![]() |
Description: Hotel management platform Otelier suffered a data breach after threat actors breached its Amazon S3 cloud storage to steal millions of guests' personal information and reservations for well-known hotel brands like Marriott, Hilton, and Hyatt. [...]
January 17th, 2025 (6 months ago)
|
![]() |
January 17th, 2025 (6 months ago)
|
![]() |
Description: The stolen firewall data is thorough but more than 2 years old now, meaning that most organizations following even basic security practices face minimal risk, hopefully.
January 17th, 2025 (6 months ago)
|
![]() |
Description: A Threat Actor Claims to be Selling Data of Hong Kong Baptist Church
January 17th, 2025 (6 months ago)
|
![]() |
Description: empathy Claims to have Leaked the Data of Alam Rakamy
January 17th, 2025 (6 months ago)
|
![]() |
January 17th, 2025 (6 months ago)
|
![]() |
Description: Lynx Spa Has Fallen Victim to MORPHEUS Ransomware
January 17th, 2025 (6 months ago)
|
![]() |
Description: A Threat Actor is Allegedly Selling the Data of Multiple German Shopping Databases
January 17th, 2025 (6 months ago)
|
![]() |
Description: A Threat Actor Claims to have Leaked the Data of Banco Bradesco
January 17th, 2025 (6 months ago)
|
![]() |
Description: In partnership with the Federal Bureau of Investigation (FBI), CISA released an update to joint guidance Product Security Bad Practices in furtherance of CISA’s Secure by Design initiative. This updated guidance incorporates public comments CISA received in response to a Request for Information, adding additional bad practices, context regarding memory-safe languages, clarifying timelines for patching Known Exploited Vulnerabilities (KEVs), and other recommendations.
While this voluntary guidance is intended for software manufacturers who develop software products and services in support of critical infrastructure, all software manufacturers are strongly encouraged to avoid these product security bad practices.
CISA and FBI urge software manufacturers to reduce customer risk by prioritizing security throughout the product development process. For more information and resources, visit CISA’s Secure by Design webpage or learn how to take CISA’s Secure by Design Pledge.
January 17th, 2025 (6 months ago)
|