mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

12K
active users

#databreach

126 posts76 participants18 posts today

Oracle is in bed with the US regime and is bidding for TikTok, which means it's on the good side of DT. It seems to be under the impression it can get away with this deceitful behavior because it's the Wild West again - and it's not alone. Apple, Meta and other tech companies are hiding behind DT to try and escape the consequences of their wrongdoing.

The Register: Oracle faces Texas-sized lawsuit over alleged cloud snafu and radio silence theregister.com/2025/04/02/ora @theregister #Oracle #cybersecurity #Infosec #databreach

The Register · Oracle faces Texas-sized lawsuit over alleged cloud snafu and radio silenceBy Connor Jones

This is going to come back and bite Oracle in the behind.

"Wayback Machine archive has been scrubbed."

"rose87168 left a text file on the Oracle Access Manager frontend as proof they were there."

"Oracle appears to have had that URL removed from the Wayback Machine on request."

Oracle continues to deny breach, tries to hide evidence computing.co.uk/news/2025/secu #Oracle #cybersecurity #Infosec #databreach

www.computing.co.ukOracle continues to deny breach, tries to hide evidenceCustomers and researchers have independently confirmed a breach of Oracle’s systems, but the company continues to downplay, deny and obfuscate

Sam’s Club investigates possible C10p ransomware breach

Infamous ransomware gang C10p has posted files it claims belong to Walmart-owned membership organization Sam’s Club.

Sam’s Club claims there is currently no evidence of a security incident or intrusion, although the issue is being investigated.

#SamsClub #CleoFileTransfer #C10p #ransomware #malware #databreach #security #cybersecurity #hackers #hacking #Hacked

techradar.com/pro/security/sam

TechRadar pro · Sam’s Club investigates possible C10p ransomware breachBy Ellen Jennings-Trace

🚨 NSW Government Data Breach Alert 🚨

9,000 court files were exposed in a recent data breach affecting the NSW Government website. Sensitive personal information may have been compromised.

Swipe through our carousel for everything you need to know, including steps to protect your data.

Stay informed. Stay secure.

Learn more here: bit.ly/41Vfz23 and for latest insights join our channel: discord.gg/c9JaJAb6

👋 Ready for a fresh day of Cyber horrors? Me neither!

Oh well, here you go: opalsec.ghost.io/daily-news-up

Here's a few of the key items to be aware of:

🚨 Palo Alto GlobalProtect Scans: Observed a significant spike in scans targeting Palo Alto Network GlobalProtect login portals, possibly prior to new exploit releases. Time to audit those logs! 🧐

🇨🇳 China as Top Cyber Threat: Gen. Paul Nakasone (former NSA/Cyber Command Head) highlights China's unprecedented cyber activities, including malicious code in critical infrastructure and rapid exploitation of vulnerabilities. It's time to rethink our defense strategies! 🛡️

🇰🇵 North Korean IT Worker Expansion: North Korean "IT warriors" are infiltrating European companies, using fake identities to secure remote work and fund their regime. Stay vigilant and double-check those remote hires! 🕵️

🔑 Identity Flaws in Breaches: A new report indicates 60% of incidents involved an identity attack, with compromised valid accounts being a top initial access vector. Focus on robust MFA, least privilege, and AD security! 🔒

Read the full post for all the details and more actionable insights, and if you want all this straight to your inbox, you're in luck! 👉 opalsec.ghost.io/daily-news-up

Opalsec · Daily News Update: Wednesday, April 2, 2025 (Australia/Melbourne)Increased scans of Palo Alto GlobalProtect devices may indicate imminent attack. Nakasone names China the biggest Cyber threat to the US. DPRK expands prolific IT Worker campaigns to Europe. Talos finds Identity a key culprit in 69% of Ransomware incidents.

It has been 7 (strikethrough) 0 days since the last time I had to add to my list of things currently occurring in the US federal government that would get me, a privacy practitioner, immediately fired if I did them:

New:
-Conducting confidential business via personal email.

Previously:
-Using non-approved apps to transmit sensitive information
-sending sensitive information without double-checking recipient list
-setting records to auto-delete in contravention of records retention policy
-Connecting an unknown external server to the network
-data access without background check
-ignoring least necessary access principles 
-admin access without any controls
-improper segmentation/separation of duties 
-coding directly on prod
-data to 3rd party tools without due diligence
-Delete security documentation because it contains “forbidden words” used in other contexts

#dataprivacy
#databreach
#facepalm
#security
#opsec