2026-01-28

SoundCloud’s December 2025 breach has been added to HIBP, confirming exposure of ~29.8M user accounts.

The incident stemmed from unauthorized access to an internal service dashboard that enabled correlation of email addresses with public profile data. No credentials or financial information were compromised, but the case highlights how internal tooling can expand the attack surface.

What practical controls help reduce correlation risk in large platforms?
Source: cyberinsider.com/soundcloud-br

Share insights and follow TechNadu for independent InfoSec coverage.

#InfoSec #SoundCloud #HIBP #DataExposure #PrivacyEngineering #CyberRisk #SecurityOperations

SoundCloud breach added to HIBP, 29.8 million accounts exposed
2026-01-28

Today marks Data Privacy Day.
True data resilience starts with trust and control.

Privacy laws are rising as personal data volumes grow.

Without knowing what data you hold, where it lives, and why it exists, risk management becomes guesswork.

People understand mistakes happen - what matters is transparency, thoughtfulness, and ownership.

#DataPrivacyDay #PrivacyByDesign #Cybersecurity #DataGovernance #IdentitySecurity

Today marks Data Privacy Day.
2026-01-28

Fortinet confirms active exploitation of FortiCloud SSO auth bypass (CVE-2026-24858, CVSS 9.4).
Cross-customer access via trusted SSO paths observed.

SSO now blocked for vulnerable versions - patching required.

technadu.com/fortinet-temporar

#InfoSec #Fortinet #CVE #IdentitySecurity

Fortinet Temporarily Disables FortiCloud SSO Following Active Exploitation
2026-01-28

Reporting indicates a prolonged telecom-focused intrusion campaign may have affected mobile communications of UK government aides, with attribution linked by U.S. sources to Salt Typhoon.

The case reinforces concerns around persistent access, metadata exposure, and call interception - particularly where legacy telecom systems intersect with modern threat actors.

From a defensive standpoint, where should governments prioritize: network hardening, endpoint security, or telecom architecture redesign?

Source: cybernews.com/cyber-war/salt-t

Join the discussion and follow @technadu for responsible threat reporting.

#ThreatIntelligence #TelecomSecurity #CyberEspionage #InfoSec #TechNadu

Salt typhoon hacked phones belonging to the aids of three British Prime Ministers
2026-01-28

Security planners supporting the Milano Cortina Winter Games say drones are now treated as a baseline threat category for major international events - alongside cyber incidents, protests, and opportunistic crime.

Officials highlighted the importance of coordination, terrain awareness at outdoor venues, and clear enforcement of no-drone zones, noting that most incidents historically involve unauthorized filming rather than malicious intent.

From a security operations perspective, where should priority be placed as event complexity increases?

Source: reuters.com/world/us-security-

Join the discussion and follow @technadu for grounded reporting on security and technology.

#EventSecurity #CounterUAS #CyberRisk #SecurityOperations #InfoSec #TechNadu

US security team flags drone threat at Milano Cortina Games
2026-01-28

Surfshark clears an independent infrastructure security audit by SecuRing.

No critical vulnerabilities found.
Real-world attack simulations used.
Minor SSL/TLS issue fixed with no user impact.

Thoughts on independent audits for VPN trust?

technadu.com/surfshark-infrast

#InfoSec #CyberSecurity #VPN #SecurityAudit

Surfshark Clears Independent Security Audit, Infrastructure Meets Top Protection Standards
2026-01-27

Crunchbase has confirmed a cybersecurity incident involving the exfiltration of certain corporate documents, with investigations ongoing to assess the scope and notification requirements.

The incident appears connected to a broader pattern of social-engineering-driven intrusions affecting multiple organizations, reinforcing the importance of identity security and employee-targeted threat defenses.

From a practitioner standpoint:
How do you evaluate incident containment claims before full forensic analysis is complete?

Source: securityweek.com/crunchbase-co

Join the discussion and follow @technadu for grounded security reporting.

