Latest privacy news

Breaches, fines & legislation

government fine healthcare service provider finance education retail dark web web telecoms social media manufacturing operating system travel tech gaming utilities app publishing security legal insurance transport web services defence
story hacked ransomware malware vulnerability phishing poor security accidental disclosure unsecured database unauthorised access insider threat lost device hacked email unsecured server stolen documents ddos website hacked Trojans inside job spear phishing RDP skimming spyware poor process financial
privacy security flaw user credentials poor operations breach notification legislation cyber attack third party enforcement email hacked customer data physical security court action insecure storage Cryptocurrency encryption VPN fraud employee data remote working state hacking application code denial of service staff training operating systems
310,000 Records Compromised In University Of Colorado Data Breach, Including Social Security Numbers & University Financial Information – CBS Denver
Maze/Egregor ransomware cartel estimated to have made $75 million | The Record by Recorded Future
A ransom of 500,000 euros demanded from the City of Isle-sur-la-Sorgue
Nation-state cyber attacks targeting businesses are on the rise | ZDNet
Hackers Hack Hackers as Underground Carding Site is Breached - Infosecurity Magazine
Investigating a unique "form" of email delivery for IcedID malware - Microsoft Security
Cybercriminals Put Out Facebook Ads for a Fake Clubhouse App That Was Riddled with Malware
An update from LinkedIn -
EU-UK private-sector data flows after Brexit
Gigaset Android Update Server Hacked to Install Malware on Users' Devices
Critical Zoom vulnerability triggers remote code execution without user input | ZDNet
Omroep Flevoland - Nieuws - Transportbedrijf Bakker rijdt minder vrachten door hack
Azure Functions Weakness Allows Privilege Escalation | Threatpost
IcedID Banking Trojan Surges: The New Emotet? | Threatpost
Data belonging to 500 million LinkedIn users found for sale on hacker marketplace | IT PRO
Facebook will not notify the half a billion users caught up in its huge data leak, it says | The Independent
Why do phishing attacks work? Blame the humans, not the technology | ZDNet
SASE or zero trust? Why security teams should be using both - Help Net Security
Arup staff caught up in ransomware attack | News | Building Design
Microsoft Office 365 phishing evades detection with HTML Lego pieces
CDPR should fix Cyberpunk 2077's bugs then move on | PC Gamer
Magistrátní síť ochromil kybernetický útok. Veškeré agendy magistrátu zůstávají mimo provoz - OLOMOUC.CZ
New wormable Android malware poses as Netflix to hijack WhatsApp sessions | ZDNet
$38 million worth of gift cards stolen and sold on dark web | WeLiveSecurity
How a VPN vulnerability allowed ransomware to disrupt two manufacturing plants | Ars Technica
Another supply-chain attack? Android maker Gigaset injects malware into victims' phones via poisoned update • The Register
Should firms be more worried about firmware cyber-attacks? - BBC News
Phishing Emails Most Commonly Originate from Eastern Europe - Infosecurity Magazine
Facebook refuses to apologise after personal data of 11m UK users hacked
SAP Bugs Under Active Cyberattack | Threatpost
Third-party security breach compromises data of Singapore job-matching service | ZDNet
Top cybercrime gangs use targeted fake job offers to deploy stealthy backdoor | CSO Online
Critical Bug in VMWare Carbon Black Allows Takeover | Threatpost
Your 'smart home' is watching – and possibly sharing your data with the police | Technology | The Guardian
Facebook data leak: Personal data and phone numbers from 533m users stolen and put online
Hack takes: A CISO and a hacker detail how they’d respond to the Exchange breach – TechCrunch
How to Find Out If Your Data Was Exposed in a Breach
Personal data for 533 million Facebook users leaks on the web | Engadget
Postmortem of PHP Core compromise continues | Laravel News
From PowerShell to Payload: An Analysis of Weaponized Malware | Threatpost