You can read their brief here. Their brief incorporates some of the issues I discussed in my previous blog entry on this case earlier today, and I’m glad to see it.
Interactive Data Hacked, Data Leaked by @TeamBerserk
A hacker with the handle @GuttsArc from the collective @TeamBerserk has announced a breach and leak on Interactive Data (https://www.interactivedata.com/). Interactive Data delivers a comprehensive set of products and services designed to meet the needs of the front, middle and back offices at some of the largest and most well-known institutions around the world. The leak has…
EX ARMY UK Military Vehicle Supplier Hacked By @Ag3nt47
Once again @Ag3nt47 has been at it again, taking sights to a United Kingdom business this time dumping a small bit of data. The breach was aimed at The EX ARMY UK (https://army-uk.info/) who supply used military vehicles and other equipment to the general public, companies and private sectors from around the world. > We are major…
FTC Fires Back In Lawsuit Against Wyndham
Brent Kendall reports: The Federal Trade Commission is offering a strong defense of its powers to police cybersecurity practices against a challenge by Wyndham Worldwide Corp. We wrote about Wyndham’s challenge earlier this month in a case involving attacks by hackers on the hotel chain’s computer systems between 2008 and 2010. The FTC sued Wyndham last year…
Council’s sensitive documents found at tip
Radio New Zealand reports: Confidential documents and other sensitive financial papers from the Buller District Council have been found dumped at a tip and the mayor admits it is a drastic mistake. Westport woman Jenny Thomas came across the pile of paperwork while looking for glass bottles at the tip at Karamea last Thursday. Ms…
HITRUST confirms a public server was hacked, but no sensitive data involved
Given how many claimed hacks are just — well, let’s just call them flat-out lies — more entities are starting to adopt a verify/confirm first before publishing approach. Or they’re publishing and then trying to confirm – a less desirable approach, in my opinion. Adopting the latter approach, Softpedia reached out to HITRUST after hackers…