Thursday, January 21, 2021
Primarius Group
No Result
View All Result
PG-Intel
Advertisement
  • Home
  • Physical Security
  • Cyber security
  • Defense
  • Corporate Security
  • Emergency Management
  • Open Source Intelligence
  • More
    • Geo-politics
    • Threat intelligence
    • Protective Intelligence
    • Risk Management
  • Home
  • Physical Security
  • Cyber security
  • Defense
  • Corporate Security
  • Emergency Management
  • Open Source Intelligence
  • More
    • Geo-politics
    • Threat intelligence
    • Protective Intelligence
    • Risk Management
PG-Intel
No Result
View All Result

Peatix Braces Users for Follow-On Attacks After Breach

2 months ago
in Information Security/Cyber security
0
Peatix Braces Users for Follow-On Attacks After Breach
Share on FacebookShare on TwitterShare on LinkedIn


Occasions and ticketing app Peatix has warned customers of follow-on cyber-attacks after admitting it suffered a knowledge breach earlier this month.

The agency claimed to have been knowledgeable by a 3rd celebration on November 9 that account data had been “improperly accessed and obtained.

“It has been confirmed that data, together with names, electronic mail addresses, salted and hashed model of passwords, nicknames, most popular languages, and international locations and time zones the place the accounts have been created, about a few of our customers was concerned,” it famous.

Thankfully, as a result of the corporate doesn’t retailer passwords in plain textual content or full bank card particulars, the fallout from the breach must be pretty contained.

Nonetheless, it’s nonetheless requesting customers to reset their passwords, and warned of potential follow-on credential stuffing and password spraying assaults, which means that its encryption could also be crackable.

“In case your data was obtained by unhealthy actors, they may use it to contact you (e.g. by sending you emails) or to aim to assemble private data from you by deception (often known as phishing assaults),” the notice continued. “They could declare to be Peatix or ship emails showing to be from Peatix.”

Paul Bischoff, privateness advocate at Comparitech.com, argued that the extent of threat publicity for affected clients will depend upon particulars that haven’t but been divulged by the corporate.

“Peatix has not said what algorithm is used to hash and salt the passwords within the database, which might give us a greater indication as as to if customers’ passwords are in danger,” he defined.

“I’ve seen loads of breaches of passwords that have been hashed with deprecated algorithms akin to SHA1 or MD5 that may be cracked with little effort, so it could be good to know what algorithm was used to encrypt these passwords.”

ShareTweetShare

Related Posts

The 3 Most Common Types of BEC Attacks (And What …
Information Security/Cyber security

Microsoft Releases New Info on SolarWinds Attack Chain

January 21, 2021
Kentucky Senior Arrested for Identity Theft
Information Security/Cyber security

Kentucky Senior Arrested for Identity Theft

January 20, 2021
US Marines Create “Blue Team”
Information Security/Cyber security

US Marines Create “Blue Team”

January 20, 2021
Trump Pardons Google Trade Secret Thief
Information Security/Cyber security

Trump Pardons Google Trade Secret Thief

January 20, 2021
Has the coronavirus pandemic affected Apple’s hardware design? – Naked Security
Information Security/Cyber security

Has the coronavirus pandemic affected Apple’s hardware design? – Naked Security

January 20, 2021
Are you more likely to be murdered IRL or hacked online? The existential question of our times has been answered
Information Security/Cyber security

Are you more likely to be murdered IRL or hacked online? The existential question of our times has been answered

January 20, 2021
Next Post
Helping CISOs prepare for the 2021 cyberthreat landscape

Helping CISOs prepare for the 2021 cyberthreat landscape

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Updates

Kroll adds three seasoned cybersecurity experts to Cyber Risk practice | 2021-01-21

Kroll adds three seasoned cybersecurity experts to Cyber Risk practice | 2021-01-21

12 mins ago
Indian Use of Quadcopters Along LoC On The Rise: Pak Media

US Drone Expert on Indian Swarm Drones – Indian Defence Research Wing

14 mins ago
Datadog Announces Distributed Tracing for AWS Step Functions

Samenvatting: Verimatrix brengt geavanceerde Code Protection service uit voor Android Application Bundles

23 mins ago
Trump Restricted Drone Imports In Final White House Days

Trump Restricted Drone Imports In Final White House Days

45 mins ago
The path to Gulf reconciliation

The path to Gulf reconciliation

52 mins ago
Growing cybersecurity concerns create opportunity for competitive advantage | 2020-09-14

Executive protection has gone digital | 2021-01-21

1 hour ago
FLASH:IEA Reduces Oil Demand Forecast for 2021

FLASH:IEA Reduces Oil Demand Forecast for 2021

1 hour ago
Pentagon announces new acting CIO as Deasy departs

Pentagon announces new acting CIO as Deasy departs

1 hour ago
Load More
PG-Intel

© 2020 All Rights Reserved .

Brought to you by Primarius Group

  • Disclaimer
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Physical Security
  • Cyber security
  • Defense
  • Corporate Security
  • Emergency Management
  • Open Source Intelligence
  • More
    • Geo-politics
    • Threat intelligence
    • Protective Intelligence
    • Risk Management

© 2020 All Rights Reserved .