Western Sydney University discloses security breaches, data leak

Between the security incidents, the educational institute suffered another data breach in May 2023, which it discovered and disclosed it a year later, informing its community that hackers had accessed its Microsoft Office 365 environment, including email accounts and SharePoint files. Bill Toulas Bill Toulas is a tech writer and infosec news reporter with over a decade of experience working on various online publications, covering open-source, Linux, malware, data breach incidents, and hacks. Western Sydney University (WSU) announced two security incidents that exposed personal information belonging to members of its community. The second cybersecurity incident concerns a leak on the dark web of personal information belonging to members of the University’s community. “The University is very aware of the personal impact these incidents are having on its students, staff, and wider community,” Williams stated. It is unclear if the post published on the dark web in November 2024 contains information stolen during that incident, or if it concerns a separate case altogether. The investigation revealed that the hackers maintained access to WSU’s networks between July 9, 2023, and March 16, 2024, obtaining access to 580 terabytes of data. The university states that it took immediate action to block the attacker once it became aware of the breach, and investigations into the incident are ongoing. Although that hackers published the data on November 1, 2024, WSU only became aware of it this year on March 24. That incident was later estimated to have impacted 7,500 individuals, exposing names, contact details, dates of birth, health information, government ID numbers, and bank account information.

This Cyber News was published on www.bleepingcomputer.com. Publication date: Fri, 11 Apr 2025 16:30:26 +0000


Cyber News related to Western Sydney University discloses security breaches, data leak

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
6 months ago Aws.amazon.com
Critical insights into Australia's supply chain risk landscape - Australian organizations find themselves navigating a minefield of supply chain risks, with a surge in incidents stemming from multi-party breaches. These breaches are often caused by vulnerabilities in cloud or software providers and are emerging as ...
1 year ago Tripwire.com
Western Sydney University discloses security breaches, data leak - Between the security incidents, the educational institute suffered another data breach in May 2023, which it discovered and disclosed it a year later, informing its community that hackers had accessed its Microsoft Office 365 environment, including ...
1 day ago Bleepingcomputer.com
Switzerlands Biggest University Confirms Major Cybersecurity Breach - On Friday, the University of Zurich, Switzerland's largest university, reported that it had been the target of a serious cyberattack. This attack is part of a recent surge of hacks targeting German-speaking institutions. The university's website is ...
2 years ago Therecord.media
Irish university cancels all classes due to major IT security issue - On Monday, Munster Technological University in Ireland declared that its campuses in Cork would be shut down due to a major IT breach and telephone outage. All classes, both full-time and part-time, have been cancelled for Tuesday and Wednesday, ...
2 years ago Therecord.media
Tech Security Year in Review - In this Tech Security Year in Review for 2023, let's look into the top data breaches of the past year. Each factor contributes to the growing threatscape, demanding a proactive and adaptable cybersecurity approach to safeguard your organization ...
1 year ago Securityboulevard.com
Data Breaches in US Schools Exposed 37.6M Records - Since 2005, educational institutions in the United States have experienced 3713 data breaches, impacting over 37.6m records. According to new data by Comparitech, 2023 marked a record year, with 954 breaches recorded - a dramatic rise from 139 in ...
10 months ago Infosecurity-magazine.com
University of Michigan: Employee, student data stolen in cyberattack - The University of Michigan says in a statement today that hackers breaching its network in August accessed systems with information belonging to students, applicants, alumni, donors, employees, patients, and research study participants. Unauthorized ...
1 year ago Bleepingcomputer.com
CVE-2019-5303 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
1 year ago
CVE-2019-5302 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
1 year ago
Cyber Mayday and My Journey to Oz - Here's a story of how pandemic disappointments and travel problems led to new professional opportunities. The home to exotic animals, the rugged outback and fireworks over the Sydney Opera House as the world ushers in a new year. Then - you guessed ...
1 year ago Securityboulevard.com Cuba
Stanford University investigating cyberattack after ransomware claims - Stanford University is investigating a cybersecurity incident within its Department of Public Safety after a ransomware gang claimed it attacked the school on Friday. A spokesperson for the university directed Recorded Future News to a statement ...
1 year ago Therecord.media Akira
Data Loss Prevention for Business: Strategies and Tools - Data Loss Prevention has become crucial in today's data-driven business landscape to protect sensitive information. This discussion aims to provide valuable insights into DLP strategies and tools for business, helping mitigate data loss risks ...
1 year ago Securityzap.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
6 months ago Helpnetsecurity.com
Kansas State University cyberattack disrupts IT network and services - Kansas State University announced it is managing a cybersecurity incident that has disrupted certain network systems, including VPN, K-State Today emails, and video services on Canvas and Mediasite. Kansas State University is a public land-grant ...
1 year ago Bleepingcomputer.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
1 year ago Securityzap.com
FCC orders telecom carriers to report PII data breaches within 30 days - Starting March 13th, telecommunications companies must report data breaches impacting customers' personally identifiable information within 30 days, as required by FCC's updated data breach reporting requirements. FCC's final rule follows several ...
1 year ago Bleepingcomputer.com
Tor University Challenge: First Semester Report Card - In August of 2023 EFF announced the Tor University Challenge, a campaign to get more universities around the world to operate Tor relays. The primary goal of this campaign is to strengthen the Tor network by creating more high bandwidth and reliable ...
1 year ago Eff.org
Apple: 2.5B Records Exposed, Marking Staggering Surge in Data Breaches - An Apple-commissioned report this week has highlighted once again why analysts have long recommended the use of end-to-end encryption to protect sensitive data against theft and misuse. The report is based on an independent study of publicly reported ...
1 year ago Darkreading.com
Third-party breaches hit 90% of top global energy companies - A new report from SecurityScorecard reveals a startling trend among the world's top energy companies, with 90% suffering from data breaches through third parties over the last year. This sheds light on the need for these energy companies to adopt a ...
1 year ago Securityintelligence.com
Memorial University recovers from cyberattack, delays semester start - The Memorial University of Newfoundland continues to deal with the effects of a cyberattack that occurred in late December and postponed the start of classes in one campus. MUN is the largest public university in Atlantic Canada, with an academic and ...
1 year ago Bleepingcomputer.com Dragonforce
Multiple colleges, K-12 schools facing outages after cyberattacks - Several K-12 schools, colleges and universities are dealing with significant technology outages due to cyberattacks this week. A spokesperson for North Carolina Central University told Recorded Future News that the school was alerted to a cyberattack ...
1 year ago Therecord.media
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
1 year ago Helpnetsecurity.com
Online Learning Security Best Practices - The rapid increase in remote learning has raised security concerns surrounding online learning platforms. The security of online learning platforms involves implementing robust measures to protect against unauthorized access and data breaches. By ...
1 year ago Securityzap.com
How Data Fabric Architecture Helps Enhance Security Governance - Essentially, data fabric is an approach to managing and integrating data, aimed at enabling access to information across the enterprise in a versatile, iterable, and augmented way. The data fabric concept can translate into an architecture that ...
11 months ago Cybersecurity-insiders.com

Latest Cyber News


Cyber Trends (last 7 days)