A leading Australian IVF clinic suspects personal patient information may have been compromised during a cyber attack earlier this month. On February 14, Genea suspended several services and launched an inquiry into suspicious activity discovered on its network. In…
Tag: EN
What cybersecurity pros read for fun
While cybersecurity pros spend much of their time immersed in technical reports, risk assessments, and policy documents, fiction offers a refreshing perspective on security and hacking. Great cyber-themed novels can teach lessons on human psychology, cyber warfare, and the ethics…
DISA Global Solutions Confirms Data Breach Affecting 3.3M People
DISA Global Solutions confirms data breach affecting 3.3M people, exposing sensitive personal info This article has been indexed from www.infosecurity-magazine.com Read the original article: DISA Global Solutions Confirms Data Breach Affecting 3.3M People
Microsoft Entra ID DNS Resolution Failures Results in Authentication Issues
A critical DNS misconfiguration in Microsoft Entra ID (formerly Azure Active Directory) disrupted authentication services globally for nearly 90 minutes on February 25, 2025, affecting organizations relying on Seamless Single Sign-On (SSO) and Microsoft Entra Connect Sync. The outage stemmed…
GRUB2 Vulnerabilities Exposes Millions of Linux Systems to Cyber Attack
A critical set of 20 vulnerabilities in GRUB2, the ubiquitous bootloader underpinning most Linux distributions and Unix-like systems, has exposed millions of devices to potential secure boot bypass, remote code execution, and persistent firmware-level attacks. These flaws (CVSS scores up…
Genea IVF Clinic Breached – Thousand of Patient Data at Risk
Genea, one of Australia’s largest IVF providers, has confirmed that an unauthorized third party accessed its systems, potentially compromising sensitive patient data. The breach has left thousands of patients uncertain about their treatment schedules and medication plans, as critical digital…
MITRE Details New Framework OCCULT for Managing AI Security Threats
The MITRE Corporation has unveiled a groundbreaking evaluation framework designed to quantify the risks posed by large language models (LLMs) in offensive cyber operations (OCO). Dubbed OCCULT (Operational Evaluation Framework for Cyber Security Risks in AI), the methodology aims to…
Orange Communication Breached – Hackers Allegedly Claim Leak of 380,000 Emails
Orange Communication data breach was claimed by a threat actor using the pseudonym “Rey,” who was responsible for leaking 380,000 email records and sensitive corporate data on a dark web forum. The alleged breach, disclosed earlier this week, includes source…
Android happy to check your nudes before you forward them
The Android app SafetyCore was silently installed and looks at incoming and outgoing pictures to check their decency. This article has been indexed from Malwarebytes Read the original article: Android happy to check your nudes before you forward them
Roblox called “real-life nightmare for children” as Roblox and Discord sued
Last week it was reported that a lawsuit has been initiated against gaming giant Roblox and leading messaging platform Discord. The court… This article has been indexed from Malwarebytes Read the original article: Roblox called “real-life nightmare for children” as Roblox…
Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts
More than a year’s worth of internal chat logs from a ransomware gang known as Black Basta have been published online in a leak that provides unprecedented visibility into their tactics and internal conflicts among its members. The Russian-language chats…
Have I Been Pwned Adds ALIEN TXTBASE Data 280M Emails & Passwords
HaveIbeenPwned (HIBP) website has significantly expanded its database with hundreds of millions of newly compromised credentials extracted by hackers though infostealer logs. This article has been indexed from Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News Read the…
TechCrunch Disrupt 2025: 3 days left to save up to $1,130 on passes
Tick-tock! The last three days to save up to $1,130 to TechCrunch Disrupt 2025 are winding down! Get your tickets today for massive savings on Disrupt 2025 individual passes and up to 30% on group tickets. These offers end February…
Biggest Challenges in Developing Fintech Apps & How to Overcome Them
The fintech industry has revolutionized the way we manage money, invest, and conduct financial transactions. With the rise of digital banking, mobile wallets, and investment…Read More The post Biggest Challenges in Developing Fintech Apps & How to Overcome Them appeared…
Fortanix protects enterprises from AI and quantum computing threats
Fortanix announced new capabilities to its data encryption and key management platform. Even as organizations struggle to manage the rising costs and complexity of data security, advances in AI and quantum computing will render current protections obsolete. Quantum computers will…
Is your email or password among the 240+ million compromised by infostealers?
For the second time since the start of 2025, a huge number of login credentials extracted from infostealer logs has been added to the database powering the HaveIBeenPwned (HIBP) site and breach notification service. In January 2025, HIBP’s creator Troy…
Confluence Exploit Leads to LockBit Ransomware
Key Takeaways Case Summary The intrusion started with the exploitation of CVE-2023-22527, a critical remote code execution vulnerability in Confluence, against a Windows server. The first indication of threat actor … Read More This article has been indexed from The…
Zero Trust Network Access Without the Performance Penalty
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Zero Trust Network Access Without the Performance Penalty
PCI DSS v4.0.1: The Changes You Need to Know to Qualify for SAQ A
What’s changed in PCI DSS v4.0.1? Get a breakdown of what these new requirements mean and how Akamai?s solutions can help. This article has been indexed from Blog Read the original article: PCI DSS v4.0.1: The Changes You Need to…
AI-Powered Ransomware Attacks
The improvement of artificial brainpower (artificial intelligence) has improved many fields, including digital protection. Notwithstanding, this mechanical improvement is a two-sided deal. While computerized reasoning brings many advantages, it also empowers cybercriminals to send off progressively complex and disastrous assaults. …