Hackers allegedly attacked RailYatri servers yet again on February 16, stealing the data of 31 Mn users and posting it on BreachForums, a cybercrime forum
However, the company denied it and said that the data referred to by the cybersecurity expert is old data that was exposed in December 2022
The development comes nearly three years after the ticketing platform suffered a data breach, exposing user data of some 7 Lakh users
Update: 22nd Feb, 23:00 IST
After publishing this story, RailYatri contacted us to clarify the matter. According to the company, there has been no new data breach. It stated that the data referred to by the cybersecurity expert is old data that was exposed in December 2022. Since then, the company has taken the necessary steps to ensure the safety of user data.
The below story has been edited to include RailYatri’s comments.
Indian train ticketing platform RailYatri has allegedly suffered another data breach, exposing the data of more than 31 Mn (31,062,673) users. This is the second incident nearly three years after the government-sanctioned ticketing platform suffered a data breach, exposing user data of some 7 Lakh users. However, the company has denied the allegations.
Cybersecurity researcher Anurag Sen notified Inc42 of the development on Monday (February 20), after having detected the leak last week. According to him, user email addresses, full names, genders, phone numbers and locations, were exposed during this data breach.
According to Sen, in February 2020 also, he identified a misconfigured Elasticsearch server exposed to the public without any password or security authentication. He then claimed to have informed RailYatri about the leak, but the company initially denied that the server was theirs.
However, after the Indian Computer Emergency Response Team (CERT-In) got involved in August 2020, the company claimed that it was a test server and later secured it. “Back in 2020, when I reached out to Railyatri, they never replied or reached out to me, but after I contacted CERT-In, the server got closed,” Sen told Inc42.
Hackers allegedly attacked RailYatri servers again on February 16, stealing the data of 31 Mn users and posting it on BreachForums, a cybercrime forum, Sen noted. A hacker called UNIT82 posted a database 12.33 GB in size, which was alleged to be the RailYatri user data.
However, as per the company, it has not suffered any data breach on February 16. It stated that the data referred to by the cybersecurity expert is old data that was exposed in December 2022.
“I have reported various data leaks in India; the most common issue I saw is that these companies are not getting fined due to India not having any GDPR-like law,” Sen added.
Indian startups have become easy targets for hackers and other malicious entities on the internet for such data breach incidents. These data breaches could lead to other cybercrimes, including identity theft and phishing attacks, among others.
Earlier this month, Inc42 reported the data leak at the social media platform for teenagers Slick. The app had exposed the data of 153K users at the time but had been proactive in fixing the issue once it was detected and reported.
Last year, Flipkart-owned online travel aggregator (OTA) Cleartrip was the target of a cyberattack which resulted in a major data breach. In 2021, Mobikwik and Upstox were among multiple startups that had data breaches, exposing the data of millions of users.
India remains one of the worst-hit countries in the world in terms of cyberattacks, as a recent government report noted that the country had 13.91 Lakh cybersecurity incidents last year, as tracked by the government.
However, Google’s vice president of engineering for privacy, safety and security Royal Hansen said in August 2022 that India witnessed as many as 18 Mn cyberattacks per day in Q1 2022.
A Deep Dive On India’s Tech & Startup Economy
Join our exclusive community of business leaders &makers for in-depth tech stories and intelligence on India’s tech economy you won’t find elsewhere.
9,999
₹4,999
Annual Membership
1 YEAR OF unlimited ACCESS
9,99
₹7,99
1-Month Trial
TRY Inc42 plus for 1 MONTH
Category: Uncategorized
-
[Updated] RailYatri Allegedly Suffers Another Data Leak, Company Denies – Inc42 Media
-
No-win, no-fee lawyers circling Arnold Clark over data breach – Car … – Car Dealer Magazine
Home > News >
News
Jack Williams9:23 am, February 21, 2023
Share
A top firm of London lawyers has launched a ‘no-win, no-fee’ scheme to help victims of the recent data breach at Arnold Clark.
The dealer group suffered a cyber attack just before Christmas and customers’ personal information has since been published on the dark web.
The Scottish outfit says it ‘takes the protection of customer data extremely seriously’ but a large group action could now be on the horizon.
Legal firm Keller Postman has set up a ‘Get Justice for the Arnold Clark Data Breach’ scheme, which could result in huge compensation packages being paid out.
