Congressman Coming for Answers After No-Fly List Hack

U.S. Congressman Bennie Thompson is demanding answers from airlines and the federal government after a "massive hack" of the no-fly list. The congressman sent a letter to the airlines and the Department of Homeland Security asking for an explanation of the incident, which involved a hacker exploiting a vulnerability in the Transportation Security Administration's (TSA) Secure Flight System. The hack, first reported by USA Today, affected several major airlines, including American Airlines, Delta Air Lines and United Airlines. According to the newspaper, the hack compromised the personal information of travelers on the airlines' no-fly lists, potentially jeopardizing the security of those travelers. In the letter, Congressman Thompson, who chairs the House Committee on Homeland Security, asked the airlines to explain how their systems were breached, how many travelers were affected, and what preventative measures they are taking to ensure the security of their passengers in the future. He also asked the TSA to provide information about the security features of the Secure Flight System and the extent of any potential harm to passengers. It is not yet clear who is responsible for the hack or what their motive was. But the incident highlights the vulnerability of the aviation security system and raises questions about the safety and security of air travel in the United States. In the wake of the incident, Congressman Thompson and other members of Congress have called for a full investigation into the hack and for increased scrutiny of tech security measures. The suspected hack of the no-fly list could have serious implications for travelers and the airlines. It could lead to delays in the processing of security-related information, as well as potential changes to airline policies and procedures. It could also result in an increase in security costs for airlines and travelers, resulting in higher prices and fewer options. Ultimately, the hack of the no-fly list demonstrates the need for better security measures and demonstrates the potential impacts of cybersecurity breaches on travel and security. As Congressman Thompson noted in his letter, "The security of our nation's transportation networks and the safety of the traveling public must be our highest priority, and this incident should serve as a wake-up call to the industry and the government."

This Cyber News was published on therecord.media. Publication date: Tue, 24 Jan 2023 14:51:03 +0000


