Category: EN

SK Telecom Malware Breach Exposes 27 Million Phone Numbers

  Last week, South Korean telecom firm SK Telecom announced that a malware-based data breach exposed over 27 million phone numbers, jeopardising user privacy and raising concerns in the cybersecurity community. The breach apparently lasted more than three years and…

Two Linux flaws can lead to the disclosure of sensitive data

Qualys warns of two information disclosure flaws in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise Linux, and Fedora distros. Researchers discovered a vulnerability in Apport (Ubuntu’s core dump handler) and another bug in systemd-coredump, which is used in the default…

Auditing Data Access Controls for Privacy Regulation Adherence

In an era where data breaches and privacy violations continue to make headlines, organizations worldwide face increased pressure to implement and verify robust data access controls. As of May 2025, regulatory bodies are intensifying enforcement of privacy regulations like GDPR,…

BSidesLV24 – Keynotes: Closing Ceremony

Author/Presenter: Daemon Tamer Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24…

Interlock Ransomware Deploys New NodeSnake RAT in UK Attacks

Quorum Cyber identifies two new NodeSnake RAT variants, strongly attributed to Interlock ransomware, impacting UK higher education and local government. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article:…

Achieving Data Privacy Regulation Compliance in 2025 Frameworks

As we progress through 2025, organizations worldwide face an increasingly intricate web of data privacy regulations. With new laws taking effect across multiple jurisdictions and existing frameworks becoming more stringent, achieving compliance has never been more challenging or essential. Companies…

Unlock sensitive data for AI with Cloudera on Red Hat OpenShift

Many organizations face challenges in creating value from data while maintaining strict regulatory standards set for handling sensitive data. For these organizations, handling large, complex data sets while maintaining efficiency, security and scalability becomes paramount to their deployment. The collaboration…

ESXi Environment Infiltrated Through Malicious KeePass Installer

Research by cybersecurity researchers has revealed that threat actors have been using tampered versions of KeePass password manager software to break into enterprise networks for several months. Researchers have discovered that this campaign has been sophisticated and ongoing for several…

Pig Butchering: Operation Shamrock Fights Back

  In this episode, the host delves into the alarming rise of ‘pig butchering’ scams, a form of fraud that preys on vulnerable and trusting individuals, often leaving them financially and emotionally devastated. These scams are orchestrated by organized crime…

Guide for delivering frequently software features that matter (series) #1/2: the Pillars of successful frequent delivery

Click below for the podcast version (AI generated): https://www.sorinmustaca.com/wp-content/uploads/2025/05/guide-for-delivering-1.mp3 Guide for delivering frequently software features that matter: the three Pillars of successful frequent delivery If you’re a software engineer older than 30 years, then you definitely have worked following a…