this post was submitted on 21 Nov 2023
47 points (98.0% liked)
Technology
60115 readers
4479 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
This is the best summary I could come up with:
Quick show of hands: whose data hasn't been stolen in the mass exploitation of Progress Software's vulnerable MOVEit file transfer application?
Embarrassingly antivirus biz Avast is among these new-ish victims, which recently disclosed the crooks accessed some "low-risk customer personal information."
"We take this seriously and are notifying impacted customers and offering dark web monitoring services free of charge," the developer xeeted on October 25.
As expected, users aren't too happy with Avast's "shameless marketing tactics" and took to a web forum to voice their complaints.
The Virgin Pulse-owned company has sent notification letters to more than 1.6 million patients alerting them that their names, addresses, dates of birth, and health information may have been stolen by miscreants abusing MOVEit, according to a November 18 filing with the Maine Attorney General's office.
By August, it determined criminals had, in fact, managed to "exfiltrate certain data," and in October Welltok began notifying Sutter Health patients that their personal information may have been accessed.
The original article contains 676 words, the summary contains 162 words. Saved 76%. I'm a bot and I'm open source!