What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
SecurityWeek.webp 2024-03-01 13:07:44 La violation des données Golden Corral a un impact sur 180 000 employés
Golden Corral Data Breach Impacts 180,000 Employees
(lien direct)
> La chaîne de restaurants Golden Corral dit que les informations personnelles ont été compromises dans une violation de données d'août 2023.
>Restaurant chain Golden Corral says personal information was compromised in an August 2023 data breach.
Data Breach ★★
Blog.webp 2024-03-01 01:25:28 Cutout.Pro AI Tool Data Breach: Hacker Faking 20 millions d'informations utilisateur
CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info
(lien direct)
> Par waqas Dans une déclaration exclusive à HackRead.com, Cutout.pro a nié la violation et étiqueté la fuite comme une arnaque claire. \\ ' Ceci est un article de HackRead.com Lire le post original: Cutout.Pro Ai Tool Data Breach: Hacker Faking 20 millions d'informations utilisateur
>By Waqas In an exclusive statement to Hackread.com, CutOut.Pro denied the breach and labeled the leak as a \'clear scam.\' This is a post from HackRead.com Read the original post: CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info
Data Breach Tool ★★
bleepingcomputer.webp 2024-02-29 17:14:17 La violation des données de la chaîne de restaurants Golden Corral a un impact sur 183 000 personnes
Golden Corral restaurant chain data breach impacts 183,000 people
(lien direct)
La chaîne de restaurants Golden Corral American a révélé une violation de données après que les attaquants derrière une cyberattaque d'août ont volé les informations personnelles de plus de 180 000 personnes.[...]
The Golden Corral American restaurant chain disclosed a data breach after attackers behind an August cyberattack stole the personal information of over 180,000 people. [...]
Data Breach ★★★
RecordedFuture.webp 2024-02-29 15:48:53 Le cabinet d'avocats rapporte une violation des données affectant plus de 325 000 personnes
Law firm reports data breach affecting more than 325,000 people
(lien direct)
Houser LLP, un cabinet d'avocats américain spécialisé dans le service des institutions financières de haut niveau, a déclaré qu'une violation du système découverte en mai 2023 a révélé les données personnelles - incluant éventuellement des informations sensibles telles que les numéros de carte de crédit - de plus de 325 000 personnes.Dans un dossier de réglementation Publié mercredi par MaineLe procureur général de \\, la société a déclaré certain
Houser LLP, a U.S. law firm that specializes in serving high-profile financial institutions, said a system breach discovered in May 2023 exposed the personal data - possibly including sensitive information such as credit card numbers - of more than 325,000 people. In a regulatory filing posted Wednesday by Maine\'s attorney general, the company said certain
Data Breach ★★★
bleepingcomputer.webp 2024-02-29 10:56:19 20 millions de coupures.
20 million Cutout.Pro user records leaked on data breach forum
(lien direct)
AI Service Cutout.Pro a subi une violation de données exposant les informations personnelles de 20 millions de membres, y compris des adresses e-mail, des mots de passe hachés et salés, des adresses IP et des noms.[...]
AI service Cutout.Pro has suffered a data breach exposing the personal information of 20 million members, including email addresses, hashed and salted passwords, IP addresses, and names. [...]
Data Breach ★★
DarkReading.webp 2024-02-27 22:04:42 U-Haul rapporte que 67K clients touchés par la violation de données
U-Haul Reports 67K Customers Impacted by Data Breach
(lien direct)
Dans la lettre d'avis envoyée aux personnes touchées, U-Haul note que les informations sur la carte de crédit n'ont pas été accessibles dans la violation.
In the notice letter sent out to affected individuals, U-Haul notes that credit card information was not accessed in the breach.
Data Breach ★★
SecurityWeek.webp 2024-02-27 12:07:10 67 000 clients U-Haul touchés par la violation de données
67,000 U-Haul Customers Impacted by Data Breach
(lien direct)
> U-Haul indique que les informations du client ont été compromises dans une violation de données impliquant un système de suivi de réservation.
>U-Haul says customer information was compromised in a data breach involving a reservation tracking system.
