Novant Health Breach Expose Data of 1.3 million Patients

The U.S. healthcare provider Novant Health has confirmed a data breach in which information from 1,362,296 people leaked. The incident was caused by a misconfigured Meta pixel on the Novant Health website and the ‘MyChart’ portal, which transmitted privacy information to Meta and its advertising partners. The incident began in May 2020, when Novant ran advertising […]

FBI warns of Residential Proxies Used in Credential Stuffing Attacks

The U.S. Federal Bureau of Investigation (FBI) has warned of residential proxies used by attackers for large-scale credential stuffing attacks. Credential Stuffing is a type of attack in which threat actors use large collections of username/password combinations uncovered in previous data breaches to gain access to other online platforms. The FBI warns that threat actors […]

Hackers exploit zero-day vulnerability to steal crypto from Bitcoin ATMs

Hackers have exploited a zero-day vulnerability in General Byte Bitcoin ATM to steal cryptocurrencies from users. The zero-day flaw exploited by the attacker was found in company’s Crypto Application Server (CAS). According to General Byte, the attackers scanned the internet for exposed servers running on TCP ports 7777 or 443, including servers hosted by Digital […]

Twitter Subpoena ex-Twitter Chief Jack Dorsey over Twitter Lawsuit

Public filings show Musk’s lawyers are demanding documents and communications from former Twitter CEO Jack Dorsey about how Twitter recognizes, identifies and counts fake accounts and how the company uses active users as a key measure of its finances on a daily basis. Twitter is suing Tesla CEO Elon Musk for backtracking on his decision […]

Demand for Expensive Smartphone Still High Despite Sector Decline

Expensive smartphones are still in high demand, despite the general decline in demand for smartphones. Global smartphone sales fell 9 percent in the last quarter compared with the same period last year, and brands such as Xiaomi, Vivo and Oppo saw demand decline. Despite the decline, smartphones costing more than US$1,000 grew in the first […]

Oracle Sued for Tracking Over Five Billion People

Irish Council for Civil Liberties (ICCL) senior fellow Johnny Ryan is suing the tech giant Oracle for tracking and monitoring people. The lawsuit was filed in California and is jointly led by two U.S. privacy advocates, Michael Katz-Lacabe and Maryland associate professor Dr Jennifer Golbeck. “Oracle claims to have amassed detailed dossiers on five billion […]

How Organizations can Protect Themselves from RaaS Attacks

In its Cyber Signals Report of August 2022, entitled Extortion Economics, Microsoft outlines steps that organizations can take to protect their systems from Ransomware-as-a-service attacks. As ready-made RaaS kits are available, launching an attack no longer requires technical know-how and organizations must prepare for possible attacks. Security measures that organizations can take include preventing initial […]

Attackers can Bypass MFA by Exploiting Authentication Cookie

Multi-factor authentication is an important security measure for users and organizations. However, it is not enough, as attackers can manipulate and bypass it via the cookie authentication available on websites. According to a recent release from Sophos, “Cookies associated with authentication to web services can be used by attackers in ‘pass the cookie’ attacks, attempting […]