The Korea JoongAng Daily reports: Financial regulators have ordered Lotte Card to set up a dedicated call center for victims of a recent hacking incident and to prepare procedures for full compensation in cases of any fraudulent card use. The order comes after a cyber breach was reported at the company with 9.65 million individual…
Category: Breach Types
Tesla data breach falsely claimed by IntelBroker, third-party EV charging firm actually breached
Daniel Croft reports: The incident was claimed by CyberN—–s members IntelBroker and EnergyWeaponUser, who originally said it was a Tesla EV charging station database containing files that belonged to Tesla. However, thanks to a tipoff by researcher DarkWebInformer and IntCyberDigest, the threat actors amended the listing to say it was a “random 3rd party company…
Top White House cyber official urges Trump to focus on ransomware, China
Jonathan Grieg reports: Anne Neuberger, the U.S. deputy national security adviser for cyber and emerging technologies, spoke at Columbia University on Wednesday and was asked about what pressing cyber challenges the new administration should tackle in its first 100 days. “I’m going to put them into three bins. China, criminal groups like ransomware actors, and…
“i know it hurts your little dick seeing a true hacker like me in a crowd full of skids and sheep,” said a man with no knowledge of anatomy
After the arrest of Breached.vc’s owner “Pompompurin” in March, Breached.vc was taken offline by an administrator because it seemed likely the server had been compromised by law enforcement. Months later, the domain was seized by law enforcement. The arrest of Pompompurin and shuttering of the popular hacking forum left a void for those looking to…
Getting caught up: Conti domains seized by Irish Garda
A story by Stephen Breen inThe Irish Sun yesterday included reference to an update on the HSE attack by Conti: Earlier this month, cops seized several websites belonging to the Russian gang behind the attack in a major “disruption operation”. If anyone logs on to the sites they will see a screen warning the site…
A Primer on the SHIELD Act: New York’s Move to Adopt More Stringent Data Security Requirements, Part II
Courtney M. Bowman of Proskauer Rose writes: What would companies need to do to comply with the law? The Stop Hacks and Improve Electronic Data Security (SHIELD) Act imposes requirements in two areas: cybersecurity and data breach notification. The cybersecurity provisions of the proposed SHIELD Act would require companies to adopt “reasonable safe-guards to protect the security,…