#postal-security

[ follow ]
US politics
fromArs Technica
20 hours ago

CBP facility codes sure seem to have leaked via online flashcards

Immigration offenses and internal systems of CBP are detailed in flashcards, highlighting procedures and responsibilities of agents.
#mail-theft
California
fromABC7 San Francisco
2 days ago

More ABC7 viewers share issues with rising mail theft in San Jose communities

Mail theft in San Jose is escalating, with residents experiencing repeated incidents and significant financial losses.
Brooklyn
fromHoodline
2 weeks ago

Brooklyn Mailbox Bandits Reel In Checks, Cops Sound Alarm

Brooklyn residents are warned about a rise in mail theft and check fraud, urging precautions to protect finances.
California
fromABC7 San Francisco
2 days ago

More ABC7 viewers share issues with rising mail theft in San Jose communities

Mail theft in San Jose is escalating, with residents experiencing repeated incidents and significant financial losses.
Brooklyn
fromHoodline
2 weeks ago

Brooklyn Mailbox Bandits Reel In Checks, Cops Sound Alarm

Brooklyn residents are warned about a rise in mail theft and check fraud, urging precautions to protect finances.
#cybersecurity
fromTechCrunch
2 days ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

EU data protection
fromSecurityWeek
1 day ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
EU data protection
fromTechCrunch
2 days ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromThe Hacker News
4 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
fromWIRED
2 days ago

CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards

The public Quizlet set contained information about alleged codes for specific facility entrances. 'Checkpoint doors code?' asked one card, with a specific four-digit combination listed in response.
Privacy professionals
Information security
fromSecurityWeek
2 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
fromFuturism
3 days ago

Delivery Robot Companies in Trouble as Bot Become Targets for Vandalism

Out of the company's first 80,000 deliveries the bots finished on campus, about 1,600 involved incidents of vandalism. At a cost of $2,500 per Kiwibot, the damage adds up quick.
London startup
#data-breach
Privacy technologies
fromTechCrunch
3 days ago

Exclusive: Money transfer app Duc exposed thousands of driver's licenses and passports to the open web

A publicly accessible Amazon storage server exposed personal data of hundreds of thousands, including driver's licenses and passports, without encryption.
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy technologies
fromTechCrunch
3 days ago

Exclusive: Money transfer app Duc exposed thousands of driver's licenses and passports to the open web

A publicly accessible Amazon storage server exposed personal data of hundreds of thousands, including driver's licenses and passports, without encryption.
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
European startups
fromTechCrunch
5 days ago

FedEx chooses partnerships over proprietary tech for its automation strategy | TechCrunch

FedEx partners with Berkshire Grey to develop robots for bulk package unloading, aiming to enhance warehouse automation.
Canada news
fromwww.cbc.ca
4 days ago

Canada Post is planning to end home delivery. Here's how community mailboxes will work | CBC News

Canada Post is transitioning to community mailboxes, ending home delivery due to financial challenges and a directive from Public Services and Procurement Canada.
US Elections
fromTruthout
4 days ago

Trump Order Gives US Postal Service Unprecedented Control Over Mail Voting

Donald Trump signed an executive order enhancing U.S. Postal Service oversight on mail-in voting, aiming to ensure voter integrity ahead of elections.
Careers
fromZDNET
6 days ago

3 red flags that job posting is a scam - and how to verify safely

Job scams are on the rise, exploiting vulnerable job seekers with vague offers and promises of high pay for little work.
Privacy professionals
fromSilicon Canals
2 days ago

A money-transfer app stored customer passports on an unencrypted, publicly accessible server for nearly five years - Silicon Canals

Fintech companies face regulatory pressure to collect identity documents but lack enforceable obligations to protect them, leading to data breaches.
#usps
Washington DC
fromFast Company
1 week ago

USPS transportation surcharge will make these types of packages more expensive to ship from the post office

USPS will implement an 8% transportation surcharge on packages from April 26, 2023, to January 17, 2027, to cover operational costs.
Washington DC
fromFast Company
1 week ago

