A cyberattack impacted operations at UK Wirral University Teaching Hospital
28
Nov
2024

A cyberattack impacted operations at UK Wirral University Teaching Hospital

A cyberattack impacted operations at UK Wirral University Teaching Hospital Pierluigi Paganini November 28, 2024 UK’s Wirral University Teaching Hospital…

SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive And Dropbox
28
Nov
2024

SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive And Dropbox

UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access to target networks, which are often…

Naveen Goud
28
Nov
2024

Microsoft denies using Office 365 data for training its AI Intelligence

For the past two days, social media platforms have been abuzz with claims that Microsoft, the software giant, has been…

Data broker exposes 600,000 sensitive files including background checks
28
Nov
2024

Data broker exposes 600,000 sensitive files including background checks

A researcher has discovered a data broker had stored 644,869 PDF files in a publicly accessible cloud storage container. The…

T-Mobile detected network intrusion attempts and blocked them
28
Nov
2024

T-Mobile detected network intrusion attempts and blocked them

T-Mobile detected network intrusion attempts and blocked them Pierluigi Paganini November 28, 2024 T-Mobile reported recent infiltration attempts but pointed…

New Skimmer Malware Steals Credit Card Data From Checkout Pages
28
Nov
2024

New Skimmer Malware Steals Credit Card Data From Checkout Pages

Protect Websites & APIs from Malware Attack Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations,…

Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations
28
Nov
2024

Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations

In today’s rapidly evolving threat landscape, security leaders must make informed decisions to protect their organizations effectively. The “MITRE Engenuity…

Researchers Detailed New Exfiltration Techniques Used By Ransomware Groups
28
Nov
2024

Researchers Detailed New Exfiltration Techniques Used By Ransomware Groups

Ransomware groups and state-sponsored actors increasingly exploit data exfiltration to maximize extortion and intelligence gains by leveraging a mix of…

Propertyrec Leak Exposes Over Half a Million Background Check Records
28
Nov
2024

Propertyrec Leak Exposes Over Half a Million Background Check Records

Summary Massive Data Leak: Propertyrec exposed over 644,000 records, totaling 713 GB of sensitive data. Sensitive Information: Leaked data includes…

Artificial Intelligence can save UK public services – fact or fiction?
28
Nov
2024

Artificial Intelligence can save UK public services – fact or fiction?

In October 2023 I wrote an opinion article extolling the virtues of Gen AI for the Higher Education sector: Generative…

WA to hire a chief data officer as privacy law passes
28
Nov
2024

WA to hire a chief data officer as privacy law passes – Security

Western Australia will hire a chief data officer and create its own scheme for mandatory reporting of notifiable data breaches…

North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects
28
Nov
2024

North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects

North Korean threat actors target software developers with weaponized Javascript projects that include BeaverTail malware deployed via NPM packages. It…