Be forewarned: the news story misspells”breach” as “breech.” I couldn’t bring myself to use their headline so fixed that, but am leaving this: Contra Costa County officials have begun sending out letters this week to potential victims of the “unauthorized access to certain county employee email accounts” in a computer breech between July to August…
Category: Government Sector
MS Teams users at Army Futures Command potentially exposed private info
Jaspreet Gill reports: Users of the Microsoft Teams platform at Army Futures Command earlier this month potentially exposed personal and health identifying information to an unsecured number of department employees, and AFC is moving to prevent it from happening again, according to a memo obtained by Breaking Defense. Microsoft Teams — the most widely used…
Home Office’s visa service apologises for email address data breach
Diane Taylor reports: The Home Office’s visa service has apologised for a data breach in which the email addresses of more than 170 people were mistakenly copied into an email circulated last week. More than 170 email addresses were accidentally copied into a message on 7 April 2022 about the change of location for a…
RIPTA says it paid hackers $170K in ransom money after massive data breach
ABC6 reports: The Rhode Island Public Transit Authority said Thursday it paid hackers $170,000 in ransom money after a massive data breach in August. The hack exposed the names, birth dates, and social security numbers of thousands of state employees, some of which didn’t even work for the agency. Read more at ABC6. The incident, which affected 22,000…
Ph: NBI raids house of ex-Smartmatic employee tagged in ‘data breach’
There is yet another update in the investigation into a security breach involving the Philippine Commission on Elections (Comelec) vendor Smartmatic. As of April 1, Smartmatic had acknowledged a data leak, but said it had dealt with the problem and fired the employee involved. Now we learn that the National Bureau of Investigation (NBI) has…
LockBit ransomware gang lurked in a U.S. gov network for months
Bill Toulas reports: A regional U.S. government agency compromised with LockBit ransomware had the threat actor in its network for at least five months before the payload was deployed, security researchers found. Logs retrieved from the compromised machines showed that two threat groups had compromised them and were engaged in reconnaissance and remote access operations….