#InfoSec #IncidentResponse #ThreatIntelligence #SocialEngineering #CyberDefense #TechNadu

Crunchbase Confirms Data Breach After Hacking Claims
2026-01-27

Brakeman provides static analysis for Ruby on Rails by modeling data flow across application components and mapping results to known vulnerability patterns.

Its strength lies in early-stage visibility: identifying code-level issues, insecure configurations, and vulnerable dependencies before deployment. Support for baselining and result comparison helps teams manage findings over time.

From a security engineering perspective:
How do you measure the long-term value of static tools in mature Rails environments?

Source: helpnetsecurity.com/2026/01/26

Join the discussion and follow @technadu for grounded AppSec coverage.

#ApplicationSecurity #StaticAnalysis #RailsSecurity #DevSecOps #Infosec #TechNadu

Brakeman: Open-source vulnerability scanner for Ruby on Rails applications
2026-01-27

Treasury cancels all Booz Allen Hamilton contracts after an insider leaked IRS data impacting ~406K taxpayers.

A clear warning on insider threat controls and contractor accountability.

🔗 technadu.com/u-s-treasury-canc

#InfoSec #InsiderThreat #DataProtection #GovSec

U.S. Treasury Cancels Booz Allen Hamilton Contracts, Former Contractor Pleads Guilty to Taxpayer Data Breach
2026-01-27

A technical disclosure this week detailed a conditional server-side authorization issue affecting Instagram’s mobile web interface.

Under specific backend states and header conditions, private media metadata and CDN links were reportedly returned without authentication.

The issue was patched silently, but the lack of formal root-cause acknowledgment has sparked discussion within the security community.

This case underscores how partial-impact vulnerabilities can be harder to detect - and potentially more concerning - than global failures.

How do you approach disclosure confidence when fixes arrive without explanation?

Source: cybersecuritynews.com/instagra

Join the discussion and follow @technadu for practitioner-focused security coverage.

#AppSec #Authorization #BugBounty #PrivacyEngineering #Infosec #TechNadu

New Instagram Vulnerability Exposes Private Posts to Anyone
2026-01-27

Humans remain the primary attack surface.
Humans in Cyber features Jill Cagliostro (Senior Director of Product Management, ZeroFox) on how attackers exploit fear, urgency, and trust - and why culture matters more than training alone.

Watch:
technadu.com/the-90-second-fig

#SocialEngineering #Phishing #HumansInCyber

2026-01-27

AI agent identities are scaling faster than traditional identity controls can handle.

Interview with Ido Shlomo, Co-Founder & CTO of Token Security, on why visibility, short-lived identities, and automation are becoming critical for AI agent security.

Full interview:
technadu.com/securing-ai-agent

#AIAgents #IdentitySecurity #DevSecOps

Securing AI Agents by Default Today to Prevent Risks from Unretired Identities Resurfacing Tomorrow
2026-01-27

French investigators are examining a breach involving crypto tax platform Waltio, where personal data associated with approximately 50,000 users was exposed.

Authorities caution that crypto-linked identity leaks can increase downstream risks, including targeted fraud and coercive extortion attempts, particularly when wallet information is involved.

This case underscores the need to evaluate crypto security beyond infrastructure - extending into data minimization, user identity exposure, and post-breach risk management.

💬 How should threat models evolve for crypto platforms handling identity data?

Source: tokenpost.kr/news/cryptocurren

👣 Follow @technadu for measured, security-focused reporting.

#InfoSec #CryptoRisk #DataProtection #CyberThreats #TechNadu

French Waltio hack: Personal information of 50,000 cryptocurrency users leaked.
2026-01-27

Romanian authorities are investigating two individuals suspected of operating an online platform allegedly enabling hitman-for-hire arrangements.

According to official statements:
• The platform reportedly relied on crypto-only transactions
• Funds were escrowed to reduce traceability
• Digital storage devices, cash, and cryptocurrency were seized
• The case remains under investigation with no findings yet

Historically, many similar platforms have proven to be fraudulent, underscoring the difficulty of distinguishing real criminal infrastructure from scams.

From a security perspective, where should defensive focus sit - infrastructure monitoring, crypto tracing, or user behavior analysis?

