
A malicious hacker recently offered to sell the security firm’s sensitive customer information. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/check-point-software-security-incident/744198/
-
LLMs are now available in snack size but digest with care
Passed down wisdom can distort reality: Rather than developing their own contextual understanding, student models rely heavily on their teacher models’ pre-learned conclusions. Whether this limitation can lead to model hallucination is highly debated by experts.Brauchler is of the opinion that the efficiency of the student models is tied to that of their teachers, irrespective…
-
6 hard-earned tips for leading through a cyberattack, from CSOs who’ve been there
Tags: attack, awareness, breach, business, cisco, ciso, control, cyber, cyberattack, cybersecurity, data, group, incident response, infosec, infrastructure, lessons-learned, military, open-source, phishing, phone, privacy, programming, ransomware, security-incident, service, skills, software, strategy, threat, training, updateDevelop muscle memory, and patience, through simulations: Authority under crisis is meaningless if you can’t establish followership. And this goes beyond the incident response team: CISOs must communicate with the entire organization, a commonly misunderstood imperative, says Pablo Riboldi, CISO of nearshore talent provider BairesDev.”I find that employee involvement tends to be overlooked during cyberattacks.…
-
Cyberangriff auf Arztpraxen in den USA
SimonMed Imaging Provides Notice of Security Incident First seen on prnewswire.com Jump to article: www.prnewswire.com/news-releases/simonmed-imaging-provides-notice-of-security-incident-302414648.html
-
170,000 Impacted by Data Breach at Chord Specialty Dental Partners
An email security incident at Chord Specialty Dental Partners, a US dental service organization, has impacted more than 170,000 people. The post 170,000 Impacted by Data Breach at Chord Specialty Dental Partners appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/170000-impacted-by-data-breach-at-chord-specialty-dental-partners/
-
Ransomware bei einer Immobiliengesellschaft in der Republik China / Taiwan
A cyber security incident occurred in our company First seen on emops.twse.com.tw Jump to article: emops.twse.com.tw/server-java/t05sr01_1_e
-
Salt Typhoon may have upgraded backdoors for efficiency and evasion
CrowDoor and attributed to the Earth Estries APT group in November 2024.”GhostSparrow, aka Salt Typhoon (Microsoft), Earth Estries (Trend Micro), Ghost Emperor (Kaspersky Labs), and UNC2286 (Mandiant), has escalated cyber espionage, breaching US telecom networks and accessing data on over a million individuals. One of the key features ESET reported on the two previously unseen…
-
Trotz Hinweisen: Oracle dementiert Cyberattacke
Tags: access, bug, cloud, computer, cyberattack, dark-web, mail, oracle, password, security-incidentObwohl Sicherheitsforscher Hinweise für einen Datendiebstahl bei Oracle entdeckt haben, streitet das Unternehmen den Vorfall ab. Sicherheitsforscher von CloudSEK haben kürzlich entdeckt, dass im Darknet sensible Daten von mehr als 140.000 Oracle-Kunden zum Verkauf stehen. Diese Informationen sollen aus einer Cyberattacke auf die Oracle Cloud stammen. Die Forscher gehen davon aus, dass der Angreifer sich…
-
Trotz Hinweise: Oracle dementiert Cyberattacke
Tags: access, bug, cloud, computer, cyberattack, dark-web, mail, oracle, password, security-incidentObwohl Sicherheitsforscher Hinweise für einen Datendiebstahl bei Oracle entdeckt haben, streitet das Unternehmen den Vorfall ab. Sicherheitsforscher von CloudSEK haben kürzlich entdeckt, dass im Darknet sensible Daten von mehr als 140.000 Oracle-Kunden zum Verkauf stehen. Diese Informationen sollen aus einer Cyberattacke auf die Oracle Cloud stammen. Die Forscher gehen davon aus, dass der Angreifer sich…
-
Die 10 häufigsten IT-Sicherheitsfehler
Von ungepatchten Sicherheitslücken bis hin zu unzureichenden Backups: Lesen Sie, wie sich die häufigsten IT-Sicherheitsfehler vermeiden lassen. Verschlüsselte Dateien und eine Textdatei mit einer Erpresser-Nachricht zeigen klar und deutlich: Ein Unternehmen ist einer Cyberattacke zum Opfer gefallen. Dabei ist das nur das Ende einer langen Angriffskette. Die Tätergruppe bewegt sich oft seit mehreren Wochen oder Monaten…
-
Getting the Most Value Out of the OSCP: The PEN-200 Labs
Tags: access, ai, attack, compliance, container, cyber, cybersecurity, dns, docker, exploit, firewall, guide, hacking, Hardware, infrastructure, intelligence, jobs, kubernetes, microsoft, mitigation, network, open-source, oracle, penetration-testing, powershell, risk, security-incident, service, siem, skills, technology, tool, training, vmware, vulnerability, windowsHow to leverage the PEN-200 simulated black-box penetration testing scenarios for maximal self-improvement and career success. Disclaimer: All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance with OffSec’s copyright policies and agreements. I have not been sponsored or incentivized in any way to recommend or oppose any…
-
Oracle Cloud breach may impact 140,000 enterprise customers
Tags: access, attack, authentication, breach, business, cloud, control, credentials, data, extortion, finance, hacker, mfa, mitigation, oracle, password, radius, ransom, risk, security-incident, service, strategy, supply-chain, threatBusiness impact and risks: In an alarming development, the threat actor has initiated an extortion campaign, contacting affected companies and demanding payment to remove their data from the stolen cache. This creates immediate financial pressure and complex legal and ethical decisions for victims regarding ransom payments.To increase pressure on both Oracle and affected organizations, the…
-
Rooted Devices 250 Times More Vulnerable to Compromise
Rooted devices are 250 times more vulnerable to security incidents, Zimperium warned First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/rooted-devices-250x-vulnerable/
-
Supply Chain Attack Targets 23,000 GitHub Repositories
A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which is used in over 23,000 repositories. The attack involves a malicious modification of the Action’s code, leading to the exposure of CI/CD secrets in GitHub Actions build logs. This vulnerability was detected by StepSecurity’s Harden-Runner, a tool designed to secure CI/CD…
-
Fortinet Addresses Security Issues in FortiSandbox, FortiOS, and Other Products
Fortinet’s Product Security Incident Response Team (PSIRT) announced the resolution of several critical and high-severity security vulnerabilities affecting various Fortinet products, including FortiSandbox and FortiOS. These updates are part of Fortinet’s ongoing efforts to enhance the security and reliability of its solutions, ensuring a robust defense against potential threats. Summary of Resolved Issues A total…
-
6 wichtige Punkte für Ihren Incident Response Plan
Tags: backup, business, ceo, ciso, compliance, cyber, cyberattack, cybersecurity, cyersecurity, finance, incident response, mail, ransomware, risk, security-incident, service, strategy, supply-chain, updateLesen Sie, welche Schritte für Ihren Notfallplan besonders wichtig sind.Wenn ein Unternehmen einen größeren Ausfall seiner IT-Systeme erlebt beispielsweise aufgrund eines Cyberangriffs ist es zu diesem Zeitpunkt nicht mehr voll geschäftsfähig. Deshalb ist ein effektiver Plan zur Reaktion auf Vorfälle (Incident Response, IR) unerlässlich.Es geht jedoch nicht nur darum, die Quelle eines Angriffs zu finden…

