Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»WSU Data Breach Impact Grows, Sensitive Information Exposed

    WSU Data Breach Impact Grows, Sensitive Information Exposed

    July 31, 2024

    In a follow-up to the May 2024 announcement regarding a Western Sydney University data breach of its Microsoft Office 365 environment, WSU has now confirmed that personal information stored in its Isilon storage platform was also subjected to unauthorized access. This platform holds ‘My Documents’ information, departmental shared folders, and some backup and archived data.

    In an official statement, the University noted, “We have been and will continue to analyze the very large and complex dataset to properly understand the impact the unauthorized access to Isilon has had on individuals’ personal information.”

    Western Sydney University Data Breach: Key Findings

    The University has confirmed the following details regarding the Western Sydney University data breach:

    Scope of Access: Evidence shows that approximately 580 terabytes of data across 83 out of 400 directories in Isilon were accessed.
    Timeline: Unauthorized access to Isilon occurred between 9 July 2023 and 16 March 2024.
    Data Compromised: The initial review has found that personally identifiable information (PII) was accessed, including names, contact details, dates of birth, health information, sensitive workplace conduct and health and safety matters, government identification documents, tax file numbers, superannuation details, and bank account information.
    Extent of WSU Data Breach: Based on the forensic investigation to date, there is no evidence that this incident extends beyond the University’s Microsoft Office 365 and Isilon environments.

    Current Situation

    The University has not received any threats to disclose private information or demands in exchange for maintaining privacy. Furthermore, dark web monitoring has revealed no evidence that the data has been uploaded. No further unauthorized access to Isilon has been detected since remediation efforts took place. The University continues to work with authorities to investigate the perpetrator of the Isilon incident.

    Since the initial discovery of unauthorized access to its IT network in January 2024, the University has been conducting forensic investigations to determine the full nature, scope, and scale of the incident.

    This public notification, issued on 31 July 2024, aims to inform the University community, including former and current students and staff, about the unauthorized access to the Isilon storage platform.

    University’s Response and Actions

    Western Sydney University has been proactive in addressing the breach. The University has engaged Australia’s leading digital forensics and incident response team, CyberCX, and relevant authorities, including:

    National Office of Cyber Security
    Office of the Australian Information Commissioner
    NSW Information and Privacy Commission (IPC)
    Australian Federal Police
    Australian Cyber Security Centre
    Australian Signals Directorate
    Home Affairs
    NSW Police Force’s Cybercrime Squad under Strike Force GIRRAKOOL

    To protect its community, the University secured an interim injunction from the NSW Supreme Court to prevent access, use, transmission, and publication of any data that was accessed without authorization.

    The University’s leadership and Board have implemented several measures to mitigate the issue and enhance protection, including:

    Completing a password reset
    Enhancing detection monitoring
    Implementing additional firewall protection
    Increasing the cyber security team capacity
    Reviewing data storage and retention practices

    On 31 July 2024, the University communicated directly with its community through emails to students, staff, and alumni, providing information on protective steps and available support services.

    Next Steps

    The University will continue to notify individuals about the impact on their personal information in the coming weeks. Due to the volume and complexity of the data, individual notifications may not be possible for all those affected.

    The public notification aims to keep the community vigilant for any signs that their data may have been accessed. The University has engaged IDCARE, Australia’s national identity and cyber support service, to offer free advice and support to those concerned about protecting themselves from identity theft.

    For more information on protecting personal information, visit IDCARE or call 1800 595 160, quoting reference number WESSYDPB24. An online Get Help form is also available.

    The University has established a dedicated phone line for additional support and inquiries: 02 9174 6942 (Monday to Friday, 9.00am to 4.30pm AEST).

    Western Sydney University remains committed to rectifying this matter transparently and keeping the community informed as the investigation progresses. The University unreservedly apologizes for the incident and its impact on the community.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCybersecurity Startup Secures $3 Million in Pre-Series A Funding, Valued Over $100 Million
    Next Article Microsoft Services Hit by Cyberattack, Amplifying Outage Impact Across Multiple Platforms

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-40906 – MongoDB BSON Serialization BSON::XS Multiple Vulnerabilities

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2025-4454 – D-Link DIR-619L Wake_on_Lan Command Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4127 – “WP SEO Structured Data Schema Stored Cross-Site Scripting Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    Secure Ways to Access DeepSeek( Third-Party Apps)

    Development

    Assassin’s Creed remakes are officially on the way — but which games are being rebuilt?

    Development

    Highlights

    News & Updates

    Bungie vaulting Destiny 2 content backfires with the latest Red War lawsuit court ruling

    May 5, 2025

    As a direct result of Bungie vaulting older Destiny 2 content releases, a copyright infringement…

    Best SNES Emulator: 5 Feature-Rich Options

    June 13, 2024

    Game Off 2024 theme announcement

    November 1, 2024

    AMD SEV-SNP Vulnerability Allows Malicious Microcode Injection with Admin Access

    February 4, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.