The lawyers have even created an instant eligibility checker on their website and are encouraging potential victims to come forward.
Writing on its website, Keller Postman accused Arnold Clark – the most profitable dealer group in the UK – of making the attack ‘easier’ with ‘failures to adopt standard security measures’.
‘Customers of Arnold Clark may have had their personal information exposed following a data hack,’ the company said.
‘The breach happened after hackers broke into the car dealer’s systems. Tens of thousands of people are thought to be at risk.
‘According to various media reports, the stolen data includes names, dates of birth, phone numbers, email addresses, copies of passports and home addresses.
‘One national newspaper claims that copies of bank statements have also been stolen.
‘As of 26 January 2023, the hackers have already released 15 gigabytes of sensitive data. Another, much larger upload is threatened if the cryptocurrency ransom is not paid.
‘Keller Postman UK has launched an investigation to find out what happened and how this breach affects Arnold Clark customers.
‘We believe that failures to adopt standard security measures may have made this attack easier.’
The cyber attack was carried out on December 23, although it was initially believed to have been on Christmas Eve.
At the time, bosses insisted that customer information was safe but were later forced to concede that personal data had been compromised.
In an update posted last week, Arnold Clark said it was ‘proactively contacting’ customers who may have been affected.
Three weeks have now passed since the firm told its first customers that hackers may have gained access to their bank details and ID documents.
Last month, Car Dealer reported that hackers were demanding millions in ransom to avoid a massive upload of customer information to dark web.
‘Arnold Clark takes the protection of our customer data extremely seriously,’ the firm said in its most recent update.
‘Therefore, we have now taken the decision to proactively contact customers who may have been affected to make them aware of the cyber incident, and to offer them guidance and protection in conjunction with our partners Experian.
‘We are working to protect our customers as a matter of priority, and we will continue this process to ensure all our customers who may have been affected by this incident are made aware and are offered assistance and protection.
‘Arnold Clark remains in regular contact with the regulatory authorities and is continuing to seek guidance from the police.’
Last October, Pendragon was also hit with a cyber attack. Those hackers – another group – threatened to release the data too but never did. Pendragon refused to pay the ransom.
Firms that suffer data breaches face being fined millions by the ICO.
Leading dealership boss Robin Luscombe recently told the Car Dealer Podcast that firms have been left defenceless against an ‘industry of fraudsters and scammers’.
Car Dealer has approached Arnold Clark for comment.
Car Dealer Live – the future of the car dealer – exclusive conference features talks from leading car dealers, Google and Auto Trader among much more. Find out the full event details and book tickets.
Jack joined the Car Dealer team in 2021 as a staff writer. He previously worked as a national newspaper journalist for BNPS Press Agency. He has provided news and motoring stories for a number of national publications including The Sun, The Times and The Daily Mirror.
The latest…
Check out…
Account links…
Car Dealer Magazine
© Blackball Media 2021 -
GoDaddy blasted for breach response | SC Media – SC Media
After web hosting firm GoDaddy revealed a multi-year breach resulting in stolen source code and malware that triggered some customers’ websites to redirect visitors to malicious URLs, questions are being raised about the lasting impact of the breach and the slow rollout of details to customers.
Specific revelations of the attack were made public on Thursday via a GoDaddy 10-K filing with the U.S. Security and Exchange Commission (SEC). The SEC filings were in response to Federal Trade Commission subpoenas tied to the incidents, first made public May 2020. At the time, GoDaddy did not detail the extent of the breach.
The GoDaddy disclosure last week also did not include technical details for the breaches or indictors of compromise that could be used by customers to fend off attacks or determine if they were impacted.
A post-breach analysis of the incident by GoDaddy indicated three significant attacks by one intruder.
One in December 2022, GoDaddy reported for the first time a sophisticated threat actor gained access to its cPanel hosting servers, then installed malware that “intermittently redirected random customer websites to malicious sites.”
On Feb. 16, GoDaddy issued a separate statement stating: “Once we confirmed the intrusion, we remediated the situation and implemented security measures in an effort to prevent future infections.”
Last week’s disclosure of three separate attacks was the first time the company revealed the December 2022 breach and also the first time it linked the three attacks together.
In November 2021, the company reported the same attacker compromised its GoDaddy Managed WordPress service, a customized content management system made available to its customers. The intruder obtained source code tied to the WordPress system that allowed a further intrusion of the platform that included admin credentials for the service, access to FTP accounts and email addresses for 1.2 million current and inactive customers.
