Skip to main content

Search

Items tagged with: cybersecurity



Several #EdTech folks asked me to review the #InfiniteCampus data dump by #ShinyHunters to see if any sensitive student data was leaked as part of it.

I wrote up what I found here: databreaches.net/2026/03/28/th…

One takeaway for school districts is to remind employees NOT to include student PII or PHI in support tickets to vendors. I've been told it is sometimes required or necessary, but then why weren't tickets like the ones I saw stored with encryption?

#databreach #EduSec #cybersecurity
@mkeierleber @douglevin @funnymonkey


Convicted spyware chief hints that Greece's government was behind dozens of phone hacks | TechCrunch

techcrunch.com/2026/03/25/conv…

Short summary: hackerworkspace.com/article/co…

#databreach #cybersecurity #privacy


💀 How to Execute a DNS Cache Poisoning Attack: Between Entropy and Post-Quantum

In this article we bring the phenomenon of the DNS Poisoning Attack into the laboratory, controlling the variables, reducing entropy, analyzing the behavior of the resolver; all to understand quantitatively why the modern countermeasures of randomization, 0x20 encoding, DNSSEC have drastically raised the computational cost of the attack.

🔗 Link 👉 8bitsecurity.com/posts/how-to-…
#cybersecurity #infosec


TeamPCP software supply chain attack spreads to LiteLLM | ReversingLabs

reversinglabs.com/blog/teampcp…

Short summary: hackerworkspace.com/article/te…

#malware #databreach #cybersecurity


TeamPCP injected malicious code into Trivy, Checkmarx tools, and LiteLLM in a supply chain attack designed to steal cloud credentials, tokens, and crypto wallet data.

Read: hackread.com/teampcp-trivy-che…

#CyberSecurity #Malware #TeamPCP #Trivy #Checkmarx #LiteLLM


Supply Chain Attack Targets litellm Library to Steal Cloud Credentials and Hijack Kubernetes Clusters

TeamPCP compromised the litellm Python library to distribute malicious versions (1.82.7 and 1.82.8) that harvest cloud credentials, SSH keys, and Kubernetes secrets. The attack uses a persistent backdoor and lateral movement toolkit to compromise entire clusters and steals data to attacker-controlled infrastructure.

**If you use litellm in any project, check immediately whether you have version 1.82.7 or 1.82.8 installed. If so, isolate the affected systems, revert to a clean version, and rotate every credential on those machines (SSH keys, cloud tokens, API keys, database passwords, crypto wallets, all of it). Because this attack can spread through other tools that depend on litellm, also audit your broader Python environments and CI/CD pipelines for these versions, remove any persistence files (sysmon.py, sysmon.service), and check Kubernetes clusters for unauthorized pods.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai…


🐛 NEW SECURITY CONTENT 🐛

💻 macOS Tahoe 26.4 - 77 bugs fixed
support.apple.com/en-us/126794
💻 macOS Sequoia 15.7.5 - 60 bugs fixed
support.apple.com/en-us/126795
💻 macOS Sonoma 14.8.5 - 54 bugs fixed
support.apple.com/en-us/126796
📱 iOS and iPadOS 26.4 - 38 bugs fixed
support.apple.com/en-us/126792
🥽 visionOS 26.4 - 29 bugs fixed
support.apple.com/en-us/126799
📱 iOS and iPadOS 18.7.7 - 25 bugs fixed
support.apple.com/en-us/126793
⌚ watchOS 26.4 - 22 bugs fixed
support.apple.com/en-us/126798
📺 tvOS 26.4 - 17 bugs fixed
support.apple.com/en-us/126797
⌚ watchOS 8.8.2 - no CVE entries
⌚ watchOS 5.3.10 - no CVE entries

#apple #cybersecurity #infosec #security #ios


#CyberSecurity

👉#Russian Intelligence Services Target Commercial Messaging Application Accounts👈

"Evidence shows that cyber actors have been able to compromise individual CMA accounts, but not encryption of the applications themselves. The actors’ global campaigns have resulted in unauthorized access to thousands of individual CMA accounts to view the victims’ messages and contact lists, send messages, and conduct additional phishing against other CMA accounts. "

cisa.gov/resources-tools/resou…


A rogue #AI led to a serious security incident at #Meta

theverge.com/ai-artificial-int…

#cybersecurity #privacy


Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway.
---

A federal program created to protect the government against cyber threats authorized a sprawling Microsoft cloud product, despite the company’s inability to fully explain how it protects sensitive data.
propublica.org/article/microso…

#News #Microsoft #Cybersecurity #Government #Technology #Tech #Cloud


"There is little evidence that young people are using VPNs to bypass digital ID checks imposed by the [UK] Online Safety Act."

Age gating them "will have little impact on children's online safety but will deter adults from using them or force people to hand over personal documents or biometric data."

🗣️ @JamesBaker for ORG.

independent.co.uk/extras/indyb…

#vpn #privacy #cybersecurity #onlinesafety #ukpolitics #ukpol



How #AI Assistants are Moving the Security Goalposts

krebsonsecurity.com/2026/03/ho…

#cybersecurity


🆕 New event added:

📌 BSidesAdelaide
📅 Jul 27-28, 2026
📍 Adelaide (SA) 🇦🇺
🔗 bsidesadelaide.com.au

#infosec #cybersecurity #conference #Bsidesadelaide #Australia


Who is the #Kimwolf #Botmaster “#Dort”?

krebsonsecurity.com/2026/02/wh…

#cybersecurity #cybercrime