Sinclair Confirms Ransomware Attack That Disrupted TV Stations

A major cyberattack resulted in data being stolen, too, but Sinclair’s not sure which information is now in the hands of the crooks. Sinclair Broadcast Group, which owns hundreds of…

Brazilian marketplace integrator Hariexpress exposed 1.75 billion records

At the time of publishing this article, the data was still exposed and growing as there has been no response from Hariexpress. The Brazilian E-commerce Marketplace Integrator platform Hariexpress (Hariexpress.com.br)…

30 Mins or Less: Rapid Attacks Extort Orgs Without Ransomware

The previously unknown SnapMC group exploits unpatched VPNs and webserver apps to breach systems and carry out quick-hit extortion in less time than it takes to order a pizza. In…

Incident Response: 5 Principles to Boost the Infosec/Legal Relationship

Effective cyber-incident response means working well with legal. Matt Dunn, associate managing director for cyber-risk at Kroll, lays out how to do it. As an information-security professional, would you feel…

Navy Warship’s Facebook Page Hacked to Stream ‘Age of Empires’ Gaming

The destroyer-class USS Kidd streamed hours of game play in a funny incident that has serious cybersecurity ramifications. The official Facebook page of a destroyer-class Navy warship, the USS Kidd,…

Twitch Leak Included Emails, Passwords in Clear Text: Researcher

A researcher combed through the Twitch leak and found what they said was evidence of PayPal chargebacks with names and emails; employees’ emails; and more. Twitch users, if you haven’t…

Twitch Leak Included Emails, Passwords in Clear Text: Researcher

A researcher combed through the Twitch leak and found what they said was evidence of PayPal chargebacks with names and emails; employees’ emails; and more. Twitch users, if you haven’t…

Twitch Gets Gutted: All Source Code Leaked

An anonymous user posted a link to a 125GB torrent to 4chan yesterday, containing all of Twitch’s source code, comments going back to its inception and more. An attacker claims…

How to Build an Incident-Response Plan, Before Security Disaster Strikes

Joseph Carson, Chief Security Scientist at ThycoticCentrify, offers a 7-step practical IR checklist for ensuring a swift recovery from a cyberattack. In a startling discovery, a recent report found that…

Transnational Fraud Ring Bilks U.S. Military Service Members Out of Millions

A former medical records tech stole PII that was then used to fraudulently claim DoD and VA benefits, particularly targeting disabled veterans. More than 3,300 U.S. military service members, military…