mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

12K
active users

#informationsecurity

8 posts8 participants2 posts today
Redhotcyber<p>…quando Windows XP era il futuro<br>…quando i floppy disk sembravano infiniti<br>…quando le chiavette da 128 MB costavano una fortuna<br>…quando “fare il backup” significava masterizzare un CD riscrivibile<br>…quando Internet faceva trrrrr krrrr ding-ding prima di collegarsi<br>…quando il telefono a conchiglia faceva quel meraviglioso clack</p><p>Oggi?</p><p>📱 Il mio smartphone del 2022 è già “vecchio”.<br>🔒 La mia password storica non la vuole più nessuno.<br>⚙️ E ciò che sembrava eterno diventa obsoleto in un attimo.</p><p>E voi? Qual è la tecnologia “mitica” che ricordate con nostalgia?</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/vintage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintage</span></a> <a href="https://mastodon.bida.im/tags/remember" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remember</span></a> <a href="https://mastodon.bida.im/tags/obsoleto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>obsoleto</span></a> <a href="https://mastodon.bida.im/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <a href="https://mastodon.bida.im/tags/comics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>comics</span></a> <a href="https://mastodon.bida.im/tags/meme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>meme</span></a> <a href="https://mastodon.bida.im/tags/ridere" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ridere</span></a></p>
𝕯𝖎𝖓𝖊𝖘𝖍<p>🚨 Extremists don’t just scatter randomly online — they migrate strategically.</p><p>A new Lawfare review of Tamar Mitts’s book Safe Havens for Hate shows how extremist groups choose their “digital safe havens.”</p><p>🔑 Key Takeaways:</p><p>Regulation is uneven → extremists flock to less-policed platforms like Telegram.</p><p>Migration is strategic, not chaotic → balancing reach with risk of moderation.</p><p>Messaging is platform-tailored → coded hashtags on Twitter, explicit content elsewhere.</p><p>Converged moderation reduces reach → but extremists adapt via unofficial networks.</p><p>Data-driven insights → 114 organizations tracked across 67 platforms, beyond “whack-a-mole.”</p><p>📖 Read the full Lawfare review here:<br><a href="https://www.lawfaremedia.org/article/whack-a-mole-no-more--how-extremists-choose-their-digital-safe-havens" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lawfaremedia.org/article/whack</span><span class="invisible">-a-mole-no-more--how-extremists-choose-their-digital-safe-havens</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a><br><a href="https://infosec.exchange/tags/DigitalGovernance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalGovernance</span></a><br><a href="https://infosec.exchange/tags/Lawfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lawfare</span></a><br><a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a><br><a href="https://infosec.exchange/tags/bookreview" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bookreview</span></a></p>
Redhotcyber<p>L'altro Unix: la storia di FreeBSD</p><p><a href="https://www.redhotcyber.com/post/la-storia-di-freebsd/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/la-storia</span><span class="invisible">-di-freebsd/</span></a></p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p>
BSides Saskatoon - 2025-08-22<p>Just 7 days remain until BSides Saskatoon 2025!</p><p>We can't wait to see you at the Broadway Theatre.</p><p><a href="https://bsidesyxe.ca" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bsidesyxe.ca</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/BSidesYXE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSidesYXE</span></a> <a href="https://infosec.exchange/tags/BSides" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSides</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://infosec.exchange/tags/Conference" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Conference</span></a></p>
Redhotcyber<p>Auguri a tutti di un buon Ferragosto! </p><p>🌞 Al contrario di quanto dice Red Hot Cyber, rilassatevi e sarà quel che sarà....👿 😂</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <a href="https://mastodon.bida.im/tags/BuonFerragosto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BuonFerragosto</span></a> <a href="https://mastodon.bida.im/tags/HackerInVacanza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerInVacanza</span></a></p>
