Data that is claimed to be from Razer was posted on a hacking forum today in a sales listing. The listing by a forum member provides numerous screencaps of files and directories, allegedly from razer.com, and is seeking $100k in Monero. Hello. I am selling what the title explains. I have stolen the source code,…
Category: U.S.
Jackson Township, Ohio hit by digital security ‘incident.’
Amy Knapp and Steven Grazier report: The township government has been hit by an unspecified computer network “incident” that’s been affecting the function of multiple systems. Administrator and Law Director Mike Vaccaro said in a prepared statement Friday afternoon that officials are working with external cybersecurity experts to work through the problem. An investigation has also been launched…
College learns that two of its vendors were impacted by MOVEit breach.
Earlier this week, DataBreaches reported that Imagine360 had the unfortunate experience of discovering that two of their file-sharing platforms had both suffered breaches within days of each other: Citrix and Fortra/GoAnywhere. Today we bring you another double-whammy scenario. But in this one, it’s not two different platforms being breached within days of each other. This…
Tracy Resident Charged With Computer Attack On Discovery Bay Water Treatment Facility
Here’s your reminder for today of the insider threat: OAKLAND – A federal grand jury has indicted Rambler Gallo, charging him with intentionally causing damage to a protected computer after he allegedly accessed the computer network for the Discovery Bay Water Treatment Facility, located in the Town of Discovery Bay, Calif., and intentionally uninstalled the…
What a way to start a new job…
The News Tribune reports: The new interim leader for the Tacoma-Pierce County Health Department started her role with news about a 5-year-old data breach the department says it learned about just last month. Kudos to her for her transparency: TPCHD’s Cindan Gizzi announced the news immediately after being appointed the department’s interim director during Wednesday’s…
If Kirkland & Ellis Can’t Avoid Cyberattacks, Who Can?
Justin Henry reports: By exploiting a vulnerability in a widely used file transfer application, hackers were able to access the internal information of several large organizations, including three Am Law 50 law firms, highlighting the vulnerability of widespread use of one third-party application. The incident has observers wondering: If some of the largest and most profitable…