Tonga Ministry of Health hit with cyberattack affecting website, IT systems
Minister of Health Ana ‘Akau’ola then told parliament on Thursday that an unnamed ransomware gang attacked the National Health Information System, demanding millions in ransom to restore the system.
Microsoft investigates OneDrive bug that breaks file search
Microsoft is investigating a known OneDrive issue that is causing searches to appear blank for some users or return no results even when searching for files they know they've already uploaded.
Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider
Cloudflare says it mitigated a record-breaking distributed denial of service (DDoS) attack in May 2025 that peaked at 7.3 Tbps, targeting a hosting provider.
Aflac duped by social-engineering attack, marking another hit on insurance industry | CyberScoop
Three insurance companies have publicly disclosed cyberattacks in the past week. Scattered Spider, an amorphous band of cybercriminals, has been actively targeting the sector.
« On est dans le marketing de la peur » : des experts décryptent la (fausse ?) fuite inédite de 16 milliards d’identifiants
La presse mondiale s’est enflammée, le 19 juin 2025 : « 16 milliards de mots de passe en fuite ! » Apple, Google, Facebook, tous concernés. Les titres alarmistes se sont multipliés, évoquant la « plus grande fuite de l'Histoire » et appelant à la vigilance extrême. Mais que s’est-il vraiment passé ? Numerama a
On Friday, American insurance giant Aflac disclosed that its systems were breached in a broader campaign targeting insurance companies across the United States by attackers who may have stolen personal and health information.
Can users reset their own passwords without sacrificing security?
Self-service password resets (SSPR) reduce helpdesk strain—but without strong security, they can open the door to attackers. Learn why phishing-resistant MFA, context-aware verification, and risk-based detection are critical to secure SSPR implementation.
Human Risk Mitigation is at the Core of Email Security | CSA
Humans are a weak spot that cybersecurity must compensate for. Email security tools can ensure that employees are not responsible for stopping attacks.
Aflac says it stopped ransomware attack launched by ‘sophisticated cybercrime group’
Insurance industry giant Aflac said it disrupted a cyberattack within hours of discovering it and is now working to determine how much data was potentially breached in the incident.
Faux agents d'entretiens, soirées mondaines et mouchards : les dessous de l'espionnage au Bourget - Numerama
Le Salon du Bourget ouvre ses portes au grand public ce vendredi 20 juin 2025 : l’occasion idéale de revenir sur quelques affaires d’espionnage industriel survenues lors de la précédente édition. Entre clés USB piégées, vols d'ordinateurs et espions infiltrés en agents d'entretien, les coulisses du plus grand
Good article from 404 Media on the cozy surveillance relationship between local Oregon police and ICE: In the email thread, crime analysts from several local police departments and the FBI introduced themselves to each other and made lists of surveillance tools and tactics they have access to and felt comfortable using, and in some cases offered to perform surveillance for their colleagues in other departments. The thread also includes a member of ICE’s Homeland Security Investigations (HSI) and members of Oregon’s State Police. In the thread, called the “Southern Oregon Analyst Group,” some members talked about making fake social media profiles to surveil people, and others discussed being excited to learn and try new surveillance techniques. The emails show both the wide array of surveillance tools that are available to even small police departments in the United States and also shows informal collaboration between local police departments and federal agencies, when ordinarily agencies like ICE are expected to follow their own legal processes for carrying out the surveillance...