Edwin G. :mapleleafroundel:<p>House of Commons hit by cyberattack from 'threat actor', according to an internal email.</p><p><a href="https://www.cbc.ca/news/politics/house-of-commons-data-breach-1.7608061" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cbc.ca/news/politics/house-of-</span><span class="invisible">commons-data-breach-1.7608061</span></a><br>- - -<br>La Chambre des communes touchée par une cyberattaque, selon un courriel interne.</p><p><a href="https://ici.radio-canada.ca/nouvelle/2185453/cyberattaque-pirate-informatique-parlement-ottawa?partageApp=mastodon&amp;accesVia=lien" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ici.radio-canada.ca/nouvelle/2</span><span class="invisible">185453/cyberattaque-pirate-informatique-parlement-ottawa?partageApp=mastodon&amp;accesVia=lien</span></a></p><p><a href="https://mstdn.moimeme.ca/tags/Canada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Canada</span></a> <a href="https://mstdn.moimeme.ca/tags/CANpoli" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CANpoli</span></a> <a href="https://mstdn.moimeme.ca/tags/CDNpoli" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CDNpoli</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a></p>
Alexandre Borges<p>What is a CUDA Device Architecture?</p><p><a href="https://modal.com/gpu-glossary/device-hardware/cuda-device-architecture" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">modal.com/gpu-glossary/device-</span><span class="invisible">hardware/cuda-device-architecture</span></a></p><p><a href="https://infosec.exchange/tags/gpu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gpu</span></a> <a href="https://infosec.exchange/tags/hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardware</span></a> <a href="https://infosec.exchange/tags/documentation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>documentation</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/cuda" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cuda</span></a></p>
United States News Beep<p>Key Capabilities Security Leaders Need to Know</p><p>Aug 13, 2025The Hacker …<br><a href="https://newsbeep.org/tags/NewsBeep" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NewsBeep</span></a> <a href="https://newsbeep.org/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://newsbeep.org/tags/US" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>US</span></a> <a href="https://newsbeep.org/tags/USA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USA</span></a> <a href="https://newsbeep.org/tags/UnitedStates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedStates</span></a> <a href="https://newsbeep.org/tags/UnitedStatesOfAmerica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedStatesOfAmerica</span></a> <a href="https://newsbeep.org/tags/Artificialintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Artificialintelligence</span></a> <a href="https://newsbeep.org/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://newsbeep.org/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://newsbeep.org/tags/computersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computersecurity</span></a> <a href="https://newsbeep.org/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> <a href="https://newsbeep.org/tags/cybernews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybernews</span></a> <a href="https://newsbeep.org/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://newsbeep.org/tags/cybersecuritynewstoday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynewstoday</span></a> <a href="https://newsbeep.org/tags/cybersecurityupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityupdates</span></a> <a href="https://newsbeep.org/tags/cyberupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberupdates</span></a> <a href="https://newsbeep.org/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://newsbeep.org/tags/hackernews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackernews</span></a> <a href="https://newsbeep.org/tags/hackingnews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackingnews</span></a> <a href="https://newsbeep.org/tags/howtohack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>howtohack</span></a> <a href="https://newsbeep.org/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://newsbeep.org/tags/networksecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networksecurity</span></a> <a href="https://newsbeep.org/tags/ransomwaremalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomwaremalware</span></a> <a href="https://newsbeep.org/tags/softwarevulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>softwarevulnerability</span></a> <a href="https://newsbeep.org/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://newsbeep.org/tags/thehackernews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thehackernews</span></a><br><a href="https://www.newsbeep.com/us/79515/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">newsbeep.com/us/79515/</span><span class="invisible"></span></a></p>
