Colonial Pipeline Data Breach Surfaces After Ransomware Attack | #malware | #ransomware | #cybersecurity | #infosecurity | #hacker | National Cyber Security

Colonial Pipeline Data Breach Surfaces After Ransomware Attack | #malware | #ransomware | #cybersecurity | #infosecurity | #hacker | National Cyber Security

The thousands of people impacted by the data breach are now being notified by Colonial Pipeline. Colonial Pipeline has discovered a data breach involving the personal information of more than 5,800 individuals. The data breach comes after the headline-grabbing ransomware attack in May. According to Bleeping Computer, Darkside operators collected and exfiltrated documents containing the…

Multiple Flaws Affecting Realtek Wi-Fi SDKs Impact Nearly a Million IoT Devices

Multiple Flaws Affecting Realtek Wi-Fi SDKs Impact Nearly a Million IoT Devices

Multiple Flaws Affecting Realtek Wi-Fi SDKs Impact Nearly a Million IoT Devices | IT Security News 17. August 2021 This article has been indexed from The Hacker News Taiwanese chip designer Realtek is warning of four security vulnerabilities in three software development kits (SDKs) accompanying its WiFi modules, which are used in almost 200 IoT devices made…

How Jefferson Health enhanced cybersecurity via its cloud transformation

How Jefferson Health enhanced cybersecurity via its cloud transformation

The cybersecurity mantra at Jefferson Health is “if we can’t do it well, we’re not going to do it” says Mark Odom, CISO of the Philadelphia-based healthcare organization. Such an approach has proved integral to Jefferson Health’s fast-tracked transition to a cloud-first, remote model to meet the demands of the COVID-19 pandemic. In fact, by…

Does Abandoning Embassy in Kabul Pose Cybersecurity Risks?

Does Abandoning Embassy in Kabul Pose Cybersecurity Risks?

Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Governance & Risk Management Security Experts Size Up Impact of US Rush to Leave Afghanistan Doug Olenick (DougOlenick) • August 17, 2021     It’s unlikely that the U.S. abandoning its embassy and other facilities in Afghanistan poses cyber risks, thanks to the emergency planning…

T-Mobile reportedly facing massive user data breach, would be its fourth in as many years | #android | #security | #cybersecurity | #infosecurity | #hacker | National Cyber Security

T-Mobile reportedly facing massive user data breach, would be its fourth in as many years | #android | #security | #cybersecurity | #infosecurity | #hacker | National Cyber Security

It seems like we can’t go a week without hearing about another massive security breach at a mega-corporation. This week’s shocker comes courtesy of T-Mobile, at least according to one self-reported hacker claiming to sell the company’s customer data. T-Mobile says it’s “investigating” the possible theft of data from over 100 million people. If true,…

FireEye, CISA Warn of Critical IoT Device Vulnerability

FireEye, CISA Warn of Critical IoT Device Vulnerability

Endpoint Security , Internet of Things Security Researchers: Kalay Protocol Flaw Could Affect Millions of Connected Devices Scott Ferguson (Ferguson_Writes) • August 17, 2021     Example of how an attacker could exploit a vulnerability in ThroughTek’s Kalay protocol (Source: FireEye) FireEye researchers and the U.S. Cybersecurity and Infrastructure Security Agency are warning about a…

Pearson Slammed for Breach – Wasn’t Just ‘Data Exposure’

Pearson Slammed for Breach – Wasn’t Just ‘Data Exposure’

Breach Notification , Governance & Risk Management , Incident & Breach Response Firm Pays $1 Million Settlement After Regulator Says It Misled Investors and Victims Mathew J. Schwartz (euroinfosec) • August 17, 2021     When is a data exposure not just a data exposure? See Also: Live Webinar | Password Management: Securing Hybrid Work…