Finally, GoDaddy said on March 2020 the attacker compromised 28,000 log-in credentials belonging to customers along with credentials tied to a “small number” of employee accounts.
Security researchers said the timeline of this breach has them concerned. Dwell times dating back several years tend to indicate poor overall security, a lack of threat hunting, and other systemic issues.
Hosting companies like GoDaddy have an unusual position on the internet that makes them a very attractive target for attackers, say security researchers. On the surface, they have an aggregation effect – hosting a lot of web infrastructure – so hack one target, receive many payoffs. It’s very useful for large-scale campaigns in which attackers need infrastructure to host and deliver malicious payloads.
Zane Bond, head of product at Keeper Security, theorized that if an advanced threat actor was lurking in GoDaddy’s system for multiple years and had been relatively quiet during that time, there’s no good reason for that attacker to suddenly begin redirecting low-value websites. Instead, Bond said this may be a case of multiple attackers breaching the company’s network simultaneously.
GoDaddy maintains, in its filings and public statements, that the attacks were carried out by one intruder. It’s unclear if the attacker was one individual or one group.
“A junior attacker could have been the one to begin redirecting these websites, which shined a light on other threat actors that were already inside,” said Bond.
Andrew Barratt, vice president at Coalfire, said while the source code intrusion is of great interest to attackers, the real gold mine is more likely GoDaddy’s domain hosting: the database of domain names to IP addresses and all the associated metadata.
Barratt said if attackers were eventually able to compromise DNS servers, it’s possible to change the direction of traffic, pointing legitimate entries to malicious sites – without the underlying sites necessarily realizing immediately, as they’re not subject to compromise.
In the case of the redirects reported by GoDaddy, the intruder planted malware on the website to conduct the redirects to malicious URLs.
Security pros grimace at GoDaddy’s delay in releasing details of the breach that would have been valuable to customers and IT security teams. While customers were notified in May 2020 of an attack, a dearth of specifics related to the incidents and a list of indicators of compromised would of served customers better, security professionals argue.
According to the Identity Theft Resource Center those companies’ that do report breaches are increasingly revealing less. A recent study found just 34% of public breach notices in the U.S. over the past year contained basic details around attack methods or victims the fewest number tracked, the lowest number tracked over the past five years and a 50% drop since 2019.
The reluctance by companies to report breaches and details tied to attacks has real world consequences for unaware victims, according to the report. Less information puts impacted customers and businesses at higher risk for identity theft, fraud and spearphishing attacks that rely on stolen data.
Brett Callow, a ransomware researcher at Emsisoft, told SC Media that this lack of visibility has been particularly noticeable around ransomware, where it’s widely understood that many companies and even governments decide to quietly pay or avoid reporting to a breach to the public. “Information is power and in cybersecurity, it’s the path to prevent other, similar incidents. The more we know the more effective our counterstrategies can be,” said Callow.
(SC Media reporter DEREK B. JOHNSON contributed to this report)
Menghan Xiao
Among the proposed rules are requirements for broker-dealers to notify their customers about the data breach within 30 days, while immediately informing the SEC of cyber incidents.
SC Staff
Dish Network has yet to provide more details regarding the extent of a ransomware attack that impacted its systems two weeks ago, TechCrunch reports.
On-Demand Event
On-Demand Event
On-Demand Event
By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.
Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.
Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions. -
Activision did not notify employees of data breach for months – TechCrunch
On December 4, hackers successfully phished an employee at the games giant Activision, gaining access to some internal employee and game data.
This data breach was not disclosed until last weekend, when cybersecurity and malware research group vx-underground posted on Twitter screenshots of the stolen data, as well as the hackers’ messages on Activision’s internal Slack channel.
But the public weren’t the only ones caught off guard by news of the breach. Activision has yet to notify its own employees of the data breach, and whether their data was stolen, according to two current Activision employees who spoke on condition of anonymity, as they were not allowed to talk to the press.
“This is a problem. If there is employee’s information involved, they should have disclosed the breach,” one of the employees told TechCrunch.
Activision spokesperson Joseph Christinat told TechCrunch that “there are no requirements for a company to notify when there is no evidence of sensitive data access.”
In response to news of the breach, Christinat had previously shared a statement that said Activision “swiftly” responded to an SMS phishing attempt and “quickly resolved it.” According to the statement, the company “determined that no sensitive employee data, game code, or player data was accessed.”
