On September 19, DataBreaches.net reported that Guilford Technical Community College (GTCC) in North Carolina had apparently become a ransomware victim of DoppelPaymer on September 13. But on October 6, GTCC was no longer listed on the threat actors’ dedicated leak site. The removal of a victim’s name often indicates that the victim had a change…
Category: Commentaries and Analyses
Donald Trump’s Twitter password is “maga2020!”, and there’s no 2FA, claims hacker
Updated: The claims made by Victor Gevers, reported below, have been disputed by Twitter, Trump’s team, and an article by Joe Cox on Vice. —————————– Graham Clulely reports that President Trump, whose password back used to be “yourefired” used “Maga2020!” as his Twitter password, with no 2FA. Read more on Graham’s site while some of…
“We take your privacy seriously….” Thursday edition.
I’ve been reading some other sites’ coverage of the Pfizer leak that was discovered by vpnMentor and shared exclusively with DataBreaches.net. The incident involved a misconfigured cloud storage bucket that exposed hundreds of consumer/patient reports to Pfizer on a reporting line for drug safety concerns or other concerns. As such, it contained a lot of…
Ensuring Transparency: Language to Avoid in HIPAA Breach Notifications
Over on HealthIT Security, Jessica Davis is singing a tune I’ve often sung about transparency in breach notifications. Sing along.
NSA Steps Out of Shadows to Spotlight Where China Hackers Prowl
William Turton reports: The U.S. National Security Agency detailed 25 cyber vulnerabilities frequently used by Chinese state-sponsored hackers in an effort to alert computer security officials to update their systems. Most of the vulnerabilities “can be exploited to gain initial access to victim networks using products that are directly accessible from the internet and act…
Passavant Memorial Homes Family of Services notifies 25,000 after someone alerts them to vulnerability
I’ve just read a breach notification from an incident that was reported to HHS as impacting 25,000. Reading it, it sounds like someone tried to tip the entity that they had a vulnerability and the tipster provided proof. But then their investigation couldn’t definitively prove that no data had ever been accessed or exfiltrated or…