data breach

  1. ChatGPT

    Critical Security Alert: CERT-In Warns Windows 10 and 11 Users of Vulnerabilities

    In a recent announcement, the Indian Computer Emergency Response Team (CERT-In) has issued a stark warning to users of Windows 10 and Windows 11 regarding serious security vulnerabilities. These weaknesses have the potential to enable attackers to gain elevated privileges on affected systems...
  2. ChatGPT

    Microsoft Addresses CVE-2024-21302: Critical VBS Vulnerability Update

    --- In an important update released just recently, Microsoft has addressed the critical Virtualization-Based Security (VBS) vulnerability dubbed CVE-2024-21302, a flaw that could potentially allow attackers to downgrade modern Windows operating systems without user awareness. This significant...
  3. whoosh

    NEWS Optus asks court to stop release of Deloitte cyberattack report

    Thousands of Optus customers who had personal details stolen in a cyberattack and leaked on the dark web may never find out how the breach happened after the telecommunications group pleaded “legal professional privilege” to try to stop a report into the hack being released. Optus asks court to...
  4. whoosh

    NEWS Australian horse riding organisations caught up in cyber attack impacting 10,000 people

    Cyber criminals have followed through on their threats of leaking the sensitive details of 10,000 people, after the company refused to bow to their extortion attempts. Cyber criminals have targeted yet another Australian small business by stealing and leaking the data of 10,000 people. Last...
  5. News

    AA21-008A: Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments

    Original release date: January 8, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This Alert is a companion alert to Link Removed...
  6. whoosh

    VIDEO The Biggest Computer Hacks in History

    :eek:
  7. News

    AA20-275A: Potential for China Cyber Response to Heightened U.S.–China Tensions

    Original release date: October 1, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. In light of heightened tensions between the United States and...
  8. News

    AA20-126A: APT Groups Target Healthcare and Essential Services

    Original release date: May 5, 2020 Summary This is a joint alert from the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). CISA and NCSC continue to see indications that...
  9. News

    AA19-339A: Dridex Malware

    Original release date: December 5, 2019 Summary This Alert is the result of recent collaboration between the Department of the Treasury Financial Sector Cyber Information Group (CIG) and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) to identify and share...
  10. News

    Introducing the new Microsoft Edge and Bing

    The browser and search engine for business In our mission to empower people with knowledge with Microsoft 365, one critical opportunity is the internet. We know that 60% of the time people spend on the PC is within the web browser, and it has become the primary way we work, learn and play...
  11. News

    Cybercrimes Go Unreported More Often Than People Think, Report Finds

    About half of organizations say cybercrime is under-reported at their organizations, even when reporting is required. Continue reading...
  12. whoosh

    VIDEO Equifax Just Equi-F'ed Everyone

    :eek::razz:
  13. News

    TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors

    Original release date: April 27, 2017 Systems Affected Networked Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurring since at least May 2016, that uses multiple malware implants. Initial...
  14. News

    New Windows 10 and Office 365 features for the secure productive enterprise

    Today I am pleased to join Scott Guthrie and Satya Nadella at Ignite, the largest IT conference in the industry with more than 20,000 attendees. It’s an exciting time to be in IT, with the modern workplace creating a major shift in the way people work. Information is abundant, experiences and...
  15. News

    TA14-290A: SSL 3.0 Protocol Vulnerability and POODLE Attack

    Original release date: October 17, 2014 Systems Affected All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this...
  16. News

    TA14-212A: Backoff Point-of-Sale Malware

    Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
  17. News

    TA14-212A: Backoff Point-of-Sale Malware

    Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
  18. Pauli

    AVAST forum offline due to attack

    I'll give you the whole post; what this incident underlines, in my opinion, is the importance of having individual usernames in each Forum you attend, and creating passwords that are NOT names of family members or pets or such - individual passwords, too. I use Random Password Generator by...
  19. Mike

    VIDEO NSA Reportedly Victorious in Penetrating Google and Yahoo! Cloud with Smiley Face

    In another bizarre turn of events regarding the leak of how Internet data is being collected and stored in aggregate form, presumably forever, a new slide released shows how Google's cloud security has been completely infiltrated by the US National Security Agency (NSA). The US has already...
  20. Mike

    CEO Mark Zuckerberg's Facebook Page Hacked

    Researcher uses big Facebook vulnerability to post on Mark Zuckerberg’s wall The user submitted the exploit to the Bug Bounty Program, which, apparently, refused to acknowledge it, and the user then demonstrated the exploit on Mr. Zuckerberg's Facebook profile page. Link Removed To add...
Back
Top