The hacker or hackers were able to access a series of spreadsheets that included employee data such as full names, some telephone numbers, corporate email addresses, and in some cases, the offices where they work, according to a copy of the stolen data, which vx-underground shared with TechCrunch.
Activision, which publishes household games such as Call of Duty and World of Warcraft is in the process of being acquired by Microsoft in a deal valued at $68.7 billion. Regulators in the U.S., the European Union, and the U.K. have opposed the deal.
Activision, which also owns Blizzard, is headquartered in California. The state has a data breach notification law that requires companies to notify victims of data breaches when 500 or more state residents are affected, and mandates that “the disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement.”
The law defines “personal information” to include Social Security number; other forms of ID such as driver’s license number; California ID card; “tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual”; medical and health insurance data; credit card numbers; and biometric and genetic data.
This story was updated to include a comment from an Activision spokesperson.
Do you have more information about this data breach? We’d love to hear from you. From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Wickr, Telegram and Wire @lorenzofb, or email lorenzo@techcrunch.com. You can also contact TechCrunch via SecureDrop. -
A N.J. hospital suffered a data breach. Now a patient is suing. – NJ.com
CentraState Medical Center in Freehold. Patti Sapone | NJ Advance Media
CentraState Medical Center failed to protect the sensitive data of thousands of patients, exposing them to a heightened risk of identity theft, according to a proposed class action lawsuit filed Monday in Superior Court of Monmouth County.
The breach involved a cache of personal data belonging to 617,000 patients during a cyberattack in late December that paralyzed the Freehold hospital.
If you purchase a product or register for an account through one of the links on our site, we may receive compensation.
Use of and/or registration on any portion of this site constitutes acceptance of our User Agreement, Privacy Policy and Cookie Statement, and Your Privacy Choices and Rights (each updated 1/26/2023).
© 2023 Advance Local Media LLC. All rights reserved (About Us).
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Advance Local.
Community Rules apply to all content you upload or otherwise submit to this site.
YouTube’s privacy policy is available here and YouTube’s terms of service is available here.
Ad Choices -
Sobeys admits to data breach in November 2022 – CTV News Atlantic
It was a cyber-security incident that made headlines across the country late last year. Although the company involved waited until now to confirm it.
The Maritime-based Empire Co. – parent company of Sobeys – acknowledges customers and employees past and present are receiving letters saying their personal information may have been compromised.
Bill Zebedee received his letter in the mailbox late last week from Medical Health Care Services Inc. (MHCSI) — the company that provides group benefit plans and works with pharmacies, including Sobeys and Lawtons.
Zebedee said when he first read the letter he was confused.
“I was very surprised because I never heard of the company. I contacted them to confirm it was real,” he said.
The letters informed recipients that an unnamed third party gained access to Sobeys servers on Nov. 1, 2022.
Experts say more letters may be sent out.
“This is one particular sub-company within the overall Empire Co. group of companies who may be affected, so we may see different kinds of these letters arriving,” said cyber security expert David Shipley.
The company was heavily criticized for its lengthy silence on the issue for weeks. Business professor Ed McHugh said the letters come as no surprise.
“This breach was large when it happened because they couldn’t accept gift cards at Sobeys for a while and Lawtons [also] had some issues, so we knew the breach was significant and Sobeys had been very quiet about this matter," adds McHugh.
In an email to CTV News, Sobeys said, “With the help of external experts, we have investigated how an unauthorized third party gained access to some of our servers and systems. The process to identify what data has been impacted has been extremely complex, and we’ve now reached a point where we can notify those who were potentially impacted.”
The retail giant also said, “We have seen no evidence that personal data was accessed or removed from our servers; however, out of an abundance of caution, we have sent notifications to those who could have been potentially impacted and in compliance with our regulatory obligations. IT security is and has always been a priority for us. Trust and transparency matter deeply and we regret that this event occurred.”
While the letter shares how the information could potentially be used by hackers, Shipley said clearer communication should have been provided much sooner.
“They should have had a media release in an actual press conference and say we’ve started the process of notifying people, so that way we could have had some understanding of who was going to get what notification so people could actually trust them,” he said.
Sobeys has not been alone in dealing with cyber security issues. In recent years, hackers have targeted various businesses and organizations. McHugh said in this case, it is best to be cautious.
