Sophos Partners with Capsule on New Cyber Insurance Program
The partnership rewards real-world, observable security controls, while removing the traditional barriers to insurance coverage.
The NL Times reports: The municipality of Nuenen in Noord-Brabant inadvertently shared the addresses of more than 1,000 residents who had filed objections to the establishment of a temporary asylum seekers center, the local government reported. According to Omroep Brabant, the addresses were sent to multiple recipients in preparation for a hearing by the objections committee…….
Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain compromise on the Python Package Index (PyPI) via a domain takeover attack. Software supply chain security company ReversingLabs said it found the “vulnerability” in bootstrap files provided by a build and deployment automation tool named…
Another day, another leak, another inaccurate claim by an entity, and another inappropriate attack on a researcher. Buckle up. TeammateApp is not the sort of entity that DataBreaches usually reports on. DataBreaches decided to report on a data leak they reportedly experienced because once again, a well-intended researcher appears to have been falsely accused of…
Greenbelt, Maryland – After a six-day trial, a federal jury convicted Olusegun Samson Adejorin, 32, a Nigerian national, of wire fraud, aggravated identity theft, and unauthorized access to a protected computer to obtain information. Adejorin was previously extradited from Ghana in connection with the case. Kelly O. Hayes, U.S. Attorney for the District of Maryland, announced the……
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting N-able N-central to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. N-able N-central is a Remote Monitoring and Management (RMM) platform designed for Managed Service Providers (MSPs), allowing customers to efficiently manage and secure
A China-linked threat actor known as Mustang Panda has been attributed to a new cyber espionage campaign directed against the Tibetan community. The spear-phishing attacks leveraged topics related to Tibet, such as the 9th World Parliamentarians’ Convention on Tibet (WPCT), China’s education policy in the Tibet Autonomous Region (TAR), and a recently published book by…