Data Breach ★★★
Blog.webp 2024-02-26 22:53:46 L'attaque des ransomwares LOANDEPOT entraîne une violation de données;17 millions touchés
LoanDepot Ransomware Attack Leads to Data Breach; 17 Million Impacted
(lien direct)
> Par waqas LOANDEPOT a identifié l'attaque des ransomwares le 4 janvier 2024 Ceci est un article de HackRead.com Lire le post original: L'attaque des ransomwares LOANDEPOT entraîne une violation de données;17 millions touchés
>By Waqas LoanDepot identified the ransomware attack on January 4, 2024 This is a post from HackRead.com Read the original post: LoanDepot Ransomware Attack Leads to Data Breach; 17 Million Impacted
Ransomware Data Breach
InfoSecurityMag.webp 2024-02-26 09:30:00 U-Haul informe les clients d'une violation de données majeure
U-Haul Informs Customers of Major Data Breach
(lien direct)
Le géant en mouvement U-Haul a révélé que 67 000 clients avaient été pris dans une violation de données l'année dernière
Moving giant U-Haul has revealed that 67,000 customers were caught in a data breach last year
Data Breach ★★
ProofPoint.webp 2024-02-26 05:03:36 Les tenants et aboutissants de la confidentialité des données, partie 2: confidentialité par conception en protection de l'information
The Ins and Outs of Data Privacy, Part 2: Privacy by Design in Information Protection
(lien direct)
This is the second blog in a two-part series about data privacy. In our previous post, we discussed how data privacy has become increasingly important. And we covered why data loss protection (DLP) and insider threat management (ITM) tools are critical to ensuring data privacy.   The shift to “work from anywhere” and the increase in cloud adoption have caused a rise in data loss and insider threats. To defend data from careless, malicious and compromised insiders-and the harm that they cause-security teams must implement data security tools like data loss prevention (DLP) and insider threat management (ITM) platforms. These tools monitor and control how employees interact with data. At the same time, companies are collecting more and more data about employees themselves, like protected health information (PHI).   The abundance of all this data-which is being collected and processed in the cloud-creates a critical challenge for security teams. They must protect employee privacy without impeding productivity. In this post, we\'ll explore the topic of privacy by design, which aims to strike a balance between these two challenges. We\'ll cover why it\'s so important. And we\'ll discuss how Proofpoint Information Protection can help you build a modern DLP program and comply with data privacy laws.  Why privacy by design matters for DLP and ITM  Privacy by design is a framework that embeds privacy into the design of IT systems, infrastructure and business processes. Privacy is not an afterthought. It is considered right from the start-in the initial design phase. What\'s more, it\'s a core component that integrates visibility, transparency and user-centricity into its design. In short, privacy by design ensures that everything is built with the user in mind.   Privacy by design is important to DLP and ITM because it helps to:   Protect employee rights. Personal data is sacred. Employees expect their personal data to be safe and their rights protected. When a company takes a proactive, transparent approach to data privacy, it helps maintain trust with employees.   Comply with privacy laws. Data privacy laws protect people by requiring businesses to keep their data safe and avoid sharing it unethically with third parties. These laws often require companies to tell users exactly how their data is used and collected, and to notify them in the event of a data breach. Failure to comply can lead to hefty fines and penalties, which can damage a firm\'s finances and brand image.   Prevent bias in investigations. When user data is kept secure and private, it ensures insider threat investigations maintain their integrity and objectivity. If a user is identified, it could influence a security analyst\'s response to an incident. User privacy helps take emotion and subjectivity out of the picture.  Ensure data privacy with Proofpoint DLP and ITM  Proofpoint Information Protection includes administration and access controls. These controls can help your business keep data private and meet compliance requirements.   Data residency and storage    Proofpoint uses regional data centers in the U.S., Europe, Australia and Japan to meet data privacy and data residency requirements. You can control exactly where your data is stored at all of these data centers. For example, you can group your endpoints and map each group to a regional data center. This ensures that data on all those endpoints are stored in that regional center. So, a U.S. realm can manage U.S. endpoint data, which is sent to the U.S. data center.  Attribute-based access controls  Attribute-based access controls give you a flexible and easy way to manage access to data. You can use these controls to ensure that security analysts have visibility into data on a need-to-know basis only.   For instance, you can write granular policies and assign access so that a U.S.-based security analyst can only see U.S. data. They cannot see data in Europe or the Asia-Pacific region. And when an analyst needs to access a specific user\'s data for an Data Breach Tool Threat Cloud ★★
RecordedFuture.webp 2024-02-23 16:27:44 U-Haul dit que 67 000 clients touchés dans la violation du système d'enregistrement
U-Haul says 67,000 customers affected in records system breach
(lien direct)
La société de location de camions et de remorques U-Haul a déclaré vendredi que certains clients aux États-Unis et au Canada étaient touchés par une violation de données en décembre.Une «partie non autorisée» a utilisé des «informations d'identification légitimes» pour accéder à un système que les concessionnaires U-Haul utilisent pour suivre les réservations et afficher les enregistrements des clients, a déclaré la société dans Du dépôt réglementaire avec le
Truck and trailer rental company U-Haul said on Friday that some customers in the U.S. and Canada were affected by a data breach in December. An “unauthorized party” used “legitimate credentials” to access a system that U-Haul dealers use to track reservations and view customer records, the company said in a regulatory filing with the
Data Breach ★★★
knowbe4.webp 2024-02-23 14:02:40 La violation des données chez French Healthcare Payment Processor met 20 millions de titulaires de police en danger
Data Breach at French Healthcare Payment Processor Puts 20 Million Policyholders at Risk
(lien direct)

Data Breach at French Healthcare Payment Processor Puts 20 Million Policyholders at Risk
Data Breach ★★★
bleepingcomputer.webp 2024-02-23 13:56:54 Insomniac Games alerte les employés frappés par la violation des données de ransomware
Insomniac Games alerts employees hit by ransomware data breach
(lien direct)
La filiale de Sony Insomniac Games envoie des lettres de notification de violation de données aux employés dont les informations personnelles ont été volées et divulguées en ligne après une attaque de ransomware de Rhysida en novembre.[...]
Sony subsidiary Insomniac Games is sending data breach notification letters to employees whose personal information was stolen and leaked online following a Rhysida ransomware attack in November. [...]
