District 70 parents were told that while no child’s Social Security number was impacted by the breach, other data, including name, birth date, school of enrollment, student ID and gender had been compromised.
Tailscale announced that it raised $100 million in a Series B funding round co-led by CRV and Insight Partners, with participation from Accel, Heavybit, and Uncork Capital.
According to Malwarebytes, attackers are luring artists with offers to work on further expansion of the Cyberpunk Ape Executives NFT project and design new sets of characters with offers of up to $350 per day.
If GCP is not configured correctly, it could be exploited by attackers to engage in malicious activity inside a user’s cloud environment, according to cloud security company Mitiga
Officials from the Department of Defense highlighted the importance of having associate contractors secure sensitive data stored on digital networks, stating that the next security frontier hinges on cybersecurity.
Researchers have observed the Nobelium group setting up new infrastructure to perform attacks with old techniques. The group is based in Russia and was behind the infamous SolarWinds attack.
The Pixel Update Bulletin contains details of security vulnerabilities and functional improvements affecting supported Pixel devices. In total, these two bulletins mention three critical vulnerabilities, two of which only concern Pixel users.
South Korea’s intelligence agency said on Thursday that the country has joined a cyber defense group under the North Atlantic Treaty Organization (NATO), becoming its first Asian member country.
Federal Court of Australia finds RI Advice failed to manage cybersecurity risks in landmark decision
The decision comes after a significant number of cyber incidents affected authorized representatives of RI Advice between June 2014 and May 2020, leading ASIC to file against the company for breach of its license obligations.
Sprite Spider is an active criminal crew since at least 2017 and is usually characterized by its effectiveness and speed in compromising the targeted environment. It uses offensive tools such as Vatet (or VatetLoader), PyXie, and Cobalt Strike.