CVE Program<p>NETGEAR is now a CVE Numbering Authority (CNA) assigning CVE IDs vulnerabilities in all products from NETGEAR, its subsidiaries, and third-party components used in NETGEAR products that are not in another CNA’s scope <br> <br><a href="https://cve.org/Media/News/item/news/2025/08/12/NETGEAR-Added-as-CNA" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cve.org/Media/News/item/news/2</span><span class="invisible">025/08/12/NETGEAR-Added-as-CNA</span></a> <br> <br><a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/cna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cna</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a></p>
Edwin G. :mapleleafroundel:<p>WestJet confirmed that traveller information, like passport details or previous booking information has been stolen. It varies by traveller. </p><p><a href="https://toronto.citynews.ca/2025/08/11/travel-doc-info-included-in-westjet-cyberattack-but-not-credit-and-debit-cards/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">toronto.citynews.ca/2025/08/11</span><span class="invisible">/travel-doc-info-included-in-westjet-cyberattack-but-not-credit-and-debit-cards/</span></a><br>- - -<br>WestJet a confirmé que les informations des voyageurs, telles que les détails du passeport ou les informations de réservation précédentes, ont été volées. Cela varie selon le voyageur.</p><p><a href="https://lp.ca/tfKpwM?sharing=true" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lp.ca/tfKpwM?sharing=true</span><span class="invisible"></span></a></p><p> <a href="https://mstdn.moimeme.ca/tags/Canada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Canada</span></a> <a href="https://mstdn.moimeme.ca/tags/WestJet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WestJet</span></a> <a href="https://mstdn.moimeme.ca/tags/AirTravel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AirTravel</span></a> <a href="https://mstdn.moimeme.ca/tags/TransportA%C3%A9rien" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TransportAérien</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a></p>
Opalsec :verified:<p>I find the ShinyHunters (UNC6040/UNC6240) Salesforce Campaign really interesting, because it highlights the impact of two key threat vectors/types that - in my conversations , at least - aren't being accounted for by traditional TI teams.</p><p>1. Data Theft &amp; Extorsion Actors<br>2. Actors capitalising on 3rd Party Platform Applications</p><p>Curious to know - do your orgs track and threat model opportunistic Data Theft and Extorsion Actors, or just focus on the APTs and ransomware groups of the world?</p><p>The largest ransom payment in history was $75 million to the Dark Angels Ransomware group in 2024, purportedly by pharma giant Cencora. With 27TB of corporate data stolen from the org and no mention of ransomware being deployed, the eye-watering payment was to prevent leaking/sale of the stolen data which included customer "names, addresses, dates of birth, diagnoses, prescriptions and medications."</p><p><a href="https://www.bloomberg.com/news/articles/2024-09-18/gang-got-75-million-for-cencora-hack-in-largest-known-ransom" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bloomberg.com/news/articles/20</span><span class="invisible">24-09-18/gang-got-75-million-for-cencora-hack-in-largest-known-ransom</span></a></p><p>The group weren't well known prior to the attack, and the absence of ransomware being deployed highlights the need to prioritise the identification and protection of sensitive data and customer PII - agnostic of whatever group might seek to target it.</p><p>Also, we're all aware of Malicious OAuth applications in o365, but are your orgs aware of; monitoring, and locking down 3rd party platform integrations?</p><p>For those unaware of the campaign, here's the AI-generated TLDR of a Google report in the activity: <a href="Https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible"></span><span class="ellipsis">Https://cloud.google.com/blog/</span><span class="invisible">topics/threat-intelligence/voice-phishing-data-extortion</span></a></p><p>Threat Summary: UNC6040/ShinyHunters Voice Phishing and Data Extortion Campaign</p><p>Key Points &amp; Technical Summary:</p><p>A financially motivated threat cluster, tracked by Google as UNC6040, has been conducting a widespread campaign targeting organizations' Salesforce CRM instances. The campaign's primary objective is large-scale data theft for the purpose of extortion, which is carried out by a related cluster, UNC6240. This group often uses the moniker ShinyHunters in their communications with victims.</p><p>The core of the attack vector is a sophisticated voice phishing (vishing) campaign. The threat actors impersonate corporate IT support personnel in phone calls to employees of the targeted organization. </p><p>The primary technical steps of the attack are as follows:<br> * Social Engineering: The actor guides the targeted employee to Salesforce's connected app setup page.<br> * Malicious App Authorization: The employee is convinced to authorize a malicious version of the "Data Loader" application. This is done by having the employee enter a connection code provided by the attacker, which links the attacker-controlled application to the victim's Salesforce environment.<br> * Data Exfiltration: Once the malicious app is authorized, UNC6040 gains significant API access, allowing them to query and exfiltrate sensitive data from the Salesforce instance. While initially leveraging modified versions of the Salesforce Data Loader, the group has evolved its tooling to include custom Python-based scripts for data extraction.<br> * Anonymization: The attackers utilize services like Mullvad VPN and TOR exit nodes to initiate the vishing calls and for data exfiltration, complicating attribution and tracking efforts.<br> * Extortion: Following the data theft, UNC6240 initiates contact with the victim organization, demanding a ransom payment in Bitcoin, typically within a 72-hour timeframe, to prevent the public release of the stolen data. The group is also reportedly preparing to launch a dedicated data leak site to increase pressure on victims.</p><p>Additional Context &amp; Related Activity</p><p>Activity Cluster:</p><p>The activity is attributed to the cluster pair UNC6040 (initial access and data theft) and UNC6240 (extortion). This group leverages the reputation of the well-known ShinyHunters extortion group to intimidate victims. The cluster is financially motivated and has demonstrated a growing sophistication in its social engineering tactics and technical tooling.</p><p>Other Compromises &amp; Targets:</p><p>This campaign has impacted numerous high-profile organizations across various sectors. Besides Google, other publicly confirmed victims of this campaign include:<br> * Cisco<br> * Chanel<br> * Adidas</p><p>The targeting appears to be opportunistic, focusing on multinational corporations that are heavy users of Salesforce CRM. There has been an initial focus on English-speaking employees.</p><p>Techniques &amp; TTPs:</p><p>Beyond the core vishing-to-malicious-app-authorization chain, other observed Tactics, Techniques, and Procedures (TTPs) include:<br> * Credential Targeting: In some cases, the actors have targeted Okta credentials, likely obtained through prior infostealer malware infections or separate phishing campaigns.<br> * Lateral Movement: Using compromised credentials, the actors have been observed moving laterally within victim networks to access and exfiltrate data from other systems, including Microsoft 365.<br> * Reconnaissance: The group conducts thorough reconnaissance to craft convincing narratives, identifying internal application names and IT support procedures to make their vishing calls more credible.</p><p>Timeline:<br> * June 4, 2025: Google's Threat Intelligence Group (GTIG) first publishes a warning about the rise in vishing and extortion activity targeting Salesforce customers, designating the threat actor as UNC6040.<br> * June 2025: Google becomes a victim of the same campaign, with one of its own corporate Salesforce instances being breached. The compromised data was related to small and medium-sized business contacts.<br> * July 24, 2025: Cisco identifies a similar breach of its CRM system resulting from a vishing attack.<br> * Early August 2025: Google, Cisco, and other victims publicly disclose the breaches. Google updates its original blog post to include the fact that it was also a victim. Extortion demands from UNC6240/ShinyHunters follow these disclosures.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/ShinyHunters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ShinyHunters</span></a> <a href="https://infosec.exchange/tags/DataExtortion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataExtortion</span></a> <a href="https://infosec.exchange/tags/SalesforceSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SalesforceSecurity</span></a> <a href="https://infosec.exchange/tags/Vishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vishing</span></a> <a href="https://infosec.exchange/tags/ThirdPartyRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThirdPartyRisk</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/UNC6040" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UNC6040</span></a> <a href="https://infosec.exchange/tags/UNC6240" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UNC6240</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/Salesforce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Salesforce</span></a> <a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersec</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a><br><a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a></p>