Ransomware Data Breach ★★
SecurityWeek.webp 2024-02-23 11:37:07 230k individus touchés par la violation de données à la Tangerine australienne de télécommunications
230k Individuals Impacted by Data Breach at Australian Telco Tangerine
(lien direct)
> Tangerine Telecom dit que les attaquants ont volé les informations personnelles de 230 000 personnes dans une base de données client héritée.
>Tangerine Telecom says attackers stole the personal information of 230,000 individuals from a legacy customer database.
Data Breach ★★
SecurityWeek.webp 2024-02-22 16:45:08 La société de services de soins oculaires fait face à un procès sur la violation de données impactant 2,3 millions
Eye Care Services Firm Faces Lawsuit Over Data Breach Impacting 2.3 Million
(lien direct)
> La société de gestion des pratiques de soins oculaires American Vision Partners fait face à un procès sur la violation de données ayant un impact sur 2,3 millions de patients.
>Eye care practice management firm American Vision Partners faces lawsuit over data breach impacting 2.3 million patients.
Data Breach ★★
Blog.webp 2024-02-21 10:55:54 La base de données non garantie fuit 153 Go de données philippines d'étudiant et de famille
Unsecured Database Leaks 153 GB of Filipino Student and Family Data
(lien direct)
> Par deeba ahmed Informations personnelles de 200 000+ exposées dans la fuite de données du programme de programme de bon de chèques philippins. Ceci est un article de HackRead.com Lire la publication originale: Base de données non sécurisée fuit 153 Go de données philippines et de données familiales
>By Deeba Ahmed Personal Information of 200,000+ Exposed in Philippine School Voucher Program Portal Data Leak. This is a post from HackRead.com Read the original post: Unsecured Database Leaks 153 GB of Filipino Student and Family Data
Data Breach ★★★
Blog.webp 2024-02-18 19:46:22 Les pirates réclament une violation de données chez le géant du personnel Robert Half, vendent des données sensibles
Hackers Claim Data Breach at Staffing Giant Robert Half, Sell Sensitive Data
(lien direct)
> Par waqas deja vu à Robert Half?Les pirates notoires revendiquent la responsabilité car le géant du personnel fait les gros titres pour une autre violation de données présumée en deux ans. Ceci est un article de HackRead.com Lire le post original: Les pirates réclament une violation de données chez le géant de la dotation Robert Half, vendent des données sensibles
>By Waqas Deja vu at Robert Half? Notorious hackers claim responsibility as the staffing giant makes headlines for yet another alleged data breach in two years. This is a post from HackRead.com Read the original post: Hackers Claim Data Breach at Staffing Giant Robert Half, Sell Sensitive Data
Data Breach ★★
DarkReading.webp 2024-02-16 21:00:00 Les entreprises s'inquièteront les utilisateurs finaux de la prochaine violation majeure
Enterprises Worry End Users Will be the Cause of Next Major Breach
(lien direct)
Les répondants dans Dark Reading \'s Strategic Security Survey estiment que la principale cause de la prochaine violation de données majeure de leur organisation impliquerait l'ingénierie sociale, les utilisateurs négligents et les travailleurs à distance peu sûrs.
Respondents in Dark Reading\'s Strategic Security Survey believe that the primary cause of their organization\'s next major data breach would involve social engineering, negligent users, and insecure remote workers.
Data Breach ★★★
ProofPoint.webp 2024-02-16 06:00:45 Les tenants et aboutissants de la confidentialité des données, partie 1: la complexité importante et croissante d'assurer la confidentialité des données
The Ins and Outs of Data Privacy, Part 1: The Importance-and Growing Complexity-of Ensuring Data Privacy
(lien direct)
This blog is the first in a series where we explore data privacy. In these two blogs, we\'ll cover why data privacy is increasingly important as well as some tips for keeping data safe. We\'ll also discuss how data loss protection (DLP) and insider threat management tools (ITM) are critical to ensuring data privacy.  Data Privacy Week in January 2024 highlighted the increasing importance and challenges of data privacy. Trends like digital transformation, remote work and the proliferation of cloud applications have made the task of protecting sensitive data harder than ever. As the volume and perceived value of data grows, so does the risk of data loss and theft, including by insiders.  Despite these challenges, businesses can\'t afford missteps when it comes to keeping sensitive data safe. Companies everywhere are under pressure to meet strict data privacy laws that promote data security and data privacy. Noncompliance can be costly. Hefty fines and market loss are common.  Research from our 2023 Voice of the CISO report underscores the risk. One-third of the CISOs who told us that their company suffered a material loss of sensitive data within the past 12 months also reported their business was hit with regulatory sanctions as a result.  In this blog post, we take a closer look at data privacy and how it relates to data security. We also discuss how laws around data privacy are evolving. And we cover how data loss prevention (DLP) and insider threat management (ITM) tools can help you stay on top of your data compliance challenges.  What is data privacy?  Data privacy is about protecting sensitive data that belongs to individuals or entities. This includes personally identifiable information (PII), which can be used to identify an individual or a corporate customer. Examples of PII include names, addresses, Social Security or tax ID numbers, credit card data and dates of birth.  A business that stores or manages this type of information must follow data privacy laws. These laws ensure that data is kept confidential and secure and that it is only used for authorized purposes. They are intended to help a business:  Protect personal information  Safeguard critical business data   Preserve users\' autonomy  Maintain trust with customers and employees  Data privacy is also about trust. The misuse or theft of sensitive data can lead to email fraud, insurance fraud, identity theft and more. So, customers need to trust that the companies they share their private data with will guard it carefully.  