New, by me: UnitedHealth has scrubbed much of its website mentioning its diversity, equity, and inclusion (DEI) policies, including pulling down blog posts and large sections of its website.
TechCrunch saw UnitedHealth take down the pages in real-time this morning because we've used a webpage monitor for the past year to keep track of Change Healthcare's data breach notice, and saw the DEI-related pages removed as it happened.
A federal judge on Thursday blocked DOGE's access to systems at the Social Security Administration that store huge amounts of highly sensitive information on millions of America, calling the access tantamount to a "fishing expedition."
New, by me: Marko Elez, the DOGE staffer who resigned after his racist posts resurfaced (and was rehired soon after), violated Treasury rules when he sent an unencrypted email containing personally identifiable information to two Trump administration officials.
NEW by @carlypage: CISA had another round of layoffs, per people directly affected, said to be more than a hundred CISA employees. Red team staffers and its Cyber Incident Response Team (CIRT) are affected.
Hats off to DataBreaches.net journalist @PogoWasRight for going public and publishing details about the legal demand they received from U.K. law firm Pinsent Masons, on behalf of the hacked health firm HCRG.
You can read more about the legal demand on DataBreaches.net.
New day, new stalkerware breach. Today it's Spyzie, a little known phone surveillance operation that's still managed to amass more than half a million customers — whose email addresses are going in Have I Been Pwned.
By our count, Spyzie is the 24th(!) stalkerware operation that's been hacked or otherwise exposed victims' private phone data since 2017.
Signal has long said it'd "rather shut down or leave a market" than add a backdoor or weaken its encryption.
Apple also had this option when it was ordered by the UK government to build an iCloud backdoor. Apple could have said - without violating secrecy laws — why it was leaving the UK, rather than weaken the encryption of all of its UK customers.
Instead, Apple capitulated to the demand to keep operating, and prioritized its profits over its customers' security.
The U.K. government's secret order demanding that Apple allows access to the cloud-stored encrypted data of any of its customers anywhere in the world is an "emergency," according to critics, and would set a dangerous global precedent that would embolden authoritarian regimes to demand the same.
ICYMI from yesterday: The biggest breach of U.S. government data is under way.
"Whether DOGE staffers are bad actors misses part of the point. Acts of subterfuge, espionage, or ignorance could produce the same suboptimal outcome: exposure or loss of the nation’s sensitive datasets."
New, by me: Elon Musk's DOGE has taken control of large swathes of Americans' private information held by the U.S. government, representing the widest known compromise of government-held data by a private group of individuals — and little has gotten in their way.
New: Elon Musk's DOGE team was granted "full access" to sensitive Treasury payment systems that control trillions of dollars in payments to Americans, including Social Security checks and tax refunds.
Sen. Ron Wyden said Musk’s access poses a “national security risk.”
The access could also be considered a massive data breach of Americans' personal information in the hands of unelected private individuals.
It's worth noting that PowerSchool is represented by crisis communications firm FTI Consulting to handle its PR (read: media inquiries etc.) in the aftermath of its data breach, with the goal of saying as little as possible.
This isn't an uncommon strategy, per se, but it is telling that PowerSchool — which was acquired by a private equity giant for $4 billion only the year earlier — is willing to throw money at protecting its image than investing in basic cybersecurity practices to begin with.
In an updated incident FAQ on its website, PowerSchool says: "We are not sharing specifics around the number of districts and schools we believe were involved" in the data breach.
Here's what else PowerSchool isn't telling affected individuals about its breach.