InfoSecSherpa<p>We paid attention to the <a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> &amp; <a href="https://infosec.exchange/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataPrivacy</span></a> news from over the weekend so you wouldn't have to. </p><p>"What'd I Miss? <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> Weekend News Roundup for August 8-10, 2025" by Sherpa Intelligence: Your Guide Up a Mountain of Information!<br><a href="https://open.substack.com/pub/sherpaintelligence/p/whatd-i-miss-infosec-weekend-news-1a3?r=272cku&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">open.substack.com/pub/sherpain</span><span class="invisible">telligence/p/whatd-i-miss-infosec-weekend-news-1a3?r=272cku&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true</span></a></p>
Rob Pegoraro<p><strong>Weekly output: Dashlane, T-Mobile home 5G, AI skepticism at Black Hat, the Fourth Amendment at Black Hat, Black Hat’s network, AOL&nbsp;dial-up</strong></p><p><a href="https://robpegoraro.com/tag/black-hat" rel="nofollow noopener" target="_blank">Black Hat</a> is one of the more exhausting and intimidating events that I cover. That’s not because I stress over <a href="https://robpegoraro.com/2018/08/10/black-hat-priorities-dont-get-pwned-do-get-work-done/" rel="nofollow noopener" target="_blank">the risk of my devices getting compromised</a>, but because almost all of its <a href="https://www.blackhat.com/us-25/briefings/schedule" rel="nofollow noopener" target="_blank">two-day schedule</a> is blocked out by timeslots featuring from nine to 11 briefings each. That increases the odds of my missing something good and reduces the time in which I can write up what I do see.</p><p>Over at Patreon, I explained to readers <a href="https://www.patreon.com/posts/def-con-is-once-135433784?utm_medium=clipboard_copy&amp;utm_source=copyLink&amp;utm_campaign=postshare_creator&amp;utm_content=join_link" rel="nofollow noopener" target="_blank">why I decided not to stick around Vegas for another couple of days to cover the DEF CON security conference</a>, somewhat to my dismay.</p><p>8/6/2025: <a href="https://www.pcmag.com/news/dashlane-to-delete-its-free-tier-of-service" rel="nofollow noopener" target="_blank">Dashlane to Delete Its Free Tier of Service</a>, PCMag</p><p>I wrote this Monday afternoon off an embargoed copy of Dashlane’s press release after getting further input from a publicist on two points.</p><p>8/6/2025: <a href="https://www.pcmag.com/news/t-mobile-tweaks-5g-home-internet-to-add-benefits-and-fine-print-fees" rel="nofollow noopener" target="_blank">T-Mobile Tweaks 5G Home Internet to Add Benefits (and Fine-Print Fees)</a>, PCMag</p><p>An editor suggested I take a look at the T-Mobile announcement heralding some added perks to its fixed-wireless service, then I noticed a change in the fine print around its prices. That made this much more interesting to write about.</p><p><a href="https://robpegoraro.com/?attachment_id=26717" rel="nofollow noopener" target="_blank"></a>8/7/2025: <a href="https://www.pcmag.com/news/skeptic-thinks-ai-bringing-human-brains-down-to-its-level-black-hat-2025" rel="nofollow noopener" target="_blank">This AI Skeptic Thinks AI Is Bringing Human Brains Down to Its Level</a>, PCMag</p><p>After catching the tail end of a panel featuring Gary Marcus at <a href="https://robpegoraro.com/2025/05/30/american-apologies-on-canadian-soil/" rel="nofollow noopener" target="_blank">Web Summit Vancouver</a>, I made sure to watch his talk at Black Hat and found that an excellent use of my time.</p><p>8/8/2025: <a href="https://www.pcmag.com/news/aclu-expert-dont-make-bulk-snooping-by-governments-easier-black-hat-2025" rel="nofollow noopener" target="_blank">ACLU Expert: Please Don’t Make Bulk Snooping by Governments Easier</a>, PCMag</p><p>Jennifer Granick’s talk was another one I’d put on my to-watch list after first looking over Black Hat’s schedule. I wish I shared her optimism that more companies would be inspired to adopt data-minimization practices to avoid aiding government surveillance.</p><p>8/9/2025: <a href="https://www.pcmag.com/news/inside-black-hat-2025-network-security-operation-humans-are-still-a-problem" rel="nofollow noopener" target="_blank">Inside Black Hat’s Network Security Operation: Humans Are Still a Problem</a>, PCMag</p><p>After several years of writing about the penultimate panel in which Black Hat network admins relate how the event’s network worked and how badly some attendees behaved on it, I had the chance to quiz two of these experts beforehand. I should have done that sooner!</p><p>8/9/2025: <a href="https://www.pcmag.com/news/end-of-an-e-era-aol-to-end-dial-up-internet-access" rel="nofollow noopener" target="_blank">End of an E-Era: AOL to End Dial-Up Internet Access</a>, PCMag</p><p>I did not plan on working Saturday morning after the cognitive overload of Black Hat, but seeing tech journalist Ernie Smith’s <a href="https://bsky.app/profile/ernie.tedium.co/post/3lvwjugziec2f" rel="nofollow noopener" target="_blank">Bluesky post highlighting the impending demise of AOL’s dial-up access</a> left me feeling compelled as a Gen Xer to write about it. Unfortunately, my sleep debt may have caught up with me when I left two cringe-inducing typos in the same snakebit paragraph: spelling “America Online” as “American Online” and writing that the company’s 15th birthday happened in 2020, not 2000.