Remove Energy and Utilities Remove Military Remove Ransomware Remove Security
article thumbnail

List of data breaches and cyber attacks in March 2020 – 832 million records breached

IT Governance

Australia’s Defence Force Recruiting systems were taken offline after security breach (unknown). South African utility provider Eskom is still feeling effects of a cyber security incident (unknown). Wichita State University notifies students and staff of a security incident (1,762). Ransomware. Data breaches.

article thumbnail

Microsoft Targets Critical Outlook Zero-Day Flaw

eSecurity Planet

.” Considering the ease of exploitation, Microsoft also recommends the following mitigations in addition to downloading the latest updates: Add users to the Protected Users Security Group, which prevents the use of NTLM as an authentication mechanism. Consider using it for high value accounts such as Domain Admins when possible.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Compromised data includes policyholders’ and their families’ civil status, dates of birth and social security numbers, as well as the name of their health insurer and information relating to their contracts. It has since been confirmed by Anukul Peedkaew, the permanent secretary of social development and human security.

article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

I’m Robert Vamosi and in this episode I’m talking about cyber ranges-- simulations that can both teach and improve the security of your networks. Or when we do these larger assessments for say, large banks, we have our red team going live against the security teams. Vamosi: That’s Lee Rossi, CTO and co founder.of