Commentaries and Analyses, Data Breach News, Vulnerabilities
September 17, 2025
146 views 23 secs 0

Self-Replicating Worm Hits 180+ Software Packages

KrebsOnSecurity.com reports: At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and publishes those secrets on GitHub, experts warn. The malware, which briefly infected multiple code packages from the security vendor CrowdStrike, steals and publishes even more credentials every time an infected package is installed. […]

Education Sector, Commentaries and Analyses, Data Breach News
September 15, 2025
210 views 21 secs 0

Watchdog warns of ‘insider threat’ of students launching cyberattacks on their schools

Public Technology reports: The UK’s data-protection watchdog has warned of a growing trend of cyberattacks on schools being perpetrated by pupils. The Information Commissioner’s Office recently analysed the details of 215 data breaches that took place across the education sector between January 2022 and August 2024 and were classified as “insider attacks”. Almost three in […]

Defending Against UNC3944/Scattered Spider: Cybercrime Hardening Guidance from the Frontlines – Mandiant

Background UNC3944, which overlaps with public reporting on Scattered Spider, is a financially-motivated threat actor characterized by its persistent use of social engineering and brazen communications with victims. In early operations, UNC3944 largely targeted telecommunications-related organizations to support SIM swap operations. However, after shifting to ransomware and data theft extortion in early 2023, they impacted […]

Commentaries and Analyses, Data Breach News, News
April 27, 2025
285 views 59 secs 0

FBI IC3, Verizon DBIR, Google M-Trends reports are out—here are key takeaways

Risky Biz News reports: There are a handful of seminal reports in the cybersecurity industry, and lo and behold, three of them were released on Wednesday. Mandiant’s team, now part of Google Cloud, released M-Trends, Verizon released its Data Breach Investigations Report (aka DBIR), and the FBI Internet Crime Complaint Center (IC3) released its yearly Internet Crime Report [PDF]. […]

News, Commentaries and Analyses, Data Breach News, Legal News
April 16, 2025
371 views 54 secs 0

BakerHostetler launches 2025 Data Security Incident Response Report

BakerHostetler has released its 2025 Data Security Incident Response Report, which provides insight and analysis from more than 1,250 data security incidents managed by the firm this past year. Their report features a deep dive into critical components of security incidents (e.g., response timeline, average ransom payment amount, frequency of litigation) as well as an examination of […]

Commentaries and Analyses, News
March 05, 2025
722 views 7 secs 0

China-linked APT Silk Typhoon targets IT Supply Chain

Microsoft warns that China-backed APT Silk Typhoon, which was linked to the US Treasury hack, is now targeting global IT supply chains, using IT firms to spy and move laterally. Security Affairs reports: Microsoft reported that China-linked APT group Silk Typhoon has shifted tactics to target IT solutions like remote management tools and cloud apps […]

Commentaries and Analyses, Data Breach News, Legal News
February 15, 2025
244 views 2 mins 0

Should India adopt a threshold-based data breach reporting?

MediaNama reports: India needs a threshold-based system for data breach reporting, speakers argued at MediaNama’s discussion on the draft Digital Personal Data Protection Rules (DPDP Rules, 2025) on February 7. This came as a comment during the session on the draft rules around data breaches. MediaNama conducted this discussion under the Chatham House Rule. (Chatham […]

Commentaries and Analyses, Legal News, News
December 10, 2024
892 views 35 secs 0

Should regulators do more naming and shaming?

The U.K. Information Commissioner’s Office did an interesting two-year trial and the results suggest that publicly reprimanding public sector entities over breaches and data leaks is an effective strategy — even without any monetary penalties. Infosecurity Magazine reports: The publication of reprimands following data leaks has been cited as an “effective” deterrent for public authorities. […]