Kelly Haywood and Gary Adshead report: One of Western Australia’s biggest privacy breaches, which involves the interception of thousands of State Government communications, is under investigation. Nine News revealed on Monday evening that the most sensitive information to be hacked and posted to a public website relates to the management of the Covid-19 crisis in…
Arkansas state vendor sued over data breach
Stephen Steed reports: A lawsuit filed Thursday in Pulaski County Circuit Court says the security breach of a new state computer program this spring led to identity theft of those seeking to apply for unemployment compensation benefits. The lawsuit claims that Protech Solutions of Little Rock, which was hired by the state to develop the…
Columbia College Chicago to notify ransomware victims
Kendall Polidori reports: Nearly seven weeks after Columbia became the victim of a ransomware attack, the college provided details about how it would assist members of the college community whose data may have been compromised. A Friday, July 17 collegewide email from Senior Vice President and Chief Financial Officer Jerry Tarrer and Associate Vice President and Chief…
Israeli Water Infrastructure Hit Again by Cyberattacks
Yoni Weiss reports: The cyberattacks on Israeli infrastructure continue, with the Israeli Water Authority confirming on Thursday that another cyberattack targeted two Israeli water infrastructure facilities this week. According to officials, the attacks were aimed at agricultural water pumps in the Upper Galilee and infrastructure in the center of the country. The hacks did not cause…
Alabama dental provider beats claims over 2019 ransomware attack
Sara Merken reports on a lawsuit stemming from a ransomware attack last year that potentially impacted almost 400,000 patients: A federal judge in Alabama dismissed a proposed class action against a major provider of dental services for children in the state that suffered a ransomware attack last year, concluding the plaintiffs lacked standing. U.S. District…
Iranian Spies Accidentally Leaked Videos of Themselves Hacking
Andy Greenberg reports: WHEN SECURITY RESEARCHERS piece together the blow-by-blow of a state-sponsored hacking operation, they’re usually following a thin trail of malicious code samples, network logs, and connections to faraway servers. That detective work gets significantly easier when hackers record what they’re doing and upload the video to an unprotected server on the open internet….