"Record $65m Settlement for Hacked Patient Photos"

"Record $65m Settlement for Hacked Patient Photos"

A record $65 million settlement was reached for a Pennsylvania healthcare company's medical record hack, which affected hundreds of patients and employees. The case involved about 135,000 patients and employees of the Pennsylvania-based independent healthcare network Lehigh Valley Health Network (LVHN). LVHN's data breach exposed 600 patients' and employees' medical records and Personally Identifiable Information (PII). The exposed data included addresses, email addresses, birthdates, Social Security numbers, passport information, medical data, and nude patient photos.

Submitted by grigby1 CPVI on

"New 'Hadooken' Linux Malware Targets WebLogic Servers"

"New 'Hadooken' Linux Malware Targets WebLogic Servers"

Aqua Security's Nautilus research team warns that "Hadooken" Linux malware has been targeting Oracle WebLogic servers to launch additional malware and steal credentials for lateral movement. The malware is used in attacks that exploit weak passwords for initial access. After compromising a WebLogic server, the attackers downloaded shell and Python scripts to fetch and run the malware. This article continues to discuss findings regarding the Hadooken malware targeting Oracle WebLogic applications and its link to multiple ransomware families.

Submitted by grigby1 CPVI on

"RansomHub Claims Kawasaki Cyberattack, Threatens to Leak Stolen Data"

"RansomHub Claims Kawasaki Cyberattack, Threatens to Leak Stolen Data"

The "RansomHub" ransomware gang is threatening to leak data allegedly stolen from Kawasaki Motors Europe (KME). The company has announced it is recovering from the cyberattack that disrupted service. The company is investigating and cleaning any suspicious material on its systems after the attack on its EU headquarters. KME is a subsidiary of Kawasaki Heavy Industries, a global Japanese company that makes motorcycles, utility vehicles, and other motorized products.

Submitted by grigby1 CPVI on

SecureWorld Pacific Virtual Conference

"Join your fellow InfoSec professionals for high-quality training and collaboration, whether virtual or in-person. Earn 6-18 CPE credits through 20-40 educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and networking opportunities. Evaluate top vendor solutions and meet with local chapters of security associations."

SecureWorld MidWest Virtual Conference

"Join your fellow InfoSec professionals for high-quality training and collaboration, whether virtual or in-person. Earn 6-18 CPE credits through 20-40 educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and networking opportunities. Evaluate top vendor solutions and meet with local chapters of security associations."

SecureWorld Seattle

"Join your fellow InfoSec professionals for high-quality training and collaboration, whether virtual or in-person. Earn 6-18 CPE credits through 20-40 educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and networking opportunities. Evaluate top vendor solutions and meet with local chapters of security associations."

SecureWorld New York City

"Join your fellow InfoSec professionals for high-quality training and collaboration, whether virtual or in-person. Earn 6-18 CPE credits through 20-40 educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and networking opportunities. Evaluate top vendor solutions and meet with local chapters of security associations."

Virtual Institutes Mid-Year Meeting Summary

Virtual Institutes Mid-Year Meeting Summary

The Science of Security (SoS) Virtual Institutes (VIs) held their Mid-Year meeting at the International Computer Science Institute (ICSI) on July 9-10, 2024. This was the second meeting of the VIs since they were formed in late 2023.  The meeting was attended by Principal Investigators (PIs) and/or Co-PIs from all seven VI universities who briefed the status of the eleven VI projects.

Submitted by grigby1 CPVI on

"Malicious Actors Spreading False US Voter Registration Breach Claims"

"Malicious Actors Spreading False US Voter Registration Breach Claims"

According to the FBI and CISA, malicious actors are spreading false claims that US voter registration databases have been breached.  The agencies said that the claims are designed to manipulate public opinion and undermine confidence in US democratic institutions in the run up to the US Presidential Elections in November.  The malicious actors are using obtained voter registration information as evidence to support their claims that a cyber operation compromised election infrastructure.

Submitted by Adam Ekwall on

"Hackers Proxyjack & Cryptomine Selenium Grid Servers"

"Hackers Proxyjack & Cryptomine Selenium Grid Servers"

Threat actors have been infecting Internet-exposed Selenium Grid servers to use victims' Internet bandwidth for cryptomining, proxyjacking, and more. Wiz reports that 30 percent of cloud environments use Selenium, an open source suite of tools for browser automation. Millions of developers and thousands of organizations use Selenium Grid, an open source tool for automatically testing web applications across multiple platforms and browsers in parallel. Some hackers have launched automated malware to hijack Selenium Grid servers for malicious purposes.

Submitted by grigby1 CPVI on
Subscribe to