Cybersecurity breach

Tea App: Messaging System Offline After Second Security Breach

Following a recent cybersecurity breach, the dating discussion app Tea announced that some direct messages were also accessed. The app, which allows women to anonymously discuss men, previously revealed that thousands of user selfies and photo IDs were exposed. The company stated it is working to identify impacted users and offer identity protection services, while also emphasizing the need for users to consider real-life security precautions. The breach affects users who signed up before February 2024, with approximately 72,000 images leaked in total, including those found in direct messages.

Read More

Coinbase Bribery Scandal: Hackers Demand $20 Million Ransom After Bribing Staff

Coinbase revealed a data breach resulting from compromised overseas support agents who were bribed by cybercriminals. The attackers obtained sensitive customer data, including names, addresses, and partial financial information, to conduct social engineering attacks. While no passwords or funds were compromised, Coinbase estimates remediation costs could reach $400 million. The company is cooperating with law enforcement and offering a $20 million reward for information leading to arrests, refusing to pay the extortion demand. Despite this incident, Coinbase maintains its commitment to enhancing security measures and customer reimbursement.

Read More

Musk’s Teen Intern Fired for Leaking Company Secrets

Edward Coristine, a teenager employed by Elon Musk, was terminated from his internship at the cybersecurity firm Path Network for allegedly leaking internal company information to competitors. The firm’s executive stated unequivocally that his actions were unacceptable and that there was zero tolerance for such behavior. This incident raises serious questions about the vetting process for individuals granted access to sensitive information, particularly within the context of government agencies.

The age of Coristine – around 16 or 17 at the time of the incident – further complicates the matter. His actions highlight a potential vulnerability in cybersecurity, where young, relatively inexperienced individuals might be easily influenced or compromised, leading to the exposure of sensitive data.… Continue reading