An evolving regulatory landscape   Data privacy laws are designed to compel businesses to keep sensitive data safe. Data compliance mandates often require businesses to tell users exactly how their data is used and collected. They may also require companies to notify users when a data breach happens. As noted earlier, not following these laws can result in stiff penalties.  Multiple data privacy laws around the globe govern regulations based on their type, the user\'s location and other criteria. Some examples include the:  GDPR in the European Union  CCPA in the U.S.  HIPAA in the U.S.  LGPD in Brazil  Several state governments in the United States are stepping up efforts to enact data privacy laws. California, Colorado, Connecticut, Utah and Virginia enacted comprehensive consumer privacy laws before 2023. Those laws became enforceable last year. In 2023, these states enacted privacy laws:  Delaware  Florida  Indiana  Iowa  Montana  Oregon  Tennessee  Texas  As data privacy laws emerge or evolve, the definition of sensitive data may change. For example, GDPR expanded the definition of PII to include data elements like email and IP addresses. That is why it is so important for companies to stay attuned to this ever-changing landscape.  The rise of generative AI sites has also sparked new concerns about data privacy. New laws are likely to be developed soon. The Biden Administration\'s new executive order will also have an impact on data use in the year ahead.  Why Data Breach Malware Tool Threat Cloud ★★
SecurityWeek.webp 2024-02-14 14:22:55 Prudential financier révèle la violation des données
Prudential Financial Discloses Data Breach
(lien direct)
> Prudential Financial dit que les données administratives et utilisateurs ont été compromises dans une cyberattaque plus tôt ce mois-ci.
>Prudential Financial says administrative and user data was compromised in a cyberattack earlier this month.
Data Breach ★★★
Blog.webp 2024-02-14 00:23:51 La violation des données Infosys a un impact sur 57 000 clients de la Bank of America
Infosys Data Breach Impacts 57,000 Bank of America Customers
(lien direct)
> Par waqas Les clients de Bank of America participant à des plans d'indemnisation différés sont les principales victimes de cette violation de données. Ceci est un article de HackRead.com Lire le post original: La violation des données Infosys a un impact sur 57 000 clients de Bank of America
>By Waqas Bank of America customers participating in deferred compensation plans are the main victims of this data breach. This is a post from HackRead.com Read the original post: Infosys Data Breach Impacts 57,000 Bank of America Customers
Data Breach ★★
CS.webp 2024-02-13 22:08:32 DOD en informer les personnes qui peuvent être touchées par une violation de données vieille d'un an
DOD notifying people who may be impacted by a year-old data breach
(lien direct)
> Par waqas Les clients de Bank of America participant à des plans d'indemnisation différés sont les principales victimes de cette violation de données. Ceci est un article de HackRead.com Lire le post original: La violation des données Infosys a un impact sur 57 000 clients de Bank of America
>By Waqas Bank of America customers participating in deferred compensation plans are the main victims of this data breach. This is a post from HackRead.com Read the original post: Infosys Data Breach Impacts 57,000 Bank of America Customers
Data Breach ★★★
TechWorm.webp 2024-02-13 21:14:57 Bank of America admet la violation de données, le vendeur a piraté
Bank Of America Admits Data Breach, Vendor Hacked
(lien direct)
Bank of America Corporation (BOFA), la deuxième plus grande institution bancaire aux États-Unis, avertit les clients d'une éventuelle violation de données qui pourrait avoir exposé des informations personnelles sensibles des clients participant à un plan de rémunération différé. L'avis de violation de données déposé par le BOFA auprès du procureur général du Texas révèle que l'information personnellement identifiable du client (PII) exposée dans la rupture de sécurité comprend les noms de clients, les adresses, les numéros de sécurité sociale, les dates de naissance,et des informations financières, y compris les numéros de compte et de carte de crédit. Apparemment, la violation des données a eu lieu le 3 novembre 2023 à Infosys McCamish Systems LLC («Infosys» ou «IMS»), qui est le vendeur de Bank of America \\. Dans un Dépôt récent Auprès du procureur général du Maine, IMS a révélé que 57 028 clients avaient leurs données exposées dans l'incident.Pendant la cyberattaque, un parti non autorisé a pu accéder aux parties du réseau informatique d'IMS \\. En apprenant la violation de la cybersécurité, IMS a mené une enquête avec l'aide de spécialistes de la criminalistique tiers.Il a informé Bank of America le 24 novembre 2023, que les données relatives à certains plans de rémunération différée desservis par la Banque peuvent avoir été affectés.Cependant, à aucun moment, le réseau interne de Bank of America \\ n'était compromis pendant la violation. Le 1er février 2024, Infosys a envoyé des lettres de violation de données à toute personne affectée par le récent incident de sécurité des données, énumérant quelles informations qui leur appartenaient ont été compromises. De même, Bank of America a également envoyé des lettres de violation de données aux consommateurs touchés le 6 février 2024, en les informant de la violation de la sécurité. Bien qu'il ne soit pas au courant de toute utilisation abusive impliquant des informations sur les clients, Bank of America propose gratuitement un abonnement gratuit de deux ans au programme de protection contre le vol d'identité Experian \\, qui comprend la surveillance du crédit, le vol d'identitéServices d'assurance et de résolution de fraude, pour compenser l'incident. En plus de cela, il est également conseillé aux clients de modifier les mots de passe et les épingles en ligne, de surveiller leurs comptes pour toute activité suspecte, de signaler immédiatement toute transaction non autorisée et de mettre également un gel ou une alerte de fraude sur leurs rapports de crédit. Bank of America Vs.Lockbit Le 4 novembre 2023, le Gang Lockbit de Ransomware aurait pris le crédit de l'attaque IMS, affirmant que ses opérateurs ont crypté plus de 2 000 systèmes pendant la violation. L'opération Ransomware-as-a-Service (RAAS) de Lockbit a été révélée en septembre 2019 et a depuis attaqué de nombreuses institutions renommées, notamment le Royal Mail, l'Italian Internal Revenue Service, la principale société de voitures continentales et la société et la sociétéVille d'Oakland.