Follow TechNadu for measured, fact-based cybercrime coverage.

Source: therecord.media/romania-assass

Engage with the post and share your insight.

#CyberCrime #ThreatIntelligence #CryptoTracing #DarkWeb #InfoSec #TechNadu

Romania probes two suspects over alleged hitman-for-hire website
2026-01-27

The Main-Tauber Transport Company (VGMT) in Germany has reported a cyberattack resulting in encrypted internal IT systems.

Key points:
• Independent IT network limited lateral spread
• Public transport services remain operational
• Incident response involved state cybersecurity authorities
• Data exposure still under investigation

The case reflects a growing pattern of targeted attacks on local transport and municipal entities, emphasizing the importance of segmentation and incident response readiness.

What security controls do you see as most critical for transport operators today?

Source: tagesschau.de/inland/regional/

Engage in the discussion and follow TechNadu for neutral cybersecurity updates.

#InfoSec #IncidentResponse #NetworkSegmentation #Ransomware #PublicSectorSecurity #CyberResilience

Cyberattack: Hackers paralyze Main-Tauber transport company
2026-01-27

Researchers have identified a phishing-driven intrusion chain targeting Indian users, combining Blackmoon malware with the repurposing of a legitimate enterprise RMM tool for persistence and monitoring.

The campaign demonstrates layered tradecraft: DLL sideloading, UAC bypass, AV exclusion manipulation, and long-term endpoint control -without public attribution to a known actor.

From a defensive standpoint, this reinforces the need for behavior-based detection, application allowlisting, and monitoring for abuse of legitimate tools.

What detection gaps do you see in cases like this?
Engage in the discussion and follow TechNadu for grounded, technical cyber reporting.

#InfoSec #ThreatHunting #MalwareAnalysis #EDR #CyberDefense #TechNadu

Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
2026-01-26

On India’s Republic Day, we acknowledge the role of secure systems, resilient infrastructure, and responsible technology in supporting democratic institutions.

Wishing the community a thoughtful and secure Republic Day.

#RepublicDay #InfoSec #CyberResilience #DigitalTrust

2026-01-24

A U.S. court has temporarily restricted access to materials seized from a journalist during a federal investigation, pending judicial review.

Beyond press freedom implications, the case also underscores how digital evidence handling, access controls, and legal oversight intersect when sensitive information is involved.

From a security and governance standpoint, what best practices should guide investigations that touch journalistic sources?

Share your thoughts and follow @technadu for measured reporting at the intersection of cybersecurity, law, and policy.

Source: reuters.com/business/media-tel

#InfoSec #CyberGovernance #DigitalForensics #PressFreedom #CyberLaw #TechNadu

US judge temporarily blocks review of material seized from Washington Post reporter
2026-01-24

The GCVE vulnerability database, developed by Luxembourg’s CIRCL, is now publicly available and designed to remain CVE-compatible.

It aggregates advisories from 25+ centralized and decentralized sources, correlates naming conventions, and supports machine-based analysis for security teams and researchers.

The launch reflects ongoing conversations around redundancy, governance, and long-term stability in vulnerability disclosure frameworks.

How do you evaluate new vulnerability data sources before integrating them into your pipeline?

Source: inside-it.ch/europaeische-cve-

Follow @technadu for objective cybersecurity reporting.

#GCVE #VulnerabilityManagement #ThreatIntel #CVE #SecurityResearch #EUInfosec

European CVE alternative has been launched
2026-01-24

Rhaetian Railway has confirmed unauthorized access to customer data linked to its Vereina car shuttle ticketing system.

While card data was not impacted, exposed account credentials raise familiar questions around access control, credential storage, and customer-facing attack surfaces in transport infrastructure.

This incident reinforces the importance of continuous monitoring and credential hygiene in public-sector systems.

Follow @technadu for sober, technically grounded cybersecurity reporting.

Source: inside-it.ch/datenleck-bei-der

Thoughts and analysis welcome.

#InfoSec #DataBreach #TransportSecurity #CredentialSecurity #PublicInfrastructure #CyberRisk

Data leak at the Rhaetian Railway

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst