The Breach News

Ransomware Assaults Target Texas University and Namibia Telecom

Interlock Ransomware Attacks Texas Tech University Health Sciences Center A lesser-known ransomware group, Interlock, has launched a significant cyberattack against the Texas Tech University Health Sciences Center, jeopardizing the personal data of nearly 1.46 million patients. This group claims to have breached the university’s network in September 2024, exfiltrating over…

Read MoreRansomware Assaults Target Texas University and Namibia Telecom

Vulnerable Cleo Managed File Transfer Software Without Updates

Attack Surface Management, Governance & Risk Management, Patch Management Over 200 Vulnerable Servers Targeted by Ransomware Group Amid Growing Exploits Mathew J. Schwartz (euroinfosec) • December 18, 2024 Recent reports indicate over 200 Cleo managed file-transfer servers remain publicly accessible and without necessary updates, posing significant risks in light of…

Read MoreVulnerable Cleo Managed File Transfer Software Without Updates

Meta Faces $263 Million Fine in Europe Due to 2018 Data Breach

GDPR Compliance: A Governance Imperative for Modern Businesses As the landscape of data privacy continues to evolve, the importance of compliance with the General Data Protection Regulation (GDPR) has reached an urgency unprecedented in the business world. Thomas George, president of Cybermedia Research, emphasizes that companies, as legal entities, are…

Read MoreMeta Faces $263 Million Fine in Europe Due to 2018 Data Breach

Strategies for Mitigating Cyber Threats in the Chemical Industry

The chemical industry is integral to the global economy, supplying essential materials spanning pharmaceuticals and agriculture. However, with technological advancements come heightened risks to digital infrastructures. The sector is increasingly vulnerable to various cyber threats like ransomware, data breaches, and industrial espionage, which can precipitate dire outcomes, from production halts…

Read MoreStrategies for Mitigating Cyber Threats in the Chemical Industry

CISA Mandates Secure Cloud Configurations for Federal Agencies

Federal Agencies Mandated to Implement New Cloud Security Policies by 2025 In a significant move aimed at enhancing cybersecurity across the federal landscape, the Cybersecurity and Infrastructure Security Agency (CISA) has announced that U.S. civilian agencies will be required to adopt secure configuration baselines for key software-as-a-service (SaaS) platforms beginning…

Read MoreCISA Mandates Secure Cloud Configurations for Federal Agencies

Ireland Imposes €251 Million Fine on Meta for Data Breach Affecting 29 Million Users

Meta Platforms Fined €251 Million by Ireland’s Data Protection Commission for Data Breach In a significant ruling, Ireland’s Data Protection Commission (DPC) has imposed a fine of €251 million (approximately US$264 million) on Meta Platforms’ Irish subsidiary. This penalty stems from two investigations into a personal data breach that reportedly…

Read MoreIreland Imposes €251 Million Fine on Meta for Data Breach Affecting 29 Million Users

Hackers Demand Ransom Following Data Breach of Rhode Island Health System

Cyberattack on Rhode Island’s RIBridges System Exposes Sensitive Resident Data In a significant cybersecurity incident, hackers have breached Rhode Island’s health and benefits administration platform, RIBridges, which manages critical state support programs. The attackers have reportedly demanded ransom while threatening to expose sensitive personal information related to the state’s residents.…

Read MoreHackers Demand Ransom Following Data Breach of Rhode Island Health System

Australia to Eliminate Weak Encryption Algorithms by 2030

Encryption & Key Management, Geo Focus: Australia, Geo-Specific Regulatory Authorities Warn NIST’s 2035 Encryption Deadline May Be Insufficient Jayant Chakravarti (@JayJay_Tech) • December 17, 2024 Image: Shutterstock Australia is proactively advancing a strategic plan aimed at mitigating risks associated with future quantum computing threats to cybersecurity. In a decisive move,…

Read MoreAustralia to Eliminate Weak Encryption Algorithms by 2030