It’s been a frustrating matter, but it may finally be resolved, thanks to the individual known as @fs0ciety on Twitter. In May 2019, DataBreaches.net was alerted to an online bloodbank in India that had a misconfigured Amazon s3 bucket. Despite repeated emails by this site and even a phone call from Banbreach infosec in India,…
Category: Non-U.S.
Phineas Fisher Offers $100,000 Bounty to Hack Banks and Oil Companies
Lorenzo Franceschi-Bicchierai reports: An infamous vigilante hacker known for their hits on surveillance companies is launching a new kind of bug bounty to reward hacktivists who do public interest hacks and leaks. The hacker, known as Phineas Fisher, published a new manifesto on Friday, offering to pay hackers up to $100,000 in what they called the ‘Hacktivist…
IE: Liver patients exposed in data breach
John Burke reports: Patients at a Dublin-based company, which conducts liver scanning procedures, have been informed of a significant data breach affecting the company’s email system. RTÉ’s This Week programme has learned that the company, Liver Wellness, wrote to customers last month to say that the company’s email account had been hacked. The company said…
AU: Drug rehab patients left exposed after fraudster hacks files
Deborah Cornwall reports: A major security breach at one of NSW’s largest drug rehabilitation services has left hundreds of past and current patients at risk, with many reporting their bank, tax and superannuation accounts, as well as highly confidential records, have been hacked. Adele House runs in-house drug and alcohol rehabilitation programs in Werrington, in…
TW: Online box office EZding liable for data theft and consequential damages
Arthur Shay of Shay and Partners writes: In September 2019 a landmark appeal court decision found an online information service provider liable for consequential damages of data theft. In April 2017 subscribers and users of one of Taiwan’s most popular box office websites, EZding, reported numerous data theft incidents. EZding rejected the complaints about its…
150 infosec bods now know who they’re up against thanks to BT Security cc/bcc snafu
Gareth Corfield reports: BT Security managed to commit the most basic blunder of all after emailing around 150 infosec professionals who attended a jobs fair – using the “cc” field instead of “bcc”. The email, shown to The Register by a non-trivial number of aggrieved recipients, thanked them for attending the Westminster Cyber Expo and popping by…