USPS transportation surcharge will make these types of packages more expensive to ship from the post office

USPS will implement an 8% transportation surcharge on packages from April 26, 2023, to January 17, 2027, to cover operational costs.
US politics
fromwww.npr.org
2 days ago

As DOJ prepares to share state voter data with DHS, a key privacy officer resigns

The DOJ is acquiring sensitive voter registration data, raising privacy concerns, as a key privacy officer resigns amid ongoing legal challenges.
DevOps
fromInfoQ
1 week ago

Panel: Security Against Modern Threats

Modern threats to software supply chains require resilience by design, integrating security into engineering workflows and empowering developers with the right tools.
Privacy technologies
fromWIRED
5 days ago

This App Makes Even the Sketchiest PDF or Word Doc Safe to Open

Dangerzone is a free tool that safely opens potentially harmful documents by converting them into secure image-based PDFs.
UK politics
fromBusiness Matters
1 week ago

Royal Mail staff allege pressure to hide undelivered post to meet targets

Postal workers allege Royal Mail manipulates delivery performance metrics by hiding undelivered mail during inspections.
#ice
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
#supply-chain-attack
Information security
fromInfoQ
6 days ago

PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information

A supply chain attack on LiteLLM led to over 40,000 downloads of a compromised package that harvested sensitive information.
Information security
fromInfoQ
6 days ago

PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information

A supply chain attack on LiteLLM led to over 40,000 downloads of a compromised package that harvested sensitive information.
#usps-financial-crisis
Media industry
fromAxios
2 weeks ago

USPS warning raises stakes for mail-order prescriptions, higher postage prices

USPS faces imminent cash depletion within 12 months without congressional intervention, threatening mail delivery including critical prescription medications, while Amazon simultaneously reduces USPS volume by two-thirds.
Washington DC
fromFast Company
2 weeks ago

USPS warns it may not make it to 2027 without changes-starting with pricier stamps

USPS faces insolvency within 12 months without operational flexibility, pricing increases, and expanded borrowing authority to address 104 billion pieces of lost annual mail volume since 2006.
Media industry
fromAxios
2 weeks ago

USPS warning raises stakes for mail-order prescriptions, higher postage prices

USPS faces imminent cash depletion within 12 months without congressional intervention, threatening mail delivery including critical prescription medications, while Amazon simultaneously reduces USPS volume by two-thirds.
Washington DC
fromFast Company
2 weeks ago

USPS warns it may not make it to 2027 without changes-starting with pricier stamps

USPS faces insolvency within 12 months without operational flexibility, pricing increases, and expanded borrowing authority to address 104 billion pieces of lost annual mail volume since 2006.
#whatsapp
fromTechCrunch
4 days ago
Privacy professionals

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

Privacy professionals
fromTechCrunch
4 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Information security
fromTheregister
5 days ago

Don't open that WhatsApp message, Microsoft warns

WhatsApp messages are being exploited to deliver malicious files that allow attackers to control victims' machines and access their data.
fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

E-Commerce
fromThe Verge
2 weeks ago

Amazon doesn't want the blame for the Post Office going under

Amazon plans to reduce USPS shipments by two-thirds after contract expiration, citing the postal service's abrupt withdrawal from negotiations that could have generated billions in revenue.
UK news
fromwww.independent.co.uk
2 weeks ago

Parcel locker giant reveals UK losses ahead of 6.7bn takeover

InPost's UK operations reported significant losses during Christmas 2024, with earnings expected to remain flat this year amid a pending €7 billion takeover.
#amazon-usps-contract-dispute
E-Commerce
fromEngadget
2 weeks ago

Amazon will reportedly cut its USPS shipments by at least two-thirds

Amazon plans to reduce USPS shipments by two-thirds after the Postal Service ended contract negotiations in favor of a new competitive bidding process.
Washington DC
fromEntrepreneur
2 weeks ago

Amazon Plans to Slash USPS Shipments by Two-Thirds. Here's What That Means for the Postal Service.

