Category: EN

Legacy VPNs: A Ticking Time Bomb for Modern Organizations

In an era defined by the exponential growth of digital transformation, traditional Virtual Private Network (VPN) solutions have become a significant liability for modern organizations.  While VPNs were once heralded as a secure method of enabling remote connectivity, they are…

Tibber – 50,002 breached accounts

In November 2024, the German electricity provider Tibber suffered a data breach that exposed the personal information of 50k customers. The data included names, email addresses, geographic locations (city and postcode) and total spend on purchases. The data was provided…

Yonéma – 35,962 breached accounts

In November 2024, data from the Senegalese payment platform Yonéma was posted to a popular hacking forum. The data included 36k unique email addresses alongside phone numbers, names and what appears to be encrypted passwords and dates of birth. This…

Red Team vs Blue Team in Cybersecurity

Learn what a red team and blue team in cybersecurity are, pros and cons of both, as well as how they work together. The post Red Team vs Blue Team in Cybersecurity appeared first on OffSec. This article has been…

Canadian Eyecare Firm Care1 Exposes 2.2TB of Patient Records

Another day, another healthcare database misconfiguration exposing sensitive patient information. This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: Canadian Eyecare Firm Care1 Exposes 2.2TB of Patient Records

Risk & Repeat: Attacks ramp up on Cleo MFT software

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: Risk & Repeat: Attacks ramp up…

Google Timeline location purge causes collateral damage

Privacy measure leaves some mourning lost memories A year ago, Google announced plans to save people’s Location History, which it now calls Timeline, locally on devices rather than on its servers.… This article has been indexed from The Register –…

Decrypting Full Disk Encryption with Dissect

Author: Guus Beckers Back in 2022 Fox-IT decided to open source its proprietary incident response tooling known as Dissect. Since then it has been adopted by many different companies in their regular workflow. For those of you who are not yet familiar…