Tag #Data Breach

cnbc.com
🌐 90% Global Worthiness
News related image

Chinese Hackers Breach US Treasury Systems via Third-Party Software

On December 8th, a state-sponsored Chinese hacking group exploited a vulnerability in the third-party software BeyondTrust to breach US Treasury Department systems, accessing unclassified employee data; the compromised service has been taken offline.

Progress

44% Bias Score

Peace, Justice, and Strong Institutions
it.euronews.com
🌐 90% Global Worthiness
News related image

Chinese Hackers Breach US Treasury, New Investment Restrictions Imposed

Chinese hackers breached a US Treasury third-party software vendor, accessing unclassified documents; this follows the Salt Typhoon campaign affecting nine US telecommunication companies, and new US investment restrictions in sensitive Chinese technologies start January 2nd.

Progress

40% Bias Score

Peace, Justice, and Strong Institutions
edition.cnn.com
🌐 90% Global Worthiness
News related image

Chinese State-Sponsored Cyberattack Breaches US Treasury Systems

On December 8th, the US Treasury Department revealed a major cybersecurity incident where a Chinese state-sponsored actor gained unauthorized access to several workstations and unclassified documents via a compromised third-party software service provider, BeyondTrust.

Progress

8% Bias Score

Peace, Justice, and Strong Institutions
npr.org
🌐 85% Global Worthiness
News related image

Chinese Hackers Access U.S. Treasury Department Systems

Chinese hackers accessed several U.S. Treasury Department workstations and unclassified documents after compromising third-party software provider BeyondTrust on December 8th; the department stated there is currently no evidence of continued access, and the incident is under investigation as a major...

Progress

32% Bias Score

Industry, Innovation, and Infrastructure
forbes.com
🌐 85% Global Worthiness
News related image

Chrome Extension Attacks Bypass Two-Factor Authentication

Between December 24th and 26th, hackers exploited a vulnerability in Google's authorization flow to publish a malicious Chrome extension, potentially allowing them to steal cookies and bypass MFA despite the employee having Google Advanced Protection enabled. Cyberhaven was affected, and attackers p...

Progress

28% Bias Score

Peace, Justice, and Strong Institutions
nos.nl
🌐 85% Global Worthiness
News related image

Volkswagen Data Breach Exposes Location Data of 800,000 Electric Vehicle Owners

A data breach at Volkswagen exposed the personal data of 800,000 electric vehicle owners, including precise location data for nearly 500,000 vehicles, due to a misconfiguration by subsidiary Cariad; data was accessible for months on Amazon cloud storage.

Progress

44% Bias Score

Reduced Inequality
tr.euronews.com
🌐 90% Global Worthiness
News related image

Chinese Hackers Breach US Treasury in Major Cyberattack

On Tuesday, Chinese hackers stole several unclassified documents from the US Department of the Treasury after compromising a third-party software provider; the Treasury Department, along with the FBI and CISA, are investigating the incident, which follows the disclosure of a large-scale Chinese cybe...

Progress

48% Bias Score

Peace, Justice, and Strong Institutions
bbc.com
🌐 90% Global Worthiness
News related image

Chinese Hacker Breaches US Treasury Department Systems

A Chinese state-sponsored hacker breached the US Treasury Department's systems in early December, accessing employee data via a vulnerability in the BeyondTrust system; the Treasury Department is investigating with the FBI, while China denies involvement.

Progress

48% Bias Score

Peace, Justice, and Strong Institutions
lefigaro.fr
🌐 85% Global Worthiness
News related image

US Treasury Department Suffers Cyberattack, China-Backed Actor Suspected

The US Treasury Department confirmed a December 2023 cyberattack targeting multiple workstations through a compromised third-party software, BeyondTrust; the attackers stole an encryption key granting access, but no classified data was compromised, according to the department. The attack is attribut...

Progress

40% Bias Score

Peace, Justice, and Strong Institutions
forbes.com
🌐 85% Global Worthiness
News related image

Data Breach Recovery Plan: Six Steps To Safeguard Your Information

This guide details a six-step recovery plan following a data breach, including verifying the breach, securing accounts, addressing email and phone risks, protecting identity, reviewing online presence, and exploring legal and financial recourse.

Progress

32% Bias Score

Peace, Justice, and Strong Institutions
foxnews.com
🌐 90% Global Worthiness
News related image

Ninth US Telecom Company Hacked in Chinese Espionage Campaign

The White House revealed that a ninth US telecommunications company was hacked in a Chinese espionage campaign, Salt Typhoon, accessing private communications of Americans, mostly government officials in Washington, D.C., and Virginia, highlighting cybersecurity vulnerabilities.

Progress

48% Bias Score

Peace, Justice, and Strong Institutions
zeit.de
🌐 85% Global Worthiness
News related image

Cariad Data Breach Exposes Location Data of 800,000 Electric Vehicles

A software flaw at Volkswagen's Cariad exposed location data of 800,000 electric vehicles and contact information of their owners in Europe; the vulnerability lasted months before being discovered by the Chaos Computer Club, which then reported it to VW.

Progress

32% Bias Score

Responsible Consumption and Production