Amazon plans to reduce USPS package shipments by two-thirds by fall, threatening the financially struggling postal service that delivered over one billion Amazon packages last year.
E-Commerce
fromEngadget
2 weeks ago

Amazon will reportedly cut its USPS shipments by at least two-thirds

Amazon plans to reduce USPS shipments by two-thirds after the Postal Service ended contract negotiations in favor of a new competitive bidding process.
Washington DC
fromEntrepreneur
2 weeks ago

Amazon Plans to Slash USPS Shipments by Two-Thirds. Here's What That Means for the Postal Service.

Amazon plans to reduce USPS package shipments by two-thirds by fall, threatening the financially struggling postal service that delivered over one billion Amazon packages last year.
#supply-chain-security
Information security
fromSecuritymagazine
2 weeks ago

Threat Actors Target the Entire Retail Supply Chain

Threat actors exploit shared supply chain vulnerabilities between wholesalers and retailers, with over 70% of retailers and 60% of wholesalers having exposed credentials, enabling widespread initial access.
Information security
fromSecuritymagazine
2 weeks ago

Threat Actors Target the Entire Retail Supply Chain

Threat actors exploit shared supply chain vulnerabilities between wholesalers and retailers, with over 70% of retailers and 60% of wholesalers having exposed credentials, enabling widespread initial access.
#phishing
Information security
fromThe Hacker News
4 days ago

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

A phishing campaign impersonating CERT-UA distributed malware called AGEWHEEZE targeting various organizations in Ukraine.
Privacy professionals
fromSecurityWeek
1 week ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
4 days ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromSecuritymagazine
6 days ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromThe Hacker News
4 days ago

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

A phishing campaign impersonating CERT-UA distributed malware called AGEWHEEZE targeting various organizations in Ukraine.
Privacy professionals
fromSecurityWeek
1 week ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
4 days ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromSecuritymagazine
6 days ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Miscellaneous
fromPadailypost
1 month ago

Stolen mail recovered

Police recovered over 1,500 stolen mail pieces and arrested two suspects after a two-month investigation into postal theft at a Mountain View apartment complex.
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Information security
fromSecurityWeek
5 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Privacy professionals
fromComputerworld
3 weeks ago

Cyber criminals too are working from home... your home

The FBI warns that cybercriminals use residential proxies to mask illegal activities by hijacking IoT devices, smartphones, and routers, threatening both consumers and enterprises, particularly older devices.
Information security
fromComputerWeekly.com
5 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Information security
fromFortune
6 days ago

Cargo theft costs U.S. trucking $18 million a day and is 'unlike anything our industry has faced before,' logistics exec warns | Fortune

Cargo theft has become a significant threat to the U.S. supply chain, costing the industry billions annually.
fromFast Company
1 month ago

Scanning that QR code can leave you vulnerable. Here's how to protect yourself

QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Privacy technologies
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
#fbi-cybersecurity
fromSecurityWeek
4 weeks ago
Privacy professionals

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

Privacy professionals
fromSecurityWeek
4 weeks ago

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
Privacy professionals
fromTechRepublic
4 weeks ago

FBI Investigates Suspicious Activity in Surveillance Platform

The FBI is investigating suspicious cyber activity on systems managing surveillance and wiretap warrants, highlighting critical vulnerabilities in sensitive law enforcement infrastructure.
fromTechCrunch
2 weeks ago

Cyberattack on vehicle breathalyzer company leaves drivers stranded across the US | TechCrunch

Intoxalock spokesperson Rachael Larson confirmed that the company had been hit by a cyberattack, stating that they took steps to temporarily pause some of their systems as a precautionary measure.
Information security
Information security
fromTechzine Global
2 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Higher education
fromNature
2 months ago

Six steps to protect researchers' digital security

Academic freedom and researchers' safety are deteriorating globally due to harassment, political interference, legal threats, and underreporting.
fromElectronic Frontier Foundation
1 month ago

The Government Uses Targeted Advertising to Track Your Location. Here's What We Need to Do.