Cyber News related to Congressman Coming for Answers After No-Fly List Hack

Congressman Coming for Answers After No-Fly List Hack - U.S. Congressman Bennie Thompson is demanding answers from airlines and the federal government after a "massive hack" of the no-fly list. The congressman sent a letter to the airlines and the Department of Homeland Security asking for an explanation ...
1 year ago Therecord.media
U.S. No Fly List Breach: Government Investigating - A U.S. No Fly list with over 1.5 million records of banned flyers and upwards of 250,000 selectees has been shared publicly on a hacking forum. BleepingComputer has confirmed the list is the same TSA No Fly list that was discovered recently on an ...
1 year ago Bleepingcomputer.com
TSA U.S. No Fly List Leaked on Hacking Forum - It was recently discovered that a U.S. No Fly list, containing over 1.5 million records of banned flyers and 250,000 selectees has been found published on a hacking forum. According to BleepingComputer, its the same TSA No Fly list that was found on ...
1 year ago Heimdalsecurity.com
TSA Issues Security Directive to Airports and Carriers After No-Fly List Leak - The Transportation Security Administration (TSA) has issued a security directive to all U.S. airports and air carriers, warning them of the need for more stringent cybersecurity protections following the leak of the federal No-fly list. A Swiss ...
1 year ago Therecord.media
US No-Fly List Found on the Internet - Internet security is an ever-growing concern, especially in the current climate where hackers and other malicious actors often have access to vast amounts of data. The latest example of this was recently discovered by security researchers, who found ...
1 year ago Hackread.com
Hack The Box Launches 5th Annual University CTF Competition - PRESS RELEASE. Hack The Box, the leading gamified cybersecurity upskilling, certification, and talent assessment platform, is announcing its fifth annual global University Capture The Flag competition that will take place from December 8 to 10, 2023. ...
11 months ago Darkreading.com
Fly Catcher: Detect aircraft spoofing by monitoring for malicious signals - Fly Catcher is an open-source device that can detect aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Angelina Tsuboi, the developer of Fly Catcher, is an enthusiastic pilot, cybersecurity researcher, and ...
9 months ago Helpnetsecurity.com
CVE-2024-5535 - Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an ...
4 months ago
LinkedIn Tests Generative AI to Field Cybersecurity Questions From Employees and Suppliers - LinkedIn is testing how generative artificial intelligence could help employees and external suppliers get answers about cybersecurity policies within seconds, potentially cutting wait times for business deals or decisions to implement new tools. ...
11 months ago Wsj.com
No Fly List Leaked on Unsecured Server: Data Breach Highlights Need for Improved Cybersecurity - A recent data breach has highlighted just how important it is for organizations to have robust cybersecurity measures in place. On December 30th, a French-language news outlet reported that the traveler watch list for France, or the “no-fly” ...
1 year ago Securityaffairs.com
China's biggest lender ICBC hit by ransomware attack - Industrial and Commercial Bank of China Ltd Nov 10 - The Industrial and Commercial Bank of China's U.S. arm was hit by a ransomware attack that disrupted trades in the U.S. Treasury market on Thursday, the latest in a string of victims ...
11 months ago Reuters.com
Apex Legends players worried about RCE flaw after ALGS hacks - Electronic Arts has postponed the North American finals of the ongoing Apex Legends Global Series after hackers compromised players mid-match during the tournament. ALGS is an esports tournament series where players compete in a fast-paced, strategic ...
7 months ago Bleepingcomputer.com
CVE-2024-50106 - In the Linux kernel, the following vulnerability has been resolved: nfsd: fix race between laundromat and free_stateid There is a race between laundromat handling of revoked delegations and a client sending free_stateid operation. Laundromat thread ...
2 days ago Tenable.com
The SANS Holiday Hack Challenge is back! The Register - Review and manage your consent Here's an overview of our use of cookies, similar technologies and how to manage them. Webinar Whether you are considering a career in cyber security or you already work in the industry, the 2023 SANS Holiday Hack ...
10 months ago Go.theregister.com
Insomniac hack files leak news on Wolverine, Spider-Man 3, and more - Oli Welsh is senior editor, U.K., providing news, analysis, and criticism of film, TV, and games. He has been covering the business & culture of video games for two decades. The ransomware group that hacked Spider-Man 2 developer Insomniac Games on ...
10 months ago Polygon.com
U.S. No Fly List Data Breach Leaked on Hacker Forum - The U.S. No Fly List, a database of individuals who are barred from boarding commercial airlines due to security concerns, has been leaked on a hacker forum. The breach includes the full names and dates of birth of 1,817,233 individuals on the list ...
1 year ago Hackread.com
CVE-2022-48733 - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free after failure to create a snapshot At ioctl.c:create_snapshot(), we allocate a pending snapshot structure and then attach it to the transaction's list of ...
4 months ago Tenable.com
CVE-2024-26895 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
FBI Charges North Korean Hackers Over $100 Million Stolen in Crypto Hack - The FBI has recently charged a North Korean hacker in connection with the Harmony crypto hack from which the hacker allegedly stole over $100 million. The hacker, Jon Chang Hyok, is a member of the North Korean military intelligence agency, the ...
1 year ago Bleepingcomputer.com
CVE-2023-52587 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
The Unlikely Romance of Hackers and Government Suitors - The annual Hack the Capitol event brings together a diverse group of scientists, hackers, and policymakers to educate congressional staffers, scholars, and the press about the most critical cybersecurity challenges facing our nation. Hack the Capitol ...
10 months ago Darkreading.com
Insomniac Game Studio Hacked, Wolverine Project Leaked In Breach - Insomniac, one of the most successful video game makers in the world, was recently the victim of a massive hack ... and parts of the highly anticipated Wolverine game were among the troves of material leaked in the breach. According to multiple ...
10 months ago Tmz.com
Latest Information Security and Hacking Incidents - A cyberattack has compromised the prestigious game company Insomniac Games, exposing private data without authorization. Concerns over data security in the gaming business have been raised by this hack, which has spread throughout the community. ...
10 months ago Cysecurity.news
Lapsus$: GTA 6 hacker handed indefinite hospital order - An 18-year-old hacker who leaked clips of a forthcoming Grand Theft Auto game has been sentenced to an indefinite hospital order. Arion Kurtaj from Oxford, who is autistic, was a key member of international gang Lapsus$. The gang's attacks on tech ...
10 months ago Packetstormsecurity.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 month ago Aws.amazon.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)