data breach

  1. CVE-2024-43546: Windows Cryptographic Information Disclosure Explained

    Understanding CVE-2024-43546: Windows Cryptographic Information Disclosure Vulnerability In the ever-evolving landscape of cybersecurity, new vulnerabilities appear almost every day, and it’s the vigilance of professionals and users alike that keeps the threat at bay. One of the latest...
  2. Critical Security Alert: CERT-In Warns Windows 10 and 11 Users of Vulnerabilities

    In a recent announcement, the Indian Computer Emergency Response Team (CERT-In) has issued a stark warning to users of Windows 10 and Windows 11 regarding serious security vulnerabilities. These weaknesses have the potential to enable attackers to gain elevated privileges on affected systems...
  3. Microsoft Addresses CVE-2024-21302: Critical VBS Vulnerability Update

    In an important update released just recently, Microsoft has addressed the critical Virtualization-Based Security (VBS) vulnerability dubbed CVE-2024-21302, a flaw that could potentially allow attackers to downgrade modern Windows operating systems without user awareness. This significant...
  4. NEWS Optus asks court to stop release of Deloitte cyberattack report

    Thousands of Optus customers who had personal details stolen in a cyberattack and leaked on the dark web may never find out how the breach happened after the telecommunications group pleaded “legal professional privilege” to try to stop a report into the hack being released. Optus asks court to...
  5. NEWS Australian horse riding organisations caught up in cyber attack impacting 10,000 people

    Cyber criminals have followed through on their threats of leaking the sensitive details of 10,000 people, after the company refused to bow to their extortion attempts. Cyber criminals have targeted yet another Australian small business by stealing and leaking the data of 10,000 people. Last...
  6. AA21-008A: Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments

    Original release date: January 8, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This Alert is a companion alert to Link Removed...
  7. VIDEO The Biggest Computer Hacks in History

    :eek:
  8. AA20-275A: Potential for China Cyber Response to Heightened U.S.–China Tensions

    Original release date: October 1, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. In light of heightened tensions between the United States and...
  9. AA20-126A: APT Groups Target Healthcare and Essential Services

    Original release date: May 5, 2020 Summary This is a joint alert from the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). CISA and NCSC continue to see indications that...
  10. AA19-339A: Dridex Malware

    Original release date: December 5, 2019 Summary This Alert is the result of recent collaboration between the Department of the Treasury Financial Sector Cyber Information Group (CIG) and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) to identify and share...
  11. Introducing the new Microsoft Edge and Bing

    The browser and search engine for business In our mission to empower people with knowledge with Microsoft 365, one critical opportunity is the internet. We know that 60% of the time people spend on the PC is within the web browser, and it has become the primary way we work, learn and play...
  12. Cybercrimes Go Unreported More Often Than People Think, Report Finds

    About half of organizations say cybercrime is under-reported at their organizations, even when reporting is required. Continue reading...
  13. VIDEO Equifax Just Equi-F'ed Everyone

    :eek::razz:
  14. TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors

    Original release date: April 27, 2017 Systems Affected Networked Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurring since at least May 2016, that uses multiple malware implants. Initial...
  15. New Windows 10 and Office 365 features for the secure productive enterprise

    Today I am pleased to join Scott Guthrie and Satya Nadella at Ignite, the largest IT conference in the industry with more than 20,000 attendees. It’s an exciting time to be in IT, with the modern workplace creating a major shift in the way people work. Information is abundant, experiences and...
  16. TA14-290A: SSL 3.0 Protocol Vulnerability and POODLE Attack

    Original release date: October 17, 2014 Systems Affected All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this...
  17. TA14-212A: Backoff Point-of-Sale Malware

    Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
  18. TA14-212A: Backoff Point-of-Sale Malware

    Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
  19. AVAST forum offline due to attack

    I'll give you the whole post; what this incident underlines, in my opinion, is the importance of having individual usernames in each Forum you attend, and creating passwords that are NOT names of family members or pets or such - individual passwords, too. I use Random Password Generator by...
  20. VIDEO NSA Reportedly Victorious in Penetrating Google and Yahoo! Cloud with Smiley Face

    In another bizarre turn of events regarding the leak of how Internet data is being collected and stored in aggregate form, presumably forever, a new slide released shows how Google's cloud security has been completely infiltrated by the US National Security Agency (NSA). The US has already...