
Sign up to save your podcasts
Or
Ticketmaster Hack with widely used tools. RiskIQ says it has identified malicious code within a different third-party marketing and analytics service used by Ticketmaster. The service is developed by a company called SociaPlus.
Cryptocurrency Exchange Developer Bancor loses 23.5 Million. Based on the currently published details, it seems that the Bancor hack was enabled by permissioned backdoors that were put in the smart contracts by the team, and were presumably compromised by the attackers.
Hospital diverts ambulances due to ransomware attack – Missouri county medical center. Happened on a Monday at 11am and that Wednesday they were only 70% restored.
Timehop breach – 21 million users are affected by a breach that exposed names, email addresses, access tokens and for some users, phone numbers. Someone obtained valid user credentials for an administrator account and then used those credentials to log into Timehop’s cloud services provider. The unauthorized user created a new administrator account and then began doing reconnaissance, Timehop says in a technical write-up.
Multi-factor Providers:
How-to articles for setting up 2-factor:
Follow me on Twitter @eenglish34
4.6
2424 ratings
Ticketmaster Hack with widely used tools. RiskIQ says it has identified malicious code within a different third-party marketing and analytics service used by Ticketmaster. The service is developed by a company called SociaPlus.
Cryptocurrency Exchange Developer Bancor loses 23.5 Million. Based on the currently published details, it seems that the Bancor hack was enabled by permissioned backdoors that were put in the smart contracts by the team, and were presumably compromised by the attackers.
Hospital diverts ambulances due to ransomware attack – Missouri county medical center. Happened on a Monday at 11am and that Wednesday they were only 70% restored.
Timehop breach – 21 million users are affected by a breach that exposed names, email addresses, access tokens and for some users, phone numbers. Someone obtained valid user credentials for an administrator account and then used those credentials to log into Timehop’s cloud services provider. The unauthorized user created a new administrator account and then began doing reconnaissance, Timehop says in a technical write-up.
Multi-factor Providers:
How-to articles for setting up 2-factor:
Follow me on Twitter @eenglish34