Cyber ​​Security Today, January 5, 2022 – The year kicks off with confirmation of more data breaches

The year starts with the confirmation of more data breaches.

Welcome to Cyber ​​Security Today. It’s Wednesday, January 5. I’m Howard Solomon, contributing cybersecurity writer for

The new year started for many listeners with a clean calendar. Unfortunately, it also started as it ended last year by continuing a long list of confirmed data breaches. Here are a few:

Broward Health, which runs a hospital and clinics in Fort Lauderdale, Florida, has begun informing more than 1.3 million patients and staff that their personal information was compromised in an October data breach. The information included names, dates of birth, address, telephone numbers, financial or bank account information, social security numbers, insurance information and account number, medical information, driver’s license numbers, and email address. In a statement, the institution said it had been hacked through a third-party medical service provider that uses it.

The Tourist Office of the City of Montreal has confirmed that it was recently hacked. The Kurakurt gang has been credited for this, as have 10 other organizations that have recently been victimized in Canada and the US. You can find my news item on this here.

Unencrypted Passwords of the 7.3 million users of the DatPiff website for those who like to listen and exchange free mixtapes are now available to every crook. The Bleeping Computer news service says the database of credentials was put up for sale in late November, but a crook is now giving it away. It is not clear when the database was stolen. Bleeping Computer thinks it was an old backup of DatPiff. Anyway, DatPiff users need to change their password.

A little over a month ago security researchers warned IT departments to begin scanning for and patching vulnerabilities if they have Apache Log4j2 libraries in their applications. While the remediation has been going on for weeks, Microsoft warned Monday that threat actors on the Internet will continue to prey on organizations that aren’t patching fast enough. And at the end of the year, Crowdstrike said it believes a China-based threat group called Aquatic Panda is using a modified version of a log4j2 exploit.

A security researcher warns iPhone and iPad users of a vulnerability he says Apple is slow to fix. Basically, an attacker with access to a device can change settings and do anything, including installing ransomware. Apple has promised a solution. Until it’s released, Apple device users should be careful when dealing with email messages purportedly coming from Apple services or products that use Apple’s HomeKit framework.

Finally, If your organization allows the use of the Telegram messaging app, keep in mind that an infected version is circulating. According to researchers at Minerva Labs, the app called “Telegram desktop.exe” installs several attack tools, including the Purple Fox Rootkit. The report does not say how the bad app is distributed, but usually malware is included in links in text messages and emails that promise to be a legitimate application, or they are downloaded from unapproved app stores.

That’s it for now. Please note that links to details on podcast stories are in the text version at There you will also find other stories from me.

Follow Cyber ​​Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker. Thanks for listening. I’m Howard Solomon

Leave a Comment