Possible Phishing
on: hxxps[:]//thedefiwallet[.]online[.]talentsbeyond[.]com[.]ng/connect/connect[.]html
Analysis at: https://urldna.io/scan/68052c673b7750000f8d46da
#cybersecurity #phishing #infosec #urldna #scam #infosec
DATE: April 23, 2025 at 11:10AM
SOURCE: HIPAA JOURNAL
Direct article link at end of text block below.
Verizon DBIR: Surge in Vulnerability Exploitation and Healthcare Espionage Breaches
https://t.co/xaDBFSZtrf #healthcare #cybersecurity
Here are any URLs found in the article text:
Articles can be found by scrolling down the page at https://www.hipaajournal.com/ .
-------------------------------------------------
Private, vetted email list for mental health professionals: https://www.clinicians-exchange.org
Most healthcare security and privacy posts related to IT or infosec are at @rsstosecurity
-------------------------------------------------
DATE: April 23, 2025 at 11:10AM
SOURCE: HIPAA JOURNAL
Direct article link at end of text block below.
Verizon DBIR: Surge in Vulnerability Exploitation and Healthcare Espionage Breaches
https://t.co/xaDBFSZtrf #healthcare #cybersecurity
Articles can be found by scrolling down the page at https://www.hipaajournal.com/ .
-------------------------------------------------
Private, vetted email list for mental health professionals: https://www.clinicians-exchange.org
Most healthcare security and privacy posts related to IT or infosec are at @rsstosecurity
-------------------------------------------------
SK Telecom reports customer data breach in malware attack
South Korea's largest mobile operator, SK Telecom, reported a security breach on April 19, 2025, where malware infection led to unauthorized access of sensitive USIM data including authentication keys and network usage information of subscribers, potentially enabling surveillance or SIM-swap attacks. The company is activating security protocols and recommending customers enable their USIM protection service to prevent number porting.
****
#cybersecurity #infosec #incident #databreach
https://beyondmachines.net/event_details/sk-telecom-reports-customer-data-breach-in-malware-attack-l-2-k-q-l/gD2P6Ple2L
Marks & Spencer confirms a cyberattack that disrupted operations, including delays in its popular Click and Collect service.
The British retail giant — with over 1,400 stores and 64,000 employees worldwide — issued a statement through the London Stock Exchange confirming they’re managing an ongoing cybersecurity incident.
Key details:
- Some store operations were temporarily adjusted to protect customer data
- Website and mobile app remain operational
- Delays are affecting Click and Collect orders; customers are asked to wait for confirmation emails before heading to stores
- The company has engaged external cybersecurity experts
- Authorities, including the UK’s data protection office and the National Cyber Security Centre, have been notified
At this stage, no ransomware groups have claimed responsibility, but security experts warn that such silence is common early in extortion-based attacks. If ransomware is involved, there is a high likelihood of data theft — which may later be used to pressure M&S into paying a ransom.
This incident is a reminder that even mature global retailers face significant risks when it comes to supply chain and customer-facing services.
At @Efani, we believe protecting customer trust in retail starts with resilient digital operations. Every outage — especially in fulfillment — risks brand damage that no loyalty program can fix.
Whistleblower: DOGE Siphoned NLRB Case Data – Krebs on Security
“Whoever was attempting to log in was using one of the newly created accounts that were used in the other DOGE related activities and it appeared they had the correct username and password due to the authentication flow only stopping them due to our no-out-of-country logins policy activating,”
https://krebsonsecurity.com/2025/04/whistleblower-doge-siphoned-nlrb-case-data/
Possible Phishing
on: hxxps[:]//secure-mandpbank[.]weebly[.]com
Analysis at: https://urldna.io/scan/680532e33b7750000adb7c2e
#cybersecurity #phishing #infosec #urldna #scam #infosec
Marks & Spencer confirms a #cyberattack as customers face delayed orders
Did that thing again where I shared some of the stuff we're reading internally at @DomainTools Investigations.
Not a roundup, just what caught our attention. Got something you think we should add? Link me, I always need more to read and more reasons to avoid cleaning the fridge.
#infosec #cybersecurity #threatintel
https://dti.domaintools.com/cybersecurity-reading-list-week-of-2025-04-21
CVE Alert: CVE-2025-29547 - https://www.redpacketsecurity.com/cve_alert_cve-2025-29547/
CVE Alert: CVE-2025-1950 - https://www.redpacketsecurity.com/cve_alert_cve-2025-1950/
CVE Alert: CVE-2025-23251 - https://www.redpacketsecurity.com/cve_alert_cve-2025-23251/
CVE Alert: CVE-2025-23250 - https://www.redpacketsecurity.com/cve_alert_cve-2025-23250/
CVE Alert: CVE-2025-23249 - https://www.redpacketsecurity.com/cve_alert_cve-2025-23249/
CVE Alert: CVE-2024-33452 - https://www.redpacketsecurity.com/cve_alert_cve-2024-33452/
CVE Alert: CVE-2025-3767 - https://www.redpacketsecurity.com/cve_alert_cve-2025-3767/
CVE Alert: CVE-2025-27907 - https://www.redpacketsecurity.com/cve_alert_cve-2025-27907/
CVE Alert: CVE-2025-34028 - https://www.redpacketsecurity.com/cve_alert_cve-2025-34028/