The Data Breach Blog
Katy Independent School District (ISD) in Texas is alerting select students that their information may have been compromised by a third-party vendor.
The Hutchinson Community Foundation in Kansas was hit with a data breach and ransomware attack.
The Central Ohio Urology Group reported that in early August it became aware of an incident where an unauthorized posted patient and employee information to Twitter.
Independent Security Researcher Troy Hunt spotted a database containing the information of nearly 324,000 Regpack accounts.
On Tuesday, officials announced an attacker using employee credentials may have accessed University of Alaska student information.
The Threat Hunter Blog
Well, it's been quite an eventful time since last I posted. I have so much in the works that it is hard to tell where to begin. It seems that we are seeing new flavors of ransomware every week and botnets seem to come and go with a frequency we've not seen in a while. This week, though, I promised Dridex, so Dridex it is.
The computer media has been screaming it for the past few days: Locky is back! Dridex is back! Of course they are... these are two of the most prolific - and prosperous - malwares around at the moment.
There have been quite a few reports by researchers over the past week or so that the Necurs botnet and the Angler exploit kit are dead and buried. But don't hold your breath and don't get rid of your Angler signatures just yet.
This is going to be a bit different from my usual blog postings but I think the time is good for this discussion for several reasons. First, the notion of constructive and responsible disclosure of bugs is a clear issue for threat hunters.
These two malwares have been much in the news over the past week or so.