Bank of America Corporation (BofA), the second-largest banking institution in the U.S., is warning customers of a possible data breach that may have exposed sensitive personal information of customers participating in a deferred compensation plan. The notice of data breach filed by BofA with the Attorney General of Texas reveals that the customer’s personally identifiable information (PII) exposed in the security breach includes customer names, addresses, Social Security numbers, dates of birth, and financial information, including account and credit card numbers. Apparen
Ransomware Data Breach ★★
InfoSecurityMag.webp 2024-02-13 17:35:00 Southern Water informe les clients et les employés de violation de données
Southern Water Notifies Customers and Employees of Data Breach
(lien direct)
La société britannique des services publics Southern Water a informé 5 à 10% de sa clientèle que leurs données personnelles ont été accessibles à la suite d'une attaque de ransomware en janvier
UK utilities firm Southern Water has informed 5-10% of its customer base that their personal data has been accessed following a ransomware attack in January
Ransomware Data Breach ★★
InfoSecurityMag.webp 2024-02-13 17:00:00 Clients de Bank of America à risque après violation de données
Bank of America Customers at Risk After Data Breach
(lien direct)
Une lettre de notification envoyée au procureur général du Maine a montré que 57 028 personnes avaient été touchées
A notification letter sent to the Attorney General of Maine showed 57,028 individuals were impacted
Data Breach ★★
globalsecuritymag.webp 2024-02-13 16:18:35 Statistiques mondiales de violation de données: 2023 Récapitulatif
Global data breach statistics: 2023 recap
(lien direct)
Statistiques globales de violation de données: 2023 Récapitulatif - mise à jour malveillant
Global data breach statistics: 2023 recap - Malware Update
Data Breach Studies ★★★★
bleepingcomputer.webp 2024-02-13 14:28:02 Integris Health dit que la violation des données a un impact sur 2,4 millions de patients
Integris Health says data breach impacts 2.4 million patients
(lien direct)
Integris Health a rapporté aux autorités américaines que la violation de données qu'elle avait subie en novembre dernier a exposé des informations personnelles appartenant à près de 2,4 millions de personnes.[...]
Integris Health has reported to U.S. authorities that the data breach it suffered last November exposed personal information belonging to almost 2.4 million people. [...]
Data Breach ★★
SecurityWeek.webp 2024-02-13 13:58:40 Données clients de Bank of America Volées en violation de données
Bank of America Customer Data Stolen in Data Breach
(lien direct)
> Bank of America informe certains clients que leurs informations personnelles ont été volées dans une violation de données chez un fournisseur de services tiers.
>Bank of America is notifying some customers that their personal information was stolen in a data breach at third-party services provider.
Data Breach ★★
News.webp 2024-02-13 05:28:14 Filiale d'Infosys nommée fuite de données Source of Bank of America
Infosys subsidiary named as source of Bank of America data leak
(lien direct)
On dirait que Lockbit a fait un coup sur une demande d'assurance-vie externalisée Le géant des services techniques indiens Infosys a été nommé comme source d'une fuite de données subie par la Bank of America.…
Looks like LockBit took a swipe at an outsourced life insurance application Indian tech services giant Infosys has been named as the source of a data leak suffered by the Bank of America.…
Data Breach ★★
bleepingcomputer.webp 2024-02-12 18:32:03 Bank of America avertit les clients de la violation des données après le piratage du fournisseur
Bank of America warns customers of data breach after vendor hack
(lien direct)
Bank of America avertit les clients d'une violation de données exposant leurs informations personnelles après que l'un de ses fournisseurs de services a été piraté l'année dernière.[...]
Bank of America is warning customers of a data breach exposing their personal information after one of its service providers was hacked last year. [...]
Data Breach Hack ★★
bleepingcomputer.webp 2024-02-12 16:50:51 La FCC ordonne aux transporteurs de télécommunications de signaler les violations de données PII dans les 30 jours
FCC orders telecom carriers to report PII data breaches within 30 days
(lien direct)
À partir du 13 mars, les sociétés de télécommunications doivent signaler les violations de données ayant un impact sur les clients \\ 'des informations personnellement identifiables dans les 30 jours, comme l'exige les exigences de rapports de violation de données mises à jour de FCC \\.[...]