“Be very vigilant in phone calls and emails and if something sounds too good to be true, it probably is,” he said.
As for now, it’s unclear how many letters have been sent out, however, we have learned employees are being offered a one-year subscription to a credit monitoring service.
Letters also urge recipients to keep an eye out for possible phishing attempts and avoiding clicking links or downloading attachments from suspicious emails.
An Ontario woman has launched a lawsuit seeking $500,000 from Tim Hortons after she suffered major burns from an alleged ‘superheated’ tea. The company has denied all allegations and said she was ‘the author of her own misfortune.'Five children from Connecticut, ranging in age from 8 to 17, were killed in a fiery early morning crash Sunday on a New York highway, police said.
Conservative Leader Pierre Poilievre is calling for a national standardized testing process to be created in order to speed up the licensing process for doctors and nurses who are either immigrants or were trained abroad.
Even at one of the tallest natural peaks on Earth, humans have left their mark in a trail of bacteria as researchers have found germs from coughing and sneezing that have been potentially preserved for centuries on Mount Everest.
President Vladimir Putin always relished his global outings, burnishing his image as one of the big guns running the world but with the International Criminal Court's war crimes charges against him, Putin's world just got smaller.
A Ukrainian charity tells CTVNews.ca how women on the front lines of the war in Ukraine do not have proper equipment and are struggling with the realities of being in a conflict zone. Here are their stories.
The possibility that Donald Trump may be charged for allegedly covering up hush money payments to a porn star during his 2016 campaign is garnering sympathy for the Republican former president, New Hampshire Governor Chris Sununu said on Sunday.
A host of comedic and entertainment royalty gathered at Washington's Kennedy Center to present comedy icon Adam Sandler with the Mark Twain Prize for American Humor.
King Charles III has remembered the late Queen on the first Mother's Day in the U.K. since her death.
An Ontario woman has launched a lawsuit seeking $500,000 from Tim Hortons after she suffered major burns from an alleged ‘superheated’ tea. The company has denied all allegations and said she was ‘the author of her own misfortune.'
One person is dead and another is in hospital following a two-vehicle collision in Etobicoke early Sunday morning.
A woman who visited Ontario last week said she was walking her dog at night when she came face-to-face with a lion through a chain-link fence — an encounter animal advocates pin on the lack of exotic animal legislation governing roadside zoos in the province.
Around 120 baton twirling athletes competed in the Wild West Competition and regional championships in Calgary this weekend.
When winter is over – and it has to be, doesn't it? – Calgarians turn their attention to other things, such as who they would like to see as the Calgary Stampede parade marshal.
It was Global Recycling Day Saturday and a local organization was recognized for its work diverting material from the landfill.
The body of one victim has been extracted from the rubble of Thursday’s fire at a historic building in Old Montreal. Six people are still unaccounted for.
Two teenagers have been arrested following an armed assault that left a 16-year-old with serious injuries, say Montreal police.
Thousands of Montrealers lined St. Catherine Street to welcome back the first full St. Patrick's Day parade since 2019.
Autopsies confirmed gunshot wounds as the cause of death for two constables responding to a domestic dispute Thursday, the Edmonton Police Service says.
A model train display at Bonnie Doon Shopping Centre incorporates Edmonton's history in its layouts.
As the Edmonton Police Service mourns two officers killed while responding to a domestic dispute, an advocate that works with people experiencing violence and abuse says the tragedy is bringing attention to the rising rates of family violence.
A Timmins youth has been arrested and charged with possession of a stolen vehicle, police say.
An Ontario woman has launched a lawsuit seeking $500,000 from Tim Hortons after she suffered major burns from an alleged ‘superheated’ tea. The company has denied all allegations and said she was ‘the author of her own misfortune.'
Heavy police presence at Corbiere Road on the M'Chigeeng First Nation on Manitoulin Island Sunday afternoon.
Multiple suspects allegedly jumped a pedestrian in Hagersville Saturday, assaulting the victim and striking them with an unknown object before fleeing the area, OPP say.
It was a team effort, but a herd of horses in Petrolia are safely back home after getting loose Sunday morning.
An Ontario woman has launched a lawsuit seeking $500,000 from Tim Hortons after she suffered major burns from an alleged ‘superheated’ tea. The company has denied all allegations and said she was ‘the author of her own misfortune.'
