Cyber Security News

August 2021

211.

Perth & Kinross Council Enlists Neos for Full-fibre Infrastructure

212.

The T-Mobile Breach Is Much Worse Than It Had to Be

213.

Hackers Stole Data Of 40 Million People: T-Mobile

214.

Census Bureau Computer Servers Target Of January 2020 Cyber Attack

215.

Moving From Defense to Offense: Ransomware


What's the worst that could happen?
(Hint: Your trade secrets could be stolen...)


216.

Brazilian National Treasury Hit with Ransomware Attack

217.

Schools Could Be Ripe for Cyber Attacks Amid Ransomware Open Season

218.

Anonymous, Local Social App Returns to Ios: Yik Yak Is Back

219.

Adobe Plugs Critical Photoshop Security Flaws

220.

Rural Sewage Plants Hit By Ransomware Attacks in Maine



221.

T-Mobile Confirms Data Breach, Unsure If Customers Affected

222.

UK Privacy Claims Don't Belong in Calif. Court, Judge Says

223.

FINRA Aims to Keep Pace with Cloud's Explosive Growth

224.

NFL Concussion Deal Auditor Settles Firm's Hacking Claim

225.

Insurer Begs 5th Circ. to Rethink 'Radical' Data Hack Error


Why wait until you get hacked?


226.

Ex-EBay Exec Says His Spy Work Undercuts Stalking Charges

227.

Educational Publisher Pearson Fined for Data Breach Cover-up

228.

Building Privacy-preserving Apps and Platforms: Security Think Tank

229.

Cyber Attack on Vegas Medical Center Exposes Staff, Patients' PHI

230.

DHS Looks to CMMC for Contractor Security Model


Slow network? Intermittent connectivity?
Did a hacker bypass your security?


231.

Colonial Pipeline Confirms Personal Information Impacted in Ransomware Attack

232.

Devices From Many Vendors Can Be Hacked Remotely Due to Flaws in Realtek SDK

233.

Colonial Pipeline Sends Breach Letters to More Than 5,000 After Ransomware Group Accessed SSNs, More

234.

Linux Glibc Security Fix Created a Nastier Linux Bug

235.

T-Mobile Says Hackers Accessed User Data But Won't Confirm SSN Breach Of 100 Million Customers


Why wait until you get hacked? Let us (ethically) hack you first.


236.

Data Privacy Laws By State

237.

How Hackers Can Use Message Mirroring Apps to See All Your SMS Texts - and Bypass 2FA Security

238.

Solarium Progress Report Highlights Security Advances, Challenges

239.

How Hackers Can Use Message Mirroring Apps to See All Your SMS Texts - and Bypass 2FA Security

240.

TikTok Users Again Ask for Final OK on $1.1M Kids' Data Deal

Secmentis specializes in offensive security and provides penetration testing services to organizations worldwide. We provide penetration testing services such as, external and internal network penetration testing, web application and mobile application penetration testing, and physical penetration testing and social engineering.

The headlines on Secmentis Cyber Security News are selected by computer algorithms that determine which headlines are displayed and in what order.

 Hackers are active 24/7. Are you?

Talk to us today to find out how our experts can best help you