"900k Impacted by Data Breach at Mississippi Healthcare Provider"

"900k Impacted by Data Breach at Mississippi Healthcare Provider"

Mississippi healthcare provider Singing River Health System (SRHS) recently notified roughly 900,000 individuals that their personal information was compromised in an August 2023 ransomware attack. SRHS revealed that its systems were compromised on August 16, 2023, while ransomware was deployed three days later, on August 19. SRHS noted that during this timeframe, the attackers accessed personal information such as names, addresses, dates of birth, Social Security numbers, and health and medical information.

Submitted by Adam Ekwall on

"How Attackers Deliver Malware to Foxit PDF Reader Users"

"How Attackers Deliver Malware to Foxit PDF Reader Users"

According to Check Point researchers, threat actors are exploiting Foxit PDF Reader's flawed alerts to deliver malware via booby-trapped PDFs. The researchers analyzed several campaigns involving malicious PDF files targeting Foxit Reader users. The attackers use various .NET and Python exploit builders, with the "PDF Exploit Builder" being the most popular. They create PDF documents with macros that execute commands/scripts. These download and execute "Agent Tesla," "Remcon RAT," "Xworm," "NanoCore RAT," and other malware.

Submitted by Gregory Rigby on

"NIST Finalizes Updated Guidelines for Protecting Sensitive Information"

"NIST Finalizes Updated Guidelines for Protecting Sensitive Information"

The National Institute of Standards and Technology (NIST) has finalized its updated guidelines for protecting Controlled Unclassified Information (CUI) in two publications titled "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations" and "Assessing Security Requirements for Controlled Unclassified Information." Contractors and other organizations doing business with the federal government now have clearer guidance for protecting the sensitive data they handle.

Submitted by Gregory Rigby on

"Female Health Apps Misuse Highly Sensitive Data, Study Finds"

"Female Health Apps Misuse Highly Sensitive Data, Study Finds"

New research from King's College London and University College London (UCL) delved into the poor data handling practices followed by apps designed for female health monitoring, which put users at risk of privacy and safety issues.

Submitted by Gregory Rigby on

"FBI Seize BreachForums Hacking Forum Used to Leak Stolen Data"

"FBI Seize BreachForums Hacking Forum Used to Leak Stolen Data"

The Federal Bureau of Investigation (FBI) has seized BreachForums, a forum that leaked and sold corporate data to cybercriminals. The seizure follows the leak of Europol law enforcement portal data on the website. BreachForums now shows a message saying the FBI controls the website and its backend data, suggesting that its servers and domains were seized. Gaining access to the hacking forum's backend data could help in law enforcement investigations due to the exposure of email addresses, IP addresses, and private messages between members.

Submitted by Gregory Rigby on

"Santander Customer Data Compromised Following Third-Party Breach"

"Santander Customer Data Compromised Following Third-Party Breach"

Banking giant Santander has recently announced that customer and employee data has been breached following a compromise of a third-party provider. The bank revealed that “certain information” relating to customers of Santander Chile, Spain, and Uruguay, as well as all current and some former Santander employees of the group, had been accessed by hackers. Customer data in all other Santander markets and businesses have not been affected. Santander said the breach was caused by threat actors’ unauthorized access to a Santander database hosted by a third-party provider.

Submitted by Adam Ekwall on

"400,000 Linux Servers Hit by Ebury Botnet"

"400,000 Linux Servers Hit by Ebury Botnet"

According to ESET, the Ebury Linux botnet has continued to grow over the past decade, with about 100,000 systems found to be infected at the end of 2023. Ebury, a botnet discovered in 2014, survived a takedown attempt and Maxim Senakh's sentencing for his involvement in the botnet's operation. Ebury is an OpenSSH backdoor and credential stealer that has continually been updated. It has infected over 400,000 hosts since 2009 for financial gain.

Submitted by Gregory Rigby on

"US Military Academy Wins First Place at the 2024 NSA Cyber Exercise"

"US Military Academy Wins First Place at the 2024 NSA Cyber Exercise"

The US Military Academy won the sixth National Security Agency (NSA) Cyber Exercise (NCX). Participants from US service academies and senior military colleges competed for the NCX trophy alongside individuals from NSA professional development programs. Teams conducted offensive cyber activities against a fictional adversary that attacked a satellite downlink.

Submitted by Gregory Rigby on

"Ongoing Campaign Bombards Enterprises with Spam Emails and Phone Calls"

"Ongoing Campaign Bombards Enterprises with Spam Emails and Phone Calls"

Rapid7 researchers have found a social engineering campaign that sends spam emails to enterprises to gain initial access for follow-on exploitation. The researchers reported that a threat actor floods a user's email with junk and calls to offer help to the user. The threat actor then prompts affected users to download Remote Monitoring and Management (RMM) software such as AnyDesk or run Microsoft's Quick Assist feature in order to set up a remote connection.

Submitted by Gregory Rigby on
Subscribe to