</p><p><a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/aclu/" target="_blank">#ACLU</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/ai/" target="_blank">#AI</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/america-online-2/" target="_blank">#AmericaOnline</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/aol/" target="_blank">#AOL</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/black-hat/" target="_blank">#BlackHat</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/black-hat-noc/" target="_blank">#BlackHatNOC</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/cybersecurity/" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/dial-up/" target="_blank">#dialUp</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/fourth-amendment/" target="_blank">#FourthAmendment</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/gary-marcus/" target="_blank">#GaryMarcus</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/information-security/" target="_blank">#informationSecurity</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/infosec/" target="_blank">#infosec</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/jennifer-granick/" target="_blank">#JenniferGranick</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/las-vegas/" target="_blank">#LasVegas</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/t-mobile-fixed-wireless/" target="_blank">#TMobileFixedWireless</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/t-mobile-home-5g/" target="_blank">#TMobileHome5G</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/tech-privacy/" target="_blank">#techPrivacy</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://robpegoraro.com/tag/vegas/" target="_blank">#Vegas</a></p>
Redhotcyber<p>⚽ Tifo da stadio? No, grazie.</p><p>Quando si parla di tecnologia, tifare “solo Linux” o “solo Windows” è come andare a una partita e tifare l’arbitro. 😅</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <a href="https://mastodon.bida.im/tags/awareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>awareness</span></a> <a href="https://mastodon.bida.im/tags/meme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>meme</span></a> <a href="https://mastodon.bida.im/tags/memetime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>memetime</span></a> <a href="https://mastodon.bida.im/tags/quotes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quotes</span></a> <a href="https://mastodon.bida.im/tags/citazione" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citazione</span></a></p>
Yonhap Infomax News<p>South Korea launches a three-month audit of information security disclosures for 40 major firms, including telecom giants, to prevent data breaches and boost transparency.<br><a href="https://mastodon.social/tags/YonhapInfomax" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YonhapInfomax</span></a> <br><a href="https://mastodon.social/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mastodon.social/tags/MinistryOfScienceAndICT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MinistryOfScienceAndICT</span></a> <a href="https://mastodon.social/tags/KISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KISA</span></a> <a href="https://mastodon.social/tags/DisclosureAudit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DisclosureAudit</span></a> <a href="https://mastodon.social/tags/Telecommunications" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Telecommunications</span></a><br> <a href="https://mastodon.social/tags/Economics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Economics</span></a> <a href="https://mastodon.social/tags/FinancialMarkets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinancialMarkets</span></a> <a href="https://mastodon.social/tags/Banking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Banking</span></a> <a href="https://mastodon.social/tags/Securities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Securities</span></a> <a href="https://mastodon.social/tags/Bonds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bonds</span></a> <a href="https://mastodon.social/tags/StockMarket" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StockMarket</span></a> <br><a href="https://en.infomaxai.com/news/articleView.html?idxno=76381" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.infomaxai.com/news/articleV</span><span class="invisible">iew.html?idxno=76381</span></a></p>
Juliet Merida, Dum Tran Elf 🏳️‍⚧️<p><span>Are any of my Fedi peeps attending Crowdstrike's Fal.con in Vegas next month? Wanna meet up?<br><br></span><a href="https://merida.hair/tags/cybersecurity" rel="nofollow noopener" target="_blank">#cybersecurity</a> <a href="https://merida.hair/tags/InformationSecurity" rel="nofollow noopener" target="_blank">#InformationSecurity</a> <a href="https://merida.hair/tags/Crowdstrike" rel="nofollow noopener" target="_blank">#Crowdstrike</a></p>
