Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
8 résultats taggé account  ✕
Account compromise leads to crash records data breach https://www.txdot.gov/about/newsroom/statewide/account-compromise-leads-to-crash-records-data-breach.html
11/06/2025 16:18:37
QRCode
archive.org

A compromise of an account has led to improper downloads of a large number of crash records, and the Texas Department of Transportation (TxDOT) is working to notify those affected.

On May 12, 2025, TxDOT identified unusual activity in its Crash Records Information System (CRIS). Further investigation revealed the activity originated from an account that was compromised and used to improperly access and download nearly 300,000 crash reports. TxDOT immediately disabled access from the compromised account.

Personal information included in crash records may contain: first and last name, mailing and/or physical address, driver license number, license plate number, car insurance policy number and other information. Notification, in this case, is not required by law, but TxDOT has taken proactive steps to inform the public by sending letters to notify the impacted individuals whose information was included in the crash reports.

If you received
a
letter about this matter, please call the dedicated assistance line at 1-833-918-5951 (toll-free), Monday through Friday, from 8 a.m. – 8 p.m. Central Time (excluding U.S. holidays). Please be prepared to provide the engagement number included in the letter.

TxDOT is implementing additional security measures for accounts to help prevent similar incidents in the future. The compromise is under investigation.

txdot.gov Texas account compromise crash records
Hackers spoof Microsoft ADFS login pages to steal credentials https://www.bleepingcomputer.com/news/security/hackers-spoof-microsoft-adfs-login-pages-to-steal-credentials/
05/02/2025 19:57:15
QRCode
archive.org
thumbnail

A help desk phishing campaign targets an organization's Microsoft Active Directory Federation Services (ADFS) using spoofed login pages to steal credentials and bypass multi-factor authentication (MFA) protections.
#ADFS #Account #Computer #InfoSec #Lateral #MFA #Microsoft #Notification #Phishing #Push #Security #Takeover

Computer MFA Phishing Microsoft InfoSec Account Lateral ADFS Takeover Notification Security Push
Subaru Starlink flaw let hackers hijack cars in US and Canada https://www.bleepingcomputer.com/news/security/subaru-starlink-flaw-let-hackers-hijack-cars-in-us-and-canada/
25/01/2025 17:48:53
QRCode
archive.org
thumbnail

Security researchers have discovered an arbitrary account takeover flaw in Subaru's Starlink service that could let attackers track, control, and hijack vehicles in the United States, Canada, and Japan using just a license plate.
#Account #Canada #Car #Computer #Hacking #InfoSec #Japan #Security #Starlink #Subaru #Takeover #USA

Takeover Starlink Subaru Japan Canada Account Security Computer InfoSec USA Hacking Car
Trezor X Account Hacked, Shills Fake Crypto https://www.ccn.com/news/trezor-account-hacked-shills-fake-crypto/
22/03/2024 08:56:29
QRCode
archive.org
  • Trezor’s official X account was compromised, likely due to a SIM swap attack, and used to promote a fake token presale.
  • ZachXBT and crypto security firm Scam Sniffer identified the fraudulent activity, preventing wider user losses.
  • Despite compromising Trezor’s account, the hacker only managed to steal a paltry $8,100.
ccn EN 2024 twitter X Trezor SIM-swapping Crypto Account
Threat Actor Leverages Compromised Account of Former Employee to Access State Government Organization | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-046a
16/02/2024 09:29:11
QRCode
archive.org

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) conducted an incident response assessment of a state government organization’s network environment after documents containing host and user information, including metadata, were posted on a dark web brokerage site. Analysis confirmed that an unidentified threat actor compromised network administrator credentials through the account of a former employee—a technique commonly leveraged by threat actors—to successfully authenticate to an internal virtual private network (VPN) access point, further navigate the victim’s on-premises environment, and execute various lightweight directory access protocol (LDAP) queries against a domain controller.[1] Analysis also focused on the victim’s Azure environment, which hosts sensitive systems and data, as well as the compromised on-premises environment. Analysis determined there were no indications the threat actor further compromised the organization by moving laterally from the on-premises environment to the Azure environment.

CISA EN 2024 Compromised Account Former-Employee advisory
SEC Has Not Approved Bitcoin ETFs, but Its Hacked X Account Briefly Said Otherwise https://www.coindesk.com/policy/2024/01/09/sec-twitter-compromised-chair-gensler-says-after-account-said-bitcoin-etfs-approved/
10/01/2024 08:30:47
QRCode
archive.org
thumbnail

The X account of the U.S. Securities and Exchange Commission, which is deciding whether to approve bitcoin ETFs, "was compromised," the regulator told CoinDesk.

coindesk EN 2024 SEC x Twitter account compromised hacked bitcoin
Hackers hijack govt and business accounts on X for crypto scams https://www.bleepingcomputer.com/news/security/hackers-hijack-govt-and-business-accounts-on-x-for-crypto-scams/
05/01/2024 08:26:15
QRCode
archive.org
thumbnail

Hackers are increasingly targeting verified accounts on X (formerly Twitter) belonging to government and business profiles and marked with 'gold' and 'grey' checkmarks to promote cryptocurrency scams, phishing sites, and sites with crypto drainers.

bleepingcomputer ENM 2024 Media Account InfoSec Scam Takeover Security Computer Verified Twitter CryptoCurrency Social X
Synology NAS DSM Account Takeover: When Random is not Secure https://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure
18/10/2023 09:20:23
QRCode
archive.org
  • Team82 has uncovered the use of a weak random number generator in Synology’s DiskStation Manager (DSM) Linux-based operating system running on the company’s network-attached storage (NAS) products

  • The insecure Math.random() method was used to generate the password of the admin password for the NAS device itself.

  • Under some rare conditions, an attacker could leak enough information to restore the seed of the pseudorandom number generator (PRNG), reconstruct the admin password, and remotely take over the admin account.

  • The vulnerability, tracked as CVE-2023-2729, has been addressed by Synology. Synology’s advisory is here.

claroty team42 EN 2023 CVE-2023-2729 ynology NAS DSM Account Takeover random DSM
4470 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio