Optus data breach “attacker” says sorry, it was a mistake

Categories: News

Tags: Optus

Tags: breach

Tags: optusdata

Tags: text messages

Tags: drivers’ licenses

Tags: Medicare

Tags: identity protection

A hacker stole the personal information of 10 million Optus customers, threatened to publish them in lots of 10,000 a day unless the ransom was paid, and then suddenly did a 180 degree turn.

(Read more…)

The post Optus data breach “attacker” says sorry, it was a mistake appeared first on Malwarebytes Labs.

Read more

Fake CISO Profiles on LinkedIn Target Fortune 500s

Credit to Author: BrianKrebs| Date: Thu, 29 Sep 2022 20:52:43 +0000

Someone has recently created a large number of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. It’s not clear who’s behind this network of fake CISOs or what their intentions may be. But the fabricated LinkedIn identities are confusing search engine results for CISO roles at major companies, and they are being indexed as gospel by various downstream data-scraping sources.

Read more

Uber, Rockstar fall to social engineering attacks; and you?

Credit to Author: Chester Wisniewski| Date: Thu, 22 Sep 2022 18:31:26 +0000

Events like this month’s breaches have happened before and will happen again. The task for defenders not directly affected by the Uber and Rockstar attacks, writes Chester Wisniewski, is to learn by putting your own team into those companies’ shoes.

Read more

How one product manager builds community at Microsoft Security

Credit to Author: Christine Barrett| Date: Thu, 29 Sep 2022 17:00:00 +0000

In this interview, Principal Product Manager Joey Cruz explains how his military experience inspires his work protecting customers in identity and access management at Microsoft.

The post How one product manager builds community at Microsoft Security appeared first on Microsoft Security Blog.

Read more

CSO perspective: Why a strong IAM strategy is key to an organization’s cybersecurity approach

Credit to Author: Christine Barrett| Date: Thu, 29 Sep 2022 16:00:00 +0000

Mastercard Deputy Chief Security Officer Alissa “Dr. Jay” Abdullah, Ph.D., shares insights on why identity and access management is necessary and strategies for securing identities.

The post CSO perspective: Why a strong IAM strategy is key to an organization’s cybersecurity approach appeared first on Microsoft Security Blog.

Read more

ZINC weaponizing open-source software

Credit to Author: Katie McCafferty| Date: Thu, 29 Sep 2022 16:00:00 +0000

In recent months, Microsoft detected weaponization of legitimate open-source software by an actor the Microsoft Threat Intelligence Center (MSTIC) tracks as ZINC, targeting employees at media, defense and aerospace, and IT service provider organizations in the US, UK, India, and Russia.

The post ZINC weaponizing open-source software appeared first on Microsoft Security Blog.

Read more