A Manitoban is in New York this week speaking up for the water rights of First Nations people across Canada
The NDP are promising free birth control to Manitobans if they win the provincial election this fall.
SANDVIKEN, Sweden — Canada's Kerri Einarson split her round-robin games Sunday at the world women's curling championship.
The Rideau McDonald's Farewell March brought people from across the city, some dressed in costumes, who wanted to say goodbye to a part of what they say makes Ottawa Ottawa.
If your are yearning to walk the trails around Mud Lake in the Britannia Conservation Area, be aware there are wild turkeys looking for mates. A gang of three have been chasing and pecking at visitors to the nature trail for weeks.
Joe Biden's last official visit to Canada came with a palpable sense of foreboding. Six years later, Biden is coming back — this time as U.S. president — and the world is very different. His message likely won't be.
After weeks of anticipation, the day Saskatoon Blades fans have been waiting for finally came.
A provincial appeal board has overturned a city decision to block the development of a 112-unit apartment on former Knox United Church land.
A Prince Albert police officer totaled their cruiser on Sunday after colliding with another vehicle on 2nd Avenue West.
An international student was swarmed and beaten by a group of people who ripped off his turban and dragged him across the sidewalk by his hair in Kelowna, B.C., Friday evening, according to a local politician.
The re-opening of a popular hiking trail brought crowds of people and fierce competition for parking to North Vancouver's Deep Cove Sunday.
A man described as a "prolific offender" was arrested early Sunday morning after he fled a stolen vehicle on Highway 1 in Abbotsford, according to police.
Travel nurses go from place to place, all over the world, filling in wherever help is needed. To assist with current shortages, some are in Saskatchewan.
Pile O Bones hosted their 18th annual tattoo convention at the Turvey Centre on the weekend where artists from around the country were able to highlight their talent.
Some residents of Saskatchewan's capital city have been vocal with their disapproval of Tourism Regina's latest rebrand, prompting an apology from the organization.
Mounties in Port McNeill violated a suspect's Charter rights by failing to allow him to contact a lawyer promptly after his 2019 drug trafficking arrest, a judge has ruled.
B.C. natural gas users will soon see their bills decrease.
One man is in the hospital in serious condition after being shot in downtown Nanaimo this weekend, according to authorities.
CTV News Programs
Local News
© 2023All rights reserved. Use of this Website assumes acceptance of Terms & Conditions and Privacy Policy
-
GoDaddy Discloses Multi-Year Security Breach Causing Malware … – The Hacker News
Web hosting services provider GoDaddy on Friday disclosed a multi-year security breach that enabled unknown threat actors to install malware and siphon source code related to some of its services.
The company attributed the campaign to a “sophisticated and organized group targeting hosting services.”
GoDaddy said in December 2022, it received an unspecified number of customer complaints about their websites getting sporadically redirected to malicious sites, which it later found was due to the unauthorized third party gaining access to servers hosted in its cPanel environment.
The threat actor “installed malware causing the intermittent redirection of customer websites,” the company said.
The ultimate objective of the intrusions, GoDaddy said, is to “infect websites and servers with malware for phishing campaigns, malware distribution, and other malicious activities.”
In a related 10-K filing with the U.S. Securities and Exchange Commission (SEC), the company said the December 2022 incident is connected to two other security events it encountered in March 2020 and November 2021.
The 2020 breach entailed the compromise of hosting login credentials of about 28,000 hosting customers and a small number of its personnel.
Then in 2021, GoDaddy said a rogue actor used a compromised password to access a provisioning system in its legacy code base for Managed WordPress (MWP), affecting close to 1.2 million active and inactive MWP customers across multiple GoDaddy brands.
Sign up for free and start receiving your daily dose of cybersecurity news, insights and tips. -
White House Announces Free Cybersecurity Training – Security Boulevard
The Home of the Security Bloggers Network
Home » Security Boulevard (Original) »
As part of the Cyber Workforce and Education Summit held at the White House last week hosted by Chris Inglis, national cyber director, numerous organizations made pledges to boost training and education offerings.
CompTIA, in partnership with ConnectWise, will run a nationwide pilot program to fill critical cybersecurity roles for managed services providers, while Cisco made a commitment to train an additional 200,000 students in the U.S. over the next three years.
