government healthcare social media service provider fine education law enforcement finance dark web retail web phama telecoms charity insurance travel manufacturing app operating system legal tech gaming publishing transport utilities
story hacked malware unauthorised access ransomware vulnerability accidental disclosure phishing unsecured database poor security insider threat unsecured server hacked email lost device identity theft website hacked ddos stolen documents Trojans financial inside job spear phishing RDP skimming spyware
cyber attack breach notification privacy security flaw legislation poor operations user credentials physical security customer data third party Cryptocurrency enforcement email hacked insecure storage court action encryption fraud VPN passwords zero day 3rd parties state hacking employee data remote working stolen data

Critical Bug in VMWare Carbon Black Allows Takeover | Threatpost
Facebook data leak: Personal data and phone numbers from 533m users stolen and put online
How to Find Out If Your Data Was Exposed in a Breach
Personal data for 533 million Facebook users leaks on the web | Engadget
Postmortem of PHP Core compromise continues | Laravel News
From PowerShell to Payload: An Analysis of Weaponized Malware | Threatpost
Judge Decides Apple Knowingly Sold Defective MacBook Pros
Startseite - Evangelisches Krankenhaus Lippstadt
Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack | Threatpost
DeepDotWeb dark web admin pleads guilty to gun, drug purchase kickbacks | ZDNet
Endgame for end-to-end encryption | Open Rights Group
Google is taking far more data from your Android devices than you may think | TechRadar
North Korean Hackers Expand Targeting of Security Community - Infosecurity Magazine
Malware adapted for the Apple M1 | Kaspersky official blog
Ragnarok Ransomware Hits Boggi Milano Menswear | Threatpost
Apple knew it was selling defective MacBook displays, judge concludes - The Verge
Allied Press hit by data breach | Otago Daily Times Online News
Google: North Korean hackers are targeting researchers through fake offensive security firm | ZDNet
Ubiquiti is accused of covering up a ‘catastrophic’ data breach — and it’s not denying it - The Verge
New vulnerabilities discovered allow access to user data and complete takeover - SAM Seamless Network
Iranian cyberspies target professionals at medical research organizations in the US, Israel | The Record by Recorded Future
UPDATE (2) del 31.03.2021 Blackbaud Data Breach: University / College / K-12 (Terza Parte) - SuspectFile
Hackers threaten shipping firm ECU Worldwide with data leak - FreightWaves
INFO FRANCE BLEU - The Pierre Fabre company shut down following a cyberattack
Man charged for hacking Kansas water utility with intent to harm public | The Record by Recorded Future
Hackers Hit Italian Menswear Brand Boggi Milano With Ransomware
Gaming mods, cheat engines are spreading Trojan malware and planting backdoors | ZDNet
VMware patches critical vRealize Operations platform vulnerabilities | ZDNet
Malware hidden in Call of Duty cheat software proves that cheaters never prosper - The Verge
Nearly 40% of new ransomware families use both data encryption and data theft in attacks - Help Net Security
What is Python Used for? | Major Industries | Juni Learning (Good practice)
Print group hit by cyber attack | Printweek
Harris Federation schools come under ‘vicious’ cyber attack | Inside Croydon
Hackers hit Harris in latest ‘highly sophisticated’ cyber attack
Austin ISD warns of possible data breach | kvue.com
Hackers backdoor PHP source code after breaching internal git server | Ars Technica
Hackers backdoor PHP source code after breaching internal git server | Ars Technica
Hades Ransomware Linked to Hafnium and Exchange Attacks - Infosecurity Magazine
SolarWinds hackers reportedly breached high-level DHS email accounts - CNET
Heath board has contacted 50 people affected by software privacy breach | Stuff.co.nz