Sara Merken reports an update to litigation following GnosticPlayers’ hack of Zynga in 2019: A California federal judge on Friday dealt a blow to plaintiffs suing mobile game developer Zynga Inc over a 2019 data breach, greenlighting a bid to compel arbitration of some users’ claims and granting a motion to dismiss the rest. The ruling in…
Za: Blood service hit by cyberattack
Hanno Labuschagne reports: The Western Cape Blood Service (WCBS) has confirmed its information systems have been hit by a cyberattack. The non-profit regional health organisation collects blood from voluntary blood donors in the Western Cape and provides safe blood products and services to the community. WCBS said a cyberattack incident was being investigated by contracted…
NC: Sandhills Center remains silent after threat actors claim to have hacked them and exfiltrated 634 GB of their files
Update of September 4: Sandhills subsequently issued a press release that indicates that they could not confirm that the data came from them. See the follow-up report here. Original post: Sandhills Center in North Carolina manages public mental health, intellectual/developmental disabilities and substance use disorder services for the citizens of Anson, Guilford, Harnett, Hoke, Lee,…
Ca: Prisoners at Mission Institution sue authorities over alleged privacy breach
Keith Fraser reports: A group of prisoners at Mission Institution is suing the authorities over an alleged breach of privacy that they claim posed a threat to them. The 47 prisoners say that from about April 2020 to July 2020 employees and servants of the federal medium and minimum security prison posted notices on a…
China Orders 25 Tech Giants to Fix Raft of Problems
Bloomberg News reports: China ordered more than two dozen technology firms to carry out internal inspections as part of a campaign to root out illegal online activity. The Ministry of Industry Information Technology on Friday told 25 of its largest internet and hardware companies including Alibaba Group Holding Ltd. and Tencent Holdings Ltd. to carry out internal reviews and rectify issues…
The Life Cycle of a Breached Database
Brian Krebs writes: Every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the time the victim organization discloses an incident publicly the information has already been harvested many times over by profit-seeking cybercriminals. Here’s a closer look…