NEW by me:
Illuminate wins another round in court, but it may not all be over despite the California Supreme Court reversing the Court of Appeal:

Blogger/journalist at databreaches.net and pogowasright.org. As a retired healthcare professional, breaches in the healthcare sector are my priority.
The header pic is Indy, a Siberian husky we rescued in 2016 after I read how nobody wanted her because she was so difficult. She is now living her best life and is a mushball with me.
| #DataBreaches | https://www.databreaches.net |
| #Privacy | https://www.pogowasright.org |
| Have a news tip? | Signal: Dissent.73 |
| [email protected] | |
| [email protected] | |
| Pronouns | She/Her |
NEW by me:
Illuminate wins another round in court, but it may not all be over despite the California Supreme Court reversing the Court of Appeal:
NEW by me:
Another detail emerges about Instructure's agreement with ShinyHunters; Debate continues about whether to pay:
Cybersecurity experts make claims about ShinyHunters to journalists, but where is the evidence to support their claims? Journalists shouldn't just quote experts -- ask them the basis for their claims. How much evidence do they actually have to support their assertions?
#hackandleak #databreach #Instructure #ShinyHunters #ransom #journalism
CNN's Sean Lyngaas back once again with a belter story: Iranian hackers are behind a series of breaches of systems that monitor the amount of fuel in storage tanks serving gas stations in multiple U.S. states.
Per Lyngaas: the hackers "exploited automatic tank gauge systems that were sitting online and unprotected by passwords."
A little louder for the folks in the back:
...."UNPROTECTED BY PASSWORDS."
https://www.cnn.com/2026/05/15/politics/iran-hackers-tank-readers-gas-stations

US officials suspect Iranian hackers are behind a series of breaches of systems that monitor the amount of fuel in storage tanks serving gas stations in multiple states, according to multiple sources briefed on the activity.
RE: https://mastodon.social/@brianhonan/116577762044435173
Thank you, thank you, thank you!
And to be clear: I would NOT advise the law firm to pay the threat actors in this case.
NEW by me:
Many immigrants have enough anxiety these days without their lawyer leaking their files and having the files all wind up in the hands of criminals. Read about what happened with a NYC law firm in my new post.
No need to hack when it’s leaking: Dalbir Singh & Associates law firm edition:
#dataleak #immigration #incidentresponse #misconfiguration #KillSec #DSDLaw
If you're going to run one of the world's largest dark web drug marketplace, it's probably a good idea not to have laundered loot delivered to your front door.
Read more in my article on the Bitdefender blog: https://www.bitdefender.com/en-us/blog/hotforsecurity/dream-market-kingpin-arrested-gold-bars
One of the many things I love about this platform is that people can disagree civilly.
So to thank you all, I will share with you the handwritten Mother's Day card my pre-teen granddaughter wrote to me:
Roses are red.
Violets are blue.
Life would suck
Without someone like you.
(Yes, it caught me by a bit of surprise, too.) 😂
RE: https://infosec.exchange/@masek/116573926275633150
"In that case I would expect the responsible people of affected entity to be indicted and arrested."
U.S. has been slow to do that, although we have seen at least one person prosecuted criminally for covering up a breach. Other countries such as South Korea are much quicker to hold executives personally responsible.
But if this country did start indicting and arresting those entity personnel responsible, the same executives that decided NOT to invest in security despite pleadings by CISO and IT personnel will be the first to throw the CISO and IT personnel under the indictment bus.
Do you see responsible people of breached entities arrested and indicted in your country?
@masek @PogoWasRight @euroinfosec
I agree with @PogoWasRight on certain points that, in my view, are quite straightforward.
Let’s start from the premise that, in the vast majority of cases, the affected entities do not adequately protect their data - any kind of data. And here lies the strict liability of those who, on the contrary, should have ensured its security.
If a cybercriminal claims to be in possession of exfiltrated data, they generally also provide proof files and a file tree. Consequently, if the attacker’s claims are true, the affected entity is already aware of both the volume of the exfiltrated data and its nature.
Third point: a data breach always causes harm. Personally, I wouldn’t dwell too much on the damage suffered by the affected entity; I’m much more interested in the consequences that damage causes - or could cause - to “indirect victims” (students, school staff, patients…), that is, all those people who have entrusted their data and their trust to third parties such as schools, universities, hospitals, and other organizations. Of course, we can also assess the severity of the damage on a scale of 1 to 10, but the damage remains nonetheless, and when personal data is exposed, the perception of severity is always subjective.
The fact remains, however, that if a person entrusts sensitive data to a third party, that party has not only a legal obligation to protect it without any negligence but also a moral duty to prevent someone’s private life from being publicly exposed.
Finally, I find the behavior of numerous entities affected by cyberattacks involving data exfiltration and encryption to be very disappointing: they often inform the “indirect victims” only after many months and, in some cases, even years later.