Scammers get pwned by a Canadian granny! Don't be seduced in a bar by an iPhone thief! And will the US Marshals be able to track down the villains who stole their data? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Anna Brading. Plus don’t miss our featured interview with Jason Meller of Kolide.

Stanford University, one of the top ranked Universities of the United States and world, has become a victim to a cyber attack leading to data leak or unauthorized access of sensitive information. The leaked details include first and last names of students, their DOBs, contact mail address, phone numbers, email IDs, gender, ethnicity, race, citizenship, nativity, transcripts, resume, recommendation letter (if any) and filled up admission forms on a digital note.

Information is out that the security incident occurred because of a mis-configured database exposing student info between December 2022–January 2023.

Details are in that the data leak of students pursuing Economics PH.D program from the website was leaked in the incident and all of those 900 candidates affected in the incident were being notified by the University via digital communication.

Hackers can use stolen data for launching social engineering attacks such as phishing. However, this incident looks different as the hack occurred because of an exposed database that might have attracted many cyber criminals who are always on the prowl of such information that makes business sense to them.

NOTE- Many state hackers are always in search of such information as they analyze such classical data and later use it against the nation from which the data was stolen. Often, they are on the prowl of military and political information. And after COVID-19 crisis almost every developed nation has appointed a special cyber force to sieve such R&D data related to healthcare from servers connected to the internet and use them for the upcoming bio-war that might be launched in the next few months/years by any nation connected to Asia.

 

The post Data Breach occurs at Stanford University appeared first on Cybersecurity Insiders.

The owner of a Russian penetration-testing company has been found guilty of being part of an elaborate scheme that netted $90 million after stealing SEC earning reports. For nearly three years, 42-year-old Vladislav Klyushin - the owner of Moscow-based cybersecurity firm M-13 - and his co-conspirators had hacked into two US-based filing agents used by publicly-traded American companies to file earning reports to the Securities and Exchange Commission. Read more in my article on the Tripwire State of Security blog.
Towards the end of last year, malicious hackers broke into the systems of Pepsi Bottling Ventures, the largest privately-owned bottler of Pepsi-Cola beverages in the USA, and installed malware. For almost the month the malware secretly exfiltrated personally identifiable information (PII) from the company's network. Read more in my article on the Hot for Security blog.