Starting March 13th, telecommunications companies must report data breaches impacting customers\' personally identifiable information within 30 days, as required by FCC\'s updated data breach reporting requirements. [...]
Data Breach Legislation ★★★★
MitnickSecurity.webp 2024-02-12 14:57:54 Combien de temps faudra-t-il pour récupérer une violation de données?
How Long Will It Take To Recoup From a Data Breach?
(lien direct)
Data Breach ★★★
ProofPoint.webp 2024-02-12 08:02:39 4 étapes pour empêcher le compromis des e-mails des fournisseurs dans votre chaîne d'approvisionnement
4 Steps to Prevent Vendor Email Compromise in Your Supply Chain
(lien direct)
Supply chains have become a focal point for cyberattacks in a world where business ecosystems are increasingly connected. Email threats are a significant risk factor, as threat actors are keen to use compromised email accounts to their advantage. Every month, a staggering 80% of Proofpoint customers face attacks that originate from compromised vendor, third-party or supplier email accounts.  Known as supplier account compromise, or vendor email compromise, these attacks involve threat actors infiltrating business communications between trusted partners so that they can launch internal and external attacks. Their ultimate goal might be to steal money, steal data, distribute malware or simply cause havoc.  In this blog post, we\'ll explain how vendor emails are compromised and how you can stop these attacks.  Finally, we\'ll tell you how Proofpoint can help.   What\'s at stake   Supply chain compromise attacks can be costly for businesses. IBM, in its latest Cost of a Data Breach Report, says that the average total cost of a cyberattack that involves supply chain compromise is $4.76 million. That is almost 12% higher than the cost of an incident that doesn\'t involve the supply chain.   In addition to the financial implications, compromised accounts can lead to:   Phishing scams that result in even more compromised accounts  Reputational and brand damage  Complex legal liabilities between business partners   How does vendor email compromise occur?  Supply chain compromise attacks are highly targeted. They can stretch out over several months. And typically, they are structured as a multistep process.   The bad actor initiates the assault by gaining access to the email account of a vendor or supplier through various means. Phishing attacks are one example. Once the attacker gains access, they will lay low for an extended period to observe the vendor\'s email communications. During this time, the adversary will study the language and context of messages so that they can blend in well and avoid detection.   Attackers might also use this observation period to establish persistence. They will create mail rules and infrastructure so that they can continue to receive and send messages even after the vendor has regained control of the account.  Once they establish access and persistence, the attackers will begin to insert themselves into conversations within the supplier\'s company as well as with external partners and customers. By posing as the sender, the attacker takes advantage of established trust between parties to increase their chances of success.   Overview of a vendor email compromise attack.  Proofpoint has observed a growing trend of attackers targeting accounts within smaller businesses and using them to gain entry into larger companies. Threat actors often assume that small businesses have less protection than large companies. They see them as targets that can help them achieve a bigger payday.   How to stop vendor email compromise  If you want to defend against these attacks, it\'s critical to understand the methods behind them. Such a formidable problem requires a strategic and multilayered solution. The four broad steps below can help.  Step 1: Know your suppliers  Your first line of defense against these email attacks sounds simple, but it\'s challenging. It is the ability to intimately “know your supplier” and understand their security strategy. This requires more than a one-time vendor assessment. Your security teams will need to prioritize continuous monitoring of your company\'s business partnerships.   On top of that knowledge, you need a thorough understanding of the access and privileges that your business grants to each vendor. Compromised accounts that have uncontrolled access may be able to exfiltrate sensitive data or upload malware like ransomware. So, when you know what your suppliers can (and can\'t) access, you can identify a data breach faster.  Other steps, like requiring multifactor authentication (MFA) for vendor accounts, can Ransomware Data Breach Malware Tool Threat Studies Prediction Cloud ★★★
Blog.webp 2024-02-12 06:49:31 Les pirates divulguent une prétendue base de données partielle du marché Facebook
Hackers Leak Alleged Partial Facebook Marketplace Database
(lien direct)
> Par waqas La violation présumée de données a eu lieu en octobre 2023. Cependant, la base de données n'a été rendue publique que plus tôt dans la journée, le dimanche 11 février 2024. Ceci est un article de HackRead.com Lire le post original: hackers fuit les piratesBase de données partielle du marché Facebook présumé
>By Waqas The alleged data breach took place on October 2023. However, the database was only made public earlier today, on Sunday, February 11, 2024. This is a post from HackRead.com Read the original post: Hackers Leak Alleged Partial Facebook Marketplace Database
Data Breach ★★
mcafee.webp 2024-02-09 22:49:02 La France est frappée par sa plus grande violation de données jamais - ce que vous devez savoir
France Gets Hit with Its Largest Data Breach Ever - What You Need to Know
(lien direct)
> Deux violations massives de données en France ont eu un impact sur environ la moitié de la population de la nation.Les données d'environ 33 millions ...
> Two massive data breaches in France have impacted roughly half the nation\'s population. The data of an estimated 33 million...
