government healthcare social media service provider fine education finance dark web law enforcement retail web telecoms phama travel manufacturing operating system charity insurance legal app tech gaming publishing transport utilities
story hacked malware unauthorised access ransomware vulnerability accidental disclosure phishing unsecured database poor security insider threat unsecured server hacked email lost device identity theft website hacked ddos stolen documents Trojans financial inside job spear phishing RDP spyware skimming
cyber attack privacy breach notification security flaw legislation poor operations user credentials physical security customer data third party Cryptocurrency enforcement email hacked insecure storage court action encryption VPN fraud zero day passwords 3rd parties state hacking employee data remote working stolen data

Cybercriminals Put Out Facebook Ads for a Fake Clubhouse App That Was Riddled with Malware
An update from LinkedIn
Gigaset Android Update Server Hacked to Install Malware on Users' Devices
Critical Zoom vulnerability triggers remote code execution without user input | ZDNet
Union teacher resigns, MS principal on leave | News, Sports, Jobs - North Tama Telegraph
Omroep Flevoland - Nieuws - Transportbedrijf Bakker rijdt minder vrachten door hack
Azure Functions Weakness Allows Privilege Escalation | Threatpost
IcedID Banking Trojan Surges: The New Emotet? | Threatpost
Data belonging to 500 million LinkedIn users found for sale on hacker marketplace | IT PRO
Arup staff caught up in ransomware attack | News | Building Design
CDPR should fix Cyberpunk 2077's bugs then move on | PC Gamer
Trello business software settings leave users' personal data exposed in Japan - The Mainichi
Magistrátní síť ochromil kybernetický útok. Veškeré agendy magistrátu zůstávají mimo provoz - OLOMOUC.CZ
New wormable Android malware poses as Netflix to hijack WhatsApp sessions | ZDNet
$38 million worth of gift cards stolen and sold on dark web | WeLiveSecurity
How a VPN vulnerability allowed ransomware to disrupt two manufacturing plants | Ars Technica
Another supply-chain attack? Android maker Gigaset injects malware into victims' phones via poisoned update • The Register
Phishing Emails Most Commonly Originate from Eastern Europe - Infosecurity Magazine
Facebook refuses to apologise after personal data of 11m UK users hacked
SAP Bugs Under Active Cyberattack | Threatpost
Third-party security breach compromises data of Singapore job-matching service | ZDNet
Top cybercrime gangs use targeted fake job offers to deploy stealthy backdoor | CSO Online
Critical Bug in VMWare Carbon Black Allows Takeover | Threatpost
Facebook data leak: Personal data and phone numbers from 533m users stolen and put online
How to Find Out If Your Data Was Exposed in a Breach
Personal data for 533 million Facebook users leaks on the web | Engadget
Postmortem of PHP Core compromise continues | Laravel News
From PowerShell to Payload: An Analysis of Weaponized Malware | Threatpost
Judge Decides Apple Knowingly Sold Defective MacBook Pros
Startseite - Evangelisches Krankenhaus Lippstadt
Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack | Threatpost
DeepDotWeb dark web admin pleads guilty to gun, drug purchase kickbacks | ZDNet
Endgame for end-to-end encryption | Open Rights Group
Google is taking far more data from your Android devices than you may think | TechRadar
North Korean Hackers Expand Targeting of Security Community - Infosecurity Magazine
Malware adapted for the Apple M1 | Kaspersky official blog
Ragnarok Ransomware Hits Boggi Milano Menswear | Threatpost
Apple knew it was selling defective MacBook displays, judge concludes - The Verge
Allied Press hit by data breach | Otago Daily Times Online News
Google: North Korean hackers are targeting researchers through fake offensive security firm | ZDNet