Cybersecurity
-
Officials from the state Department of Accounting and General Services warned residents that bad actors are “creating deceptive web addresses” to trick them into releasing personal information.
-
As a Missouri website that serves more than 50,000 state employees remains shut down after suspicious activity, it appears that quick work by fraud protection systems may have blocked unauthorized transactions.
-
Over the course of three months in 2025, hackers exploited vulnerabilities in Oracle E-Business Suite to exfiltrate Social Security numbers, birth dates and bank information for millions of students and staff.
More Stories
-
Sacramento County, Calif., officials announced that the medical data of as many as 5,372 inmates was exposed on the Internet for several months. The breach was related to unsecured folders held by a vendor, officials said.
-
Secretary of State-elect Wes Allen has announced his intention to withdraw from the Electronic Registration Information Center, a collaboration between 33 states aimed at cross-checking voter registration data.
-
White House Homeland Security Advisor Elizabeth Sherwood-Randall said this week that the recent midterm elections did not see significant, disruptive attacks against election infrastructure.
-
Iran-sponsored advanced persistent threat actors accessed a federal civilian executive branch agency via an unpatched Log4Shell vulnerability. CISA and the FBI warn organizations to check their systems for signs of compromise.
-
Joe Swanson — the vice president of CTRL, the new privacy and cybersecurity compliance consultancy at Tampa-based law firm Carlton Fields — weighs in on the changing nature of digital threats.
-
The Mountain View, Calif.-based tech company has agreed to a settlement with 40 states to resolve allegations that it misled consumers about how it tracked, recorded and shared their device location data.
-
K-12 schools, with their wealth of data and limited resources, are tempting targets to ransomware criminals and hacktivists, says a new report. Nonprofits offer free support, but some say the federal government must do more.
-
Government agencies need to collect data across the enterprise to protect their networks and respond in case of a breach. But what’s even more critical than data collection is putting all that information into context.
-
A vote tabulation glitch in Arizona’s Maricopa County and an attempted takedown of voter-facing websites in Mississippi prompted a flurry of election misinformation and efforts from officials to set the record straight.
-
More states consider rallying volunteer cyber teams that can provide services like incident response and vulnerability assessments throughout the state. These models differ from state to state, however.
-
New Hampshire will receive $129,429 as part of its share from two multistate settlements with Experian Information Solutions Inc. and T-Mobile USA Inc. regarding a 2015 data breach, authorities said Monday.
-
The search for answers is ongoing in the case of the Oct. 20 ransomware attack against the 85 partners of the Midland Information Technology Consortium. Email and phone services have been restored, officials say.
-
The first-in-the-nation legislation imposes sweeping restrictions on Internet companies that serve minors, requiring that they design their platforms with “well-being” in mind and barring eight common data-collection practices.
-
Falsehoods are likely to proliferate as voters await final results of Tuesday's election, but efforts to communicate heavily about the process — and to explain any Election Day hiccups — can help, experts say.
-
The license plate reading system that is placed throughout the city at undisclosed locations has helped find kidnapped children, arrest murder suspects and recover stolen vehicles. But it comes at a cost to privacy.
-
Small glitches remain throughout the county systems, but officials say they are nearly 90 percent recovered from the BlackCat ransomware attack that disrupted city operations in mid August.
-
As officials attempt to assuage fears of election impropriety fueled by mis- and disinformation, the state’s Department of Public Safety is cracking down on phone-based scams to steal voters’ personal data.
-
Hackers often seek to penetrate a network and then escalate their privileges until they can access — and exfiltrate — sensitive data or widely deploy malware. That makes Active Directory security essential.