Data Breach Data Breach Threat ★★★
RecordedFuture.webp 2024-02-09 13:02:49 La violation des données sur l'assurance maladie affecte près de la moitié de la population de la France, le régulateur de la vie privée avertit
Health insurance data breach affects nearly half of France\\'s population, privacy regulator warns
(lien direct)
Les données sur plus de 33 millions de personnes en France, environ la moitié de la population, ont été compromises dans une cyberattaque fin janvier, selon le chien de garde du pays de la vie privée du pays.La commission nationale informatique et libert & eacute; s (cnil) annoncé Cette semaine, il avait été informé par deux compagnies d'assurance maladie, Viamedis et Elmer \\, sur l'incident.Il
Data on more than 33 million people in France, approximately half the population, was compromised in a cyberattack at the end of January, according to the country\'s privacy watchdog. The Commission Nationale Informatique et Libertés (CNIL) announced this week it had been informed by two health insurance companies, Viamedis and Elmer\'s, about the incident. It
Data Breach ★★★
InfoSecurityMag.webp 2024-02-08 14:30:00 France: 33 millions de numéros de sécurité sociale exposés dans le piratage d'assurance maladie
France: 33 Million Social Security Numbers Exposed in Health Insurance Hack
(lien direct)
Le régulateur français de la vie privée des données a ouvert une enquête à la suite d'une violation de données affectant deux grandes sociétés d'assurance maladie
The French data privacy regulator has opened an investigation following a data breach affecting two major health insurance firms
Data Breach Hack ★★★
Blog.webp 2024-02-07 22:52:11 La violation des données affecte 66 000 dans des attaques d'échange de sim
Data Breach Affects 66,000 in SIM-Swapping Attacks on US Insurance Giants
(lien direct)
> Par waqas La violation de données cible les géants de l'assurance Washington National Insurance Company and Bankers Life and Casualty Company. Ceci est un article de HackRead.com Lire le post original: La violation des données affecte 66 000 dans des attaques d'échange de sim sur les géants de l'assurance américains
>By Waqas The data breach targeted insurance giants Washington National Insurance Company and Bankers Life and Casualty Company. This is a post from HackRead.com Read the original post: Data Breach Affects 66,000 in SIM-Swapping Attacks on US Insurance Giants
Data Breach ★★
SecurityWeek.webp 2024-02-07 12:48:03 Verizon révèle la violation des données internes impactant 63 000 employés
Verizon Discloses Internal Data Breach Impacting 63,000 Employees
(lien direct)
> Verizon informe 63 000 employés que leurs informations personnelles ont été exposées dans une violation de données interne.
>Verizon is informing 63,000 employees that their personal information was exposed in an internal data breach.
Data Breach ★★
itsecurityguru.webp 2024-02-07 10:33:37 Centripète et la plate-forme 94 unissent leurs forces pour apporter la défense de la cybersécurité aux entreprises irlandaises
Centripetal and Platform 94 Join Forces to Bring Cybersecurity Defence to Irish Companies
(lien direct)
Près d'une entreprise irlandaise sur cinq a connu une violation importante de cyberattaque ou de données en 2022, selon des recherches de Aon.Il n'est pas étonnant que les entreprises irlandaises soient préoccupées par la cybersécurité, avec des menaces en constante évolution et des vecteurs d'attaque nouveaux et nouveaux (par exemple, des nouvelles récentes suggèrent que la moitié des gestionnaires irlandais & # 8216; ne comprend pas pleinement & # 8217;Ai [& # 8230;] le post Centripetal et la plate-forme 94 unissent leurs forces pour apporter la défense de la cybersécurité aux sociétés irlandaises p>
Almost one in five Irish firms experienced a significant cyber attack or data breach in 2022, according to research by Aon. It’s no wonder that Irish businesses are concerned about cybersecurity, with ever evolving threats and new and novel attack vectors (for example recent news suggests that half of Irish managers ‘don’t fully understand’ AI […] The post Centripetal and Platform 94 Join Forces to Bring Cybersecurity Defence to Irish Companies first appeared on IT Security Guru.
Data Breach ★★★
bleepingcomputer.webp 2024-02-06 13:36:18 La violation des données de la société française des services de santé en danger met des millions en danger
Data breach at French healthcare services firm puts millions at risk
(lien direct)
La société française des services de santé, Viamedis, a subi une cyberattaque qui a exposé les données des assurés et des professionnels de la santé du pays.[...]
French healthcare services firm Viamedis suffered a cyberattack that exposed the data of policyholders and healthcare professionals in the country. [...]
Data Breach ★★★
bleepingcomputer.webp 2024-02-06 11:02:05 Verizon Insider Data Breach frappe plus de 63 000 employés
Verizon insider data breach hits over 63,000 employees
(lien direct)
Verizon Communications avertit qu'une violation de données d'initiés a un impact sur près de la moitié de ses effectifs, exposant des informations sensibles aux employés.[...]
Verizon Communications is warning that an insider data breach impacts almost half its workforce, exposing sensitive employee information. [...]
