Attackers Stole 8.6 Million Customers’ Details

Attackers Stole 8.6 Million Customers’ Details

Breach Notification , Cybercrime , Cybercrime as-a-service 40 Million Credit Applications Also Stolen; Social Security Numbers Exposed Mathew J. Schwartz (euroinfosec) • August 18, 2021     T-Mobile’s store in Times Square, New York (Photo: T-Mobile) T-Mobile USA has confirmed that its systems were breached and that investigators have found that details for 8.6 million…

Nigerian Gang Asks for Insider Help to Plant Ransomware

Nigerian Gang Asks for Insider Help to Plant Ransomware

Fraud Management & Cybercrime , Governance & Risk Management , Insider Threat Researchers Learn Details During a Telegram Chat With an Attacker Doug Olenick (DougOlenick) • August 19, 2021     Ransom demand screen provided by the attacker to Abnormal Security A Nigeria-based ransomware gang is conducting a campaign that dangles a $1 million bribe…

US Census Bureau Criticized for Handling of Breach

US Census Bureau Criticized for Handling of Breach

Governance & Risk Management , Government , Incident & Breach Response OIG Report: Bureau Did Not Properly Maintain Security Logs of Incident Scott Ferguson (Ferguson_Writes) • August 19, 2021     Photo: U.S. Census Bureau Following a breach of some of its servers in January 2020, the U.S. Census Bureau failed to follow standard cybersecurity…

‘Don’t forget the 500,000 internally displaced Afghans’ – UNCHR

‘Don’t forget the 500,000 internally displaced Afghans’ – UNCHR

While there has been much attention on Afghans being evacuated at Kabul airport, it was important to remember there were more than 500,000 internally displaced people in the country, the UN refugee agency’s representative to Afghanistan has said. Caroline Van Buren told BBC World News that the country was facing a humanitarian crisis. Failure to…

Afghanistan: Hard lessons to be learned for Nato, says Stoltenberg

Afghanistan: Hard lessons to be learned for Nato, says Stoltenberg

There are some hard and difficult lessons to be learned about the recent events in Afghanistan, Nato Secretary General Jens Stoltenberg has said. It was a tragedy that the Afghan security forces collapsed so quickly, Mr Stoltenberg told BBC World News. He blamed a lack of leadership and logistics from the Afghan government, rather than…

T-Mobile Data Breach Amplifies Larger Cybersecurity Challenge

T-Mobile Data Breach Amplifies Larger Cybersecurity Challenge

Reports came out this week that T-Mobile had suffered a data breach. T-Mobile claims that the leak has been sealed. They deserve credit for responding quickly, but for some the damage may already be done. The data itself may not pose a direct risk to anyone, but the more information cybercriminals can obtain and correlate,…

CVE-2021-34715 – Alert Detail – Security Database

CVE-2021-34715 – Alert Detail – Security Database

Executive Summary Informations Name CVE-2021-34715 First vendor Publication 2021-08-18 Vendor Cve Last vendor Modification 2021-08-18 Security-Database Scoring CVSS v3 Cvss vector : N/A Overall CVSS Score NA Base Score NA Environmental Score NA impact SubScore NA Temporal Score NA Exploitabality Sub Score NA   Calculate full CVSS 3.0 Vectors scores Security-Database Scoring CVSS v2 Cvss…

OODA Loop – Bug in Millions of Flawed IoT Devices Lets Attackers Eavesdrop

OODA Loop – Bug in Millions of Flawed IoT Devices Lets Attackers Eavesdrop

Security researchers have reported a critical flaw affecting tens of millions of IoT devices. According to the researchers, a remote attacker could leverage the vulnerability to eavesdrop on live audio or take control of the device. The flaw was found in ThroughTek’s Kalay network, which is used in 83 million devices. The flaw also affects…

Critical bug impacting millions of IoT devices allows hackers to spy on you

Critical bug impacting millions of IoT devices allows hackers to spy on you

millions of iot,hackers to spy,bug impacting millions,vulnerability affecting millions,throughtek’s kalay iot,iot devices,infrastructure security agency,devices allows hackers,iot cloud platform,critical bug impacting,automation iot systems,tapping into real-time,obtain kalay uids,security researchers