Sourced from Kommersant, Meduza reports: Over the past two months, Moscow has issued tens of thousands of fines to local residents for violating the city’s coronavirus self-isolation restrictions. Thanks to weak cryptographic security, the personal data of those ticketed is now available online. The blog Nora Ezhika first drew attention to the data leak on May 12,…
Category: Non-U.S.
Personal info on over 12,000 people leaked after Nikkei comes under cyberattack
Mainichi reports: TOKYO — Nikkei Inc., the publisher of the business daily The Nikkei and other media, announced on May 12 that personal information on a total of 12,514 people had been leaked after a computer used by a group company employee was infected with a virus in an apparent cyberattack. Read more on Mainichi….
Do we need tougher breach notification rules?
Hell, yes! Oh, you want more rationale and calm analysis? Read Nic Fearn’s reporting: When Travelex was hit by a ransomware attack on New Year’s Eve, not just taking down its website, but the systems that enable it to do business, it was days before it even admitted it. Even then, it would only say…
Security Firm claims to have discovered ‘Huge security breach at European Parliament’ that Parliament denies is theirs
Rebecca Nicholson reports: Yash Kadakia, founder of Security Brigade and Shadow Map, said his group had found a major data breach. The security expert, a self-proclaimed “Code Monkey”, was able to easily access data and passwords from members. After Brussels denied the claims, Mr. Kadakia doubled down and revealed more details of the alleged breach….
Hackers preparing to launch ransomware attacks against hospitals arrested in Romania
Some good news for a change. Catalin Cimpanu reports: Romanian law enforcement has cracked down today on a hacker group that was preparing to launch ransomware attacks on Romanian hospitals. Three hackers were arrested and had their homes searched in Romania and a fourth in the Republic of Moldova. Romanian authorities said the four were…
Danger zone! Brit research supercomputer ARCHER’s login nodes exploited in cyber-attack, admins reset passwords and SSH keys
Gareth Corfield reports: Updated One of Britain’s most powerful academic supercomputers has fallen victim to a “security exploitation” of its login nodes, forcing the rewriting of all user passwords and SSH keys. The intrusion, which is understood to be under investigation by GCHQ offshoot the National Cyber Security Centre (NCSC), rendered the ARCHER high-performance computing (HPC)…