The Breach News

India’s DPDP Act Triggers Major Overhaul of Hotel Contracts Due to Data Liability Concerns

Transforming Contracts in the Wake of Data Privacy Legislation The Indian hospitality sector is currently experiencing a profound reassessment of its contractual agreements, catalyzed by the introduction of the Digital Personal Data Protection (DPDP) Act, 2023. Hotel operators are pursuing renegotiations of existing contracts with global partners and booking platforms,…

Read MoreIndia’s DPDP Act Triggers Major Overhaul of Hotel Contracts Due to Data Liability Concerns

Russian Hackers Believed to Be Exploiting Unpatched PaperCut Servers

Print management software provider PaperCut has issued a warning indicating that unpatched servers are being actively exploited in the wild. This alarming announcement follows two vulnerability reports from cybersecurity firm Trend Micro, which highlight significant security lapses within the PaperCut software. According to PaperCut, an analysis of customer reports revealed…

Read MoreRussian Hackers Believed to Be Exploiting Unpatched PaperCut Servers

Nearly Half a Billion Dollars Stolen from Japanese Cryptocurrency Exchange

Massive Cyber Heist Strikes Coincheck, Costing $532 Million in Digital Assets In an alarming development in the cryptocurrency sector, Tokyo-based exchange Coincheck has reported a significant breach, losing approximately $532 million in digital assets. This loss includes around $420 million in NEM tokens and an additional $112 million in Ripple…

Read MoreNearly Half a Billion Dollars Stolen from Japanese Cryptocurrency Exchange

Securing CPS in the Age of AI: The Need for a Programmatic Approach – Webinar

Sean Tufts: Championing Cybersecurity in Industrial Sectors Field CTO, Industrial, Claroty Sean Tufts stands at the forefront of cybersecurity, renowned for his extensive expertise in industrial security. As the Field Chief Technology Officer at Claroty, he combines comprehensive knowledge of cybersecurity practices with strong leadership in go-to-market strategies, driven by…

Read MoreSecuring CPS in the Age of AI: The Need for a Programmatic Approach – Webinar

Data Breach: Hackers Expose Over Two Million Records Following Harvard and UPenn’s Ransom Rejection

A significant data breach has emerged, as a cybercrime organization known as ShinyHunters has claimed responsibility for leaking over two million personal records reportedly stolen from Harvard University and the University of Pennsylvania (UPenn). This incident marks an escalation of last year’s data breaches, creating a serious privacy crisis for…

Read MoreData Breach: Hackers Expose Over Two Million Records Following Harvard and UPenn’s Ransom Rejection

Apache Superset Security Flaw: Insecure Default Settings Leave Servers Vulnerable to RCE Attacks

The maintainers of the open-source data visualization platform, Apache Superset, have announced critical security measures to address an insecure default configuration that exposes installations to potential remote code execution vulnerabilities. This security flaw, identified as CVE-2023-27524 with a notable CVSS score of 8.9, affects all versions up to 2.0.1 due…

Read MoreApache Superset Security Flaw: Insecure Default Settings Leave Servers Vulnerable to RCE Attacks

Cryptocurrency Mining Malware Compromised Over 500,000 PCs Using NSA Exploit

In 2017, the cyber landscape was marked by significant data breaches and ransomware incidents. This year, however, there has been a notable surge in cryptocurrency-related malware, indicating a shift in the tactics favored by cybercriminals. Multiple cybersecurity firms are now reporting the emergence of new cryptocurrency mining viruses, many of…

Read MoreCryptocurrency Mining Malware Compromised Over 500,000 PCs Using NSA Exploit

New Guidelines Outline Apple’s Legal Protocol for Processing Law Enforcement Data Requests

Apple Clarifies Guidelines for Law Enforcement Data Requests In a recent disclosure, Apple has reaffirmed its position on the handling of user data in response to legal requests from U.S. law enforcement agencies. Despite longstanding suspicions fueled by revelations about the National Security Agency (NSA)’s DROPOUTJEEP program, Apple continues to…

Read MoreNew Guidelines Outline Apple’s Legal Protocol for Processing Law Enforcement Data Requests

Live Webinar: Implementing Zero Trust in the Middle Mile – Leveraging AI for Optimal Access Management, Reducing Alert Noise, and Ensuring Compliance

Governance & Risk Management: Embracing Zero Trust Presented by Microsoft Duration: 60 minutes As federal agencies progress through their Zero Trust implementations, many encounter challenges in translating strategic goals into actionable, measurable outcomes. This webinar aims to shed light on how artificial intelligence (AI) can support security teams in refining…

Read MoreLive Webinar: Implementing Zero Trust in the Middle Mile – Leveraging AI for Optimal Access Management, Reducing Alert Noise, and Ensuring Compliance