Edwin G. :mapleleafroundel:<p>Air France and KLM disclose data breaches impacting customers</p><p><a href="https://www.bleepingcomputer.com/news/security/air-france-and-klm-disclose-data-breaches-impacting-customers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/air-france-and-klm-disclose-data-breaches-impacting-customers/</span></a><br>- - -<br>Air France et KLM divulguent une violation de données touchant la clientèle</p><p><a href="https://www.franceinfo.fr/economie/transports/greve-a-air-france/air-france-klm-a-detecte-un-acces-frauduleux-aux-donnees-personnelles-de-ses-clients_7422742.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">franceinfo.fr/economie/transpo</span><span class="invisible">rts/greve-a-air-france/air-france-klm-a-detecte-un-acces-frauduleux-aux-donnees-personnelles-de-ses-clients_7422742.html</span></a></p><p><a href="https://mstdn.moimeme.ca/tags/AirFrance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AirFrance</span></a> <a href="https://mstdn.moimeme.ca/tags/KLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KLM</span></a> <a href="https://mstdn.moimeme.ca/tags/AirFranceKLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AirFranceKLM</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a></p>
Edwin G. :mapleleafroundel:<p>Canada’s privacy commissioner is looking into WestJet data breach</p><p>Press release: <a href="https://www.priv.gc.ca/en/opc-news/news-and-announcements/2025/nr-c-20250812/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">priv.gc.ca/en/opc-news/news-an</span><span class="invisible">d-announcements/2025/nr-c-20250812/</span></a><br>Article: <a href="https://mobilesyrup.com/2025/08/05/canada-privacy-commission-looking-into-westjet-breach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mobilesyrup.com/2025/08/05/can</span><span class="invisible">ada-privacy-commission-looking-into-westjet-breach/</span></a><br>- - -<br>Le commissaire à la protection de la vie privée enquêtera sur l’atteinte à la cybersécurité de WestJet</p><p><a href="https://www.priv.gc.ca/fr/nouvelles-du-commissariat/nouvelles-et-annonces/2025/nr-c-20250812/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">priv.gc.ca/fr/nouvelles-du-com</span><span class="invisible">missariat/nouvelles-et-annonces/2025/nr-c-20250812/</span></a></p><p><a href="https://mstdn.moimeme.ca/tags/Canada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Canada</span></a> <a href="https://mstdn.moimeme.ca/tags/WestJet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WestJet</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a> <a href="https://mstdn.moimeme.ca/tags/PIPEDA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PIPEDA</span></a> <a href="https://mstdn.moimeme.ca/tags/LPRPD%C3%89" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LPRPDÉ</span></a></p>
Edwin G. :mapleleafroundel:<p>A vulnerability on a security chip present in over 100 Dell laptop models could allow attackers to steal sensitive data and monitor some computer activities.</p><p><a href="https://mobilesyrup.com/2025/08/05/dell-fixed-security-chip-vulnerability-that-left-millions-open-to-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mobilesyrup.com/2025/08/05/del</span><span class="invisible">l-fixed-security-chip-vulnerability-that-left-millions-open-to-attack/</span></a><br>- - -<br>Une vulnérabilité dans une puce de sécurité présente dans plus de 100 modèles d'ordinateurs portables Dell pourrait permettre aux attaquants de voler des données sensibles et de surveiller certaines activités informatiques.</p><p>// Article en anglais //</p><p><a href="https://mstdn.moimeme.ca/tags/Dell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dell</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a> <a href="https://mstdn.moimeme.ca/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://mstdn.moimeme.ca/tags/TI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TI</span></a></p>
Edwin G. :mapleleafroundel:<p>Danish 🇩🇰 jeweller Pandora confirms data breach on their customer relationship management platform.</p><p><a href="https://www.bleepingcomputer.com/news/security/pandora-confirms-data-breach-amid-ongoing-salesforce-data-theft-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/pandora-confirms-data-breach-amid-ongoing-salesforce-data-theft-attacks/</span></a><br>- - -<br>Le bijoutier danois 🇩🇰 Pandora confirme un vol de données sur la plate-forme de gestion de la relation avec la clientèle.</p><p>// Article en anglais //</p><p><a href="https://mstdn.moimeme.ca/tags/Pandora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pandora</span></a> <a href="https://mstdn.moimeme.ca/tags/Salesforce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Salesforce</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a></p>