efani.net | 3 Quad-Cities municipalities victim to cyber attacks
Scammers pretending to be Brandt Construction emailed a city of Rock Island accountant to update automatic payment information. After the fraudsters returned a form, the accountant called their company contact to confirm, following the city’s usual practices, only to discover it was fake. Scammers, that time, weren’t paid. In Bettendorf, the city’s human resources director […]
efani | Vestas Wind Systems has reported a data breach
Vestas Wind Systems has reported a data breach against its corporate IT systems that caused shutdowns across its business units. Vestas Wind is gradually opening up its IT systems in the wake of shutdowns last Friday to contain the damage. Danish Vestas Wind Systems, manufacturer, seller, installer, and servicer of wind turbines, which has recently […]
efani | United Health Centers of the San Joaquin Valley Data Breach
United Health Centers of the San Joaquin Valley announced on Friday it was the victim of a data breach incident that apparently began in August. The Fresno-based federally qualified health center has a couple of dozen clinics in the Central Valley. The system delivers about 200,000 medical, dental, and other service encounters per year. On […]
Catphishing Fake LinkedIn profiles| efani Partner TheNFG.com
Identity theft. Catphishing in LinkedIn. Singapore fines travel service for a data breach. Fake LinkedIn profiles: too real to be true. Intelligence blogger @hatless1der discovered an operation in which fraudsters are taking advantage of the implicit trustworthiness of the professional networking platform LinkedIn. Scammers create profiles that seem aboveboard at first glance by using AI-created […]
efani | GoDaddy NYSE: GDDY Breach Leaks 1.2 Million WordPress Customers Data
Web hosting company GoDaddy Inc (GDDY.N) said on Monday email addresses of up to 1.2 million active and inactive Managed WordPress customers had been exposed to unauthorized third-party access. The company said the incident was discovered on Nov. 17 and the third party accessed the system using a compromised password. “We identified suspicious activity in […]