Latest News Add-on the Fun with BookWidgets

A TikTok breach compromises 2 billion consumer data, Samsung falls sufferer to a theft of US buyer data and public-facing purposes have change into essentially the most broadly used preliminary vector to penetrate a corporation.

Welcome to CyberSecurity Right now. I’m Jim Love, CIO of IT World Canada and Tech Information Day within the US sitting in for the vacationing Howard Solomon.

TikTok Breach might have uncovered 2 billion consumer data

An enormous knowledge breach has reportedly hit the  fashionable social media platforms, TikTok.  Safety consultants have acknowledged that the breach may have an effect on as much as 2 billion – that’s B as in Billion consumer database data.

Social media has been abuzz with feedback together with (pun supposed) a poster utilizing the identify Blue Hornet who summed it up as:

“Who would have thought that @TikTok would determine to retailer all their inside backend supply code on one Alibaba Cloud occasion utilizing a trashy password?”

Specialists are warning customers to to take preventive measures together with altering their TikTok password and enabling Two-Issue Authentication.

A TikTok spokesperson claimed that their group had investigated and decided that the code in query was not associated to TikTok’s backend supply code.

And maybe within the final irony, Troy Hunt, creator of haveIbeenpwned famous that his consumer identify  would now flip up as having been pwned, however, as he additionally famous since he makes use of a singular advanced password and two issue authentication, that is extra of an inconvenience to him than a menace.  Hunt additionally famous that proof of the breach was “to this point fairly inconclusive.”

Samsung cyberattack might have an effect on U.S. Buyer Knowledge

South Korean know-how large Samsung has confirmed an assault that resulted in unauthorized entry to some U. S. buyer knowledge.

There isn’t a clear assertion of what number of clients had been affected by the breach, however Samsung introduced that the breach might have given hackers entry to non-public knowledge together with names, contact and demographic info, date of start in addition to product registration knowledge.  Not affected, in keeping with the corporate, had been social safety numbers, or credit score and debit card numbers.

The corporate assertion reads as follows:

“In late July 2022, an unauthorized third get together acquired info from a few of Samsung’s U.S. programs. On or round August 4, 2022, we decided by way of our ongoing investigation that private info of sure clients was affected.”

Samsung is urging clients to be cautious of potential social engineering makes an attempt.  This consists of avoiding clicking on hyperlinks or attachments from unknown senders. As properly, clients ought to examine their accounts for any suspicious exercise.

Samsung states that they’ve taken steps to safe the affected system and that they’ve employed an exterior cybersecurity agency to move up the response efforts.

Public dealing with purposes change into essentially the most broadly used preliminary assault vector.

Safety analysis from Kaspersky’s Incident Response Analytics Report reported that public dealing with purposes have now change into essentially the most broadly used preliminary vector to penetrate a corporation.

Greater than half of cyberattacks in 2021 began with vulnerability exploitation of public dealing with purposes.

Their proportion as an preliminary assault vector has elevated from 31.5% in 2020 to 53.6% in 2021.

Compromised accounts and malicious emails are a detailed second and third by way of beginning  factors for cyberattacks.

The report which could be discovered on Kaspersky’s Securelist weblog additionally famous that “51.9% of incidents had been ransomware assaults, and in 62.5% of these instances, cybercriminals had had entry to focus on programs for greater than a month earlier than they began file encryption.”


Observe Cyber Safety Right now the place ever you get your podcasts – Apple, Google or different sources.   You may as well have it delivered to you through your Google or Alexa good speaker.

Hyperlinks from in the present day’s podcast can be posted in an article on on our podcast web page.
I’m Jim Love, CIO of ITWC, publishers of,  within the US and creators of the ITWC podcasting community.  I’m additionally host of a number of of our podcasts which you could find at

I’ll be again on Friday whereas Howard enjoys his time away.  Til then, keep protected.

Leave a Comment