Tux Machines
Posted by Roy Schestowitz on Jul 04, 2023
=> Android Leftovers | today's howtos
=> ↺ Security updates for Monday [LWN.net]
Security updates have been issued by Debian (cups, gst-plugins-bad1.0, gst-plugins-base1.0, gst-plugins-good1.0, python3.7, and yajl), Fedora (chromium, kubernetes, pcs, and webkitgtk), Scientific Linux (open-vm-tools), SUSE (iniparser, keepass, libvirt, prometheus-ha_cluster_exporter, prometheus-sap_host_exporter, rekor, terraform-provider-aws, terraform-provider-helm, and terraform-provider-null), and Ubuntu (python-reportlab and vim).
=> ↺ Murfreesboro Medical Clinic & SurgiCenter ransomware attack affected 559,000 patients
On May 6 and May 7, DataBreaches reported that the attack on Murfreesboro Medical Clinic & SurgiCenter (“MMC”) appeared to be the work of the ransomware group known as BianLian.
On June 14, MMC issued an updated notice on their website, as noted by Daily News Journal. The news report reiterated that MMC refused to pay the ransom or contact the threat actors at all — as a matter of principle, according to the CEO of the for-profit center.
MMC’s investigation was “unable to determine whether any personal information was actually accessed or removed from our network,” the June 14 notice stated. Perhaps if they had contacted the attackers, they would have found out what data the bad actors had accessed or acquired?
=> ↺ 2,632 Medicaid members in Arizona being notified of data leak
A systems error involving the Arizona Health Care Cost Containment System (AHCCCS) resulted in 2,632 Health-e-Arizona Plus household accounts having their data accidentally exposed to others accessing the website.
=> ↺ ARx Patient Solutions and ARx Patient Solutions Pharmacy notify patients of a March, 2022 breach
ARx Patient Solutions and its affiliate pharmacy, ARx Patient Solutions Pharmacy, have issued a press release about a data breach affecting patient data.
Their notice states, “It was determined that in March 2022, an employee email account was compromised and accessed by an unauthorized third party.” The types of patient information that may have been accessed or acquired included names, dates of birth, medical information, and health insurance information, and in some limited cases, Social Security numbers.
The Fontana Herald News alerts us to an update by the San Bernardino County Sheriff’s Department concerning the ransomware attack they experienced in early April.
=> ↺ Cyberattack knocks out satellite communications for Russian military
A satellite communications system serving the Russian military was knocked offline by a cyberattack late Wednesday and remained mostly down on Thursday, in an incident reminiscent of an attack on a similar system used by Ukraine at the start of the war between the countries.
Dozor-Teleport, the satellite system’s operator, switched some users to terrestrial networks during the outage, according to JD Work, a cyberspace professor at the National Defense University.
=> ↺ Who’s Behind the DomainNetworks Snail Mail Scam?
If you’ve ever owned a domain name, the chances are good that at some point you’ve received a snail mail letter which appears to be a bill for a domain or website-related services. In reality, these misleading missives try to trick people into paying for useless services they never ordered, don’t need, and probably will never receive. Here’s a look at the most recent incarnation of this scam — DomainNetworks — and some clues about who may be behind it.
=> ↺ How Open Source Can Help Protect Your Organization Against Email Threats
Email is one of the most prominent methods of modern business communication. It acts as a critical dissemination channel for sharing legal documents and other confidential business information in any formal environment. However, email is also the root cause of over 90% of all cyberattacks such as phishing, URL spoofing, malicious attachments, trojans, and malware.
=> gemini.tuxmachines.org This content has been proxied by September (ba2dc).Proxy Information
text/gemini;lang=en-GB