The document acknowledges that a program by the agency to use "commercially available marketing location data" for surveillance drew from the process used to select the targeted ads shown to you on nearly every website and app you visit.
Privacy professionals
Information security
fromSecurityWeek
2 weeks ago

Threat Actor Targeting VPN Users in New Credential Theft Campaign

Storm-2561 uses SEO poisoning and GitHub hosting to distribute trojans impersonating VPN software, stealing credentials through signed malware that evades detection.
fromDataBreaches.Net
2 months ago

Personal Details of Thousands of Border Patrol and ICE Agents Allegedly Leaked in Huge Data Breach - DataBreaches.Net

Sensitive details of around 4,500 ICE and Border Patrol employees-including almost 2,000 agents working in frontline enforcement-have allegedly been released by a Department of Homeland Security whistleblower following last week's fatal shooting of Renee Nicole Good. The Jan. 7 killing of the mother by ICE agent Jonathan Ross in Minneapolis, Minnesota, has sparked nationwide protests and worldwide outrage, including among some DHS employees.
US politics
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromThe Hacker News
1 month ago

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

North Korean threat actor ScarCruft deployed the Ruby Jumper campaign using malware families that abuse Zoho WorkDrive for C2 communications and removable media to compromise air-gapped networks.
#password-security
fromFast Company
1 month ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromFast Company
1 month ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromWIRED
1 month ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
fromZDNET
1 month ago

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Web browsers are among the top targets for today's cybercriminals, playing a role in nearly half of all security incidents, new research reveals. According to Palo Alto Networks' 2026 Global Incident Response report, an analysis of 750 major cyber incidents recorded last year across 50 countries found that, in total, 48% of cybercrime events involved browser activity. Individuals trying to connect to the web, including business employees, are exposed to cyberthreats on a daily basis.
Information security
fromTechCrunch
2 months ago

Exclusive: US cargo tech company publicly exposed its shipping systems and customer data to the web

For the past year, security researchers have been urging the global shipping industry to shore up their cyber defenses after a spate of cargo thefts were linked to hackers. The researchers say they have seen elaborate hacks targeting logistics companies to hijack and redirect large amounts of their customers' products into the hands of criminals, in what has become an alarming collusion between hackers and real-life organized crime gangs.
Information security
fromSecurityWeek
2 months ago

Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms

Vulnerabilities discovered by researchers in Dormakaba physical access control systems could have allowed hackers to remotely open doors at major organizations. The security holes were discovered by experts at SEC Consult, a cybersecurity consulting firm under Atos-owned Eviden, in Dormakaba's Exos central management software, a hardware access manager, and registration units that enable entry via a keypad, fingerprint reader, or chip card.
Information security
fromThe Hacker News
2 months ago

Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages

Silent Push said it discovered the campaign after analyzing a suspicious domain linked to a now-sanctioned bulletproof hosting provider Stark Industries (and its parent company PQ.Hosting), which has since rebranded to THE[.]Hosting, under the control of the Dutch entity WorkTitans B.V., is a sanctions evasion measure. The domain in question, cdn-cookie[.]com, has been found to host highly obfuscated JavaScript payloads (e.g., "recorder.js" or "tab-gtm.js") that are loaded by web shops to facilitate credit card skimming.
Information security
fromThe Hacker News
2 months ago

Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat

"For initial access, the threat actors utilize a fake Booking.com reservation cancellation lure to trick victims into executing malicious PowerShell commands, which silently fetch and execute remote code," researchers Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee said. The starting point of the attack chain is a phishing email impersonating Booking.com that contains a link to a fake website (e.g., "low-house[.]com").
Information security
Information security
fromTechzine Global
2 months ago

Number of phishing attacks doubles in one year

Phishing kits and phishing-as-a-service expanded in 2025, enabling less skilled attackers and leveraging AI-generated messages and QR-based quishing to increase realism and bypass defenses.
Information security
fromTheregister
1 month ago

Password managers don't protect secrets if pwned

Bitwarden, LastPass, and Dashlane can fail to protect credentials under server-compromise scenarios, allowing disclosure or alteration of user passwords.
[ Load more ]