Fortinet said it would make its information security awareness and training service available for free for all K-12 school districts across the country, and (ISC)², the world’s largest nonprofit association of certified cybersecurity professionals, announced its One Million Certified in Cybersecurity program.
The initiative aims to put one million people through its Certified in Cybersecurity entry-level certification exam and education program for free.
“A tremendous shortage of skilled cybersecurity experts is extensive not only in the U.S., but worldwide,” said Ravi Pattabhi, vice president of cloud security at ColorTokens, a provider of autonomous zero-trust cybersecurity solutions.
He pointed out some U.S. universities have now started teaching students some of the basic cybersecurity skills such as vulnerability management and security hardening of systems.
“Meanwhile, cybersecurity is undergoing a shift, with the industry increasingly incorporating cybersecurity into the design stage and building it into product development, code integration and deployment,” he said. “This means that software developers likely need basic cybersecurity skills as well as including the MITRE ATT&CK framework and using penetration testing tools.”
Michael DeBolt, chief intelligence officer at Intel 471, said the pledge for more cybersecurity training is a step in the right direction that will help both sides of the equation.
“This includes the busy employer engaged in the fight against cybercrime and the aspiring cybersecurity professional looking for entry into the field,” he said. “All reasonably-minded employers agree that we can only win this fight with fresh, creative minds and diverse backgrounds and perspectives.”
However, he pointed out this requires investment in not only time but money and energy.
“So often these resources are directed toward tangible things that provide the clearest, safest and quickest path for return on investment, such as the newest technology or the proven senior analyst that can hit the ground running,” he explained.
DeBolt said organizations who’ve invested in hiring and onboarding new employees breaking into the cybersecurity industry have benefited from innovative and fresh approaches to bringing the fight to the adversary.
“These initiatives will help new employees and make a lasting impact on our ability to fight new cybersecurity threats,” he said.
Sammy Migues, principal scientist at Synopsys Software Integrity Group, said the need for skilled cybersecurity employees is gigantic and noted the U.S. federal government, especially when combined with state and local governments, has so many kinds of ancient, old, aging, current and modern systems that no one person can take care of it all.
“All these different systems require system, network and cloud administrators with different skills,” he said. “They each need security teams that understand the different technologies as well as the attackers and attacks they need to defend against.”
He added the systems likely process different classifications of data and require new and different controls which also have to be understood by the cybersecurity workers.
“And it’s not all business as usual; between regulations, data breaches, executive orders and everything else, there has to be enough cybersecurity workers to handle both day-to-day operations and crisis events,” Migues said.
A few years ago, DHS declared the cybersecurity hiring challenges a “national security issue,” and filling these spots is still a struggle.
“But there have been reports that, for example, government agencies are still getting a ‘D’ in cybersecurity even after being told about issues,” he said.
He pointed out aspects at play in the cybersecurity talent shortage likely include salary range—when compared to commercial companies—as well as the ability to do remote work, varying agency tolerances for legal marijuana use and even just a culture clash between what young workers are looking for and their view of what it means to get a “government job.”
Nathan Eddy is a Berlin-based filmmaker and freelance journalist specializing in enterprise IT and security issues, health care IT and architecture.
nathan-eddy has 181 posts and counting.See all posts by nathan-eddy
More Webinars

-
Top 7 cybersecurity jobs in high demand – Cointelegraph
Discover the top seven cybersecurity jobs in high demand: from security analyst to information security manager and more.
Collect this article as an NFT
In today’s digital age, cybersecurity has become a critical aspect of almost every business. Cyber threats are increasing daily, and businesses must take proactive measures to protect their networks and data. As a result, the demand for cybersecurity professionals has skyrocketed.
Little Friday humour #meme #cybersecurity @hackurityio pic.twitter.com/MArEpCh03k
In this article, we will discuss the top seven cybersecurity jobs that are in high demand.
A cybersecurity analyst is responsible for identifying and mitigating cyber threats to an organization’s network and data. They examine system logs and network traffic to find and fix security holes. Additionally, they create and implement security policies and processes to defend the company against future cyberattacks.
Cybersecurity analysts often require a bachelor’s degree in cybersecurity or a related discipline. They may also hold certifications like compTIA security+, certified information systems security professional (CISSP) or certified ethical hacker.
Top 10 Cybersecurity Certifications to Boost your Career in 20231. eLearnSecurity Junior Penetration Tester (eJPT)
2. (ISC)2 Certified Information Systems Security Professional (CISSP)
3. (ISC)2 Certified Cloud Security Professional (CCSP)
A cybersecurity engineer is responsible for designing and implementing security measures to protect an organization’s network and data. They assess the security requirements of the company and create security tools, including firewalls, intrusion detection systems and encryption software. To make sure security solutions are effective, they test and assess them.
Cybersecurity engineers often require a bachelor’s degree in cybersecurity or a similar discipline. They may also hold certifications like certified information security manager (CISM) or CISSP.
A security consultant advises organizations on the best security practices and strategies. They conduct risk assessments and audits to find weaknesses and provide security solutions. They also create security policies and processes and train staff members on best practices.
Security consultants frequently hold qualifications like the CISSP or CISM and a bachelor’s degree in cybersecurity or a related profession.
Related: 5 high-paying careers in data science
An information security manager manages an organization’s information security program. They create and put into practice security policies and processes, supervise security audits and assessments, and guarantee that all legal requirements are met. They also manage security incidents and collaborate with other departments to ensure that security precautions are incorporated into every facet of the company.
9. Information Security Certifications:– CompTIA Security+
– Certified Ethical Hacker (CEH)
– GIAC Security Essentials (GSEC)
– Certified Information Systems Security Professional (CISSP)
– Certified Information Security Manager (CISM)
Typically holding a bachelor’s degree in cybersecurity or a similar profession, information security managers may also have credentials like CISSP, GIAC Security Essentials or CISM.
A penetration tester tests an organization’s network and systems for vulnerabilities. They run simulated attacks to find gaps in the company’s security measures. To address discovered vulnerabilities, they also create and implement security solutions.
Penetration testers typically hold a bachelor’s degree in cybersecurity or a closely related discipline. They may be certified as an ethical hacker or have the CISSP certification.
A security architect is responsible for designing and implementing security solutions for an organization’s network and data. They create security designs and architectures and assess new security technology. Additionally, they ensure that security precautions are included in all procedures and systems the company uses.
Security architects commonly hold a bachelor’s degree in cybersecurity or a closely related discipline, and they may be certified in positions like CISM or CISSP.
Related: 11 tech jobs that do not require coding skills
A cybersecurity manager is responsible for managing an organization’s cybersecurity program. They oversee cybersecurity operations and staff, create and implement security policies, and guarantee regulatory compliance. They also manage security incidents and collaborate with other departments to uphold best security practices.
Most cybersecurity managers hold a bachelor’s degree in the subject or one closely related to it, and some have certifications like CISM or CISSP.
Add reaction
Add reaction -
Cyber Threats and Advisories | Cybersecurity and Infrastructure … – CISA
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Search
Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services. Defending against these attacks is essential to maintaining the nation’s security. Protecting cyber space is the responsibility of individuals, families, small and large businesses, SLTT and federal governments. By preventing attacks or mitigating the spread of an attack as quickly as possible, cyber threat actors lose their power. Any cyber-attack, no matter how small, is a threat to our national security and must be identified, managed, and shut down.
CISA diligently tracks and shares information about the latest cybersecurity risks, attacks, and vulnerabilities, providing our nation with the tools and resources needed to defend against these threats. CISA provides cybersecurity resources and best practices for businesses, government agencies, and other organizations. CISA shares up-to-date information about high-impact types of security activity affecting the community at large and in-depth analysis on new and evolving cyber threats. By staying current on threats and risk factors, CISA helps ensure our nation is protected against serious cyber dangers.
Automated Indicator Sharing (AIS) protects service participants and reduces the prevalence of cyberattacks via the exchange of real-time, machine-readable cyber threat indicators and defensive measures.
Whether you need help developing initial cybersecurity strategies or strengthening specific weaknesses in your processes, CISA offers the right high-quality, cost-efficient cybersecurity services for you.
Cybersecurity tools, integration services, and dashboards that offer a dynamic approach to fortifying the cybersecurity of federal networks and systems.
Discover the latest CISA news on Cyber Threat and Advisories.
Explore the cybersecurity services CISA offers to help mitigate risks, respond to incidents, and prevent threats.
CISA offers a broad range of cyber threat trainings, from introductory courses to expert advice and techniques.
Utilize these resources to gain strategies and guidance to protect your cyber space.
CISA Central is the simplest way for critical infrastructure partners and stakeholders to engage with CISA. Please contact Central@cisa.gov.