Data Breach ★★★
MitnickSecurity.webp 2024-02-05 13:29:06 Nouveaux réglementations SEC concernant les violations de données
New SEC Regulations Regarding Data Breaches
(lien direct)
Data Breach Legislation ★★★
InfoSecurityMag.webp 2024-02-05 12:15:00 AnyDesk frappé par la cyberattaque et la violation des données des clients
AnyDesk Hit by Cyber-Attack and Customer Data Breach
(lien direct)
La cyberattaque qui a frappé le fournisseur d'outils distant pourrait avoir un impact plus significatif que prévu initialement
The cyber-attack that hit the remote tool provider could have a more significant impact than initially expected
Data Breach Hack Tool ★★
ProofPoint.webp 2024-02-05 11:41:18 7 conseils pour développer une approche proactive pour éviter le vol de données
7 Tips to Develop a Proactive Approach to Prevent Data Theft
(lien direct)
Data is one of the most valuable assets for a modern enterprise. So, of course, it is a target for theft. Data theft is the unauthorized acquisition, copying or exfiltration of sensitive information that is typically stored in a digital format. To get it, bad actors either abuse privileges they already have or use various other means to gain access to computer systems, networks or digital storage devices. The data can range from user credentials to personal financial records and intellectual property.   Companies of all sizes are targets of data theft. In September 2023, the personal data of 2,214 employees of the multinational confectionary firm The Hershey Company was stolen after a phishing attack. And in January 2024, the accounting firm of Framework Computer fell victim to an attack. A threat actor posed as the Framework\'s CEO and convinced the target to share a spreadsheet with the company\'s customer data.  Data thieves aim to profit financially, disrupt business activities or do both by stealing high-value information. The fallout from a data breach can be very costly for a business-and the cost is going up. IBM reports that the global average cost of a data breach in 2023 was $4.45 million, a 15% increase over three years. Other data suggests that the average cost of a breach is more than double for U.S. businesses-nearly $9.5 million.  Not all data breaches involve data theft, but stealing data is a top aim for many attackers. Even ransomware gangs have been shifting away from data encryption in their attacks, opting instead to steal massive amounts of data and use its value as a means to compel businesses to pay ransom.  So, what can businesses do to prevent data theft? Taking a proactive approach toward stopping someone from stealing your data is a must. This blog post can help jump-start your thinking about how to improve data security. We explore how data theft happens and describe some common threats that lead to it. We also outline seven strategies that can help reduce your company\'s risk of exposure to data theft and highlight how Proofpoint can bolster your defenses.   Understanding data theft-and who commits it  Data theft is a serious security and privacy breach. Data thieves typically aim to steal information like:  Personally identifiable information (PII)  Financial records  Intellectual property (IP)  Trade secrets  Login credentials  Once they have it, bad actors can use stolen data for fraudulent activities or, in the case of credential theft, to gain unlawful access to accounts or systems. They can also sell high-value data on the dark web.  The consequences of data theft for businesses can be significant, if not devastating. They include hefty compliance penalties, reputational damage, and financial and operational losses. Take the manufacturing industry as an example. According to one source, a staggering 478 companies in this industry have experienced a ransomware attack in the past five years. The costs in associated downtime are approximately $46.2 billion.  To prevent data theft, it\'s important to recognize that bad actors from the outside aren\'t the only threat. Insiders, like malicious employees, contractors and vendors, can also steal data from secured file servers, database servers, cloud applications and other sources. And if they have the right privileges, stealing that data can be a breeze.   An insider\'s goals for data theft may include fraud, the disclosure of trade secrets to a competitor for financial gain, or even corporate sabotage. As for how they can exfiltrate data, insiders can use various means, from removable media to personal email to physical printouts.  How does data theft happen?  Now, let\'s look at some common methods that attackers working from the outside might employ to breach a company\'s defenses and steal data.  Phishing. Cybercriminals use phishing to target users through email, text messages, phone calls and other forms of communication. The core objective of this approach is to trick users into doing what Ransomware Data Breach Malware Tool Vulnerability Threat Cloud ★★★
Veracode.webp 2024-02-05 10:45:38 Un guide de démarrage pour Veracode Dast Essentials
A Getting Started Guide to Veracode DAST Essentials
(lien direct)
La critique du rôle des tests de sécurité des applications dynamiques (DAST) Les applications Web sont l'un des vecteurs les plus courants pour les attaques, représentant plus de 40% des violations, selon le rapport de violation de données de Verizon \\.Les tests de sécurité des applications dynamiques (DAST) sont une technique cruciale utilisée par les équipes de développement et les professionnels de la sécurité pour sécuriser les applications Web dans le cycle de vie du développement logiciel. En fait, le rapport sur l'état de la sécurité des logiciels de Veracode \\ révèle que 80% des applications Web ont des vulnérabilités critiques qui ne peuvent être trouvées qu'avec une solution de test de sécurité des applications dynamiques.Mais les pratiques de développement de logiciels modernes hiérarchisent les délais serrés.La demande est des versions plus rapides sans introduire de vulnérabilités, ce qui rend difficile pour les équipes de hiérarchiser la sécurité.Les tests de sécurité doivent fonctionner et évoluer dans la fréquence de votre vitesse et de libération de DevOps. Début avec Veracode Dast Essentials Veracode Dast Essentials est une application dynamique…
The Critical of Role of Dynamic Application Security Testing (DAST) Web applications are one of the most common vectors for attacks, accounting for over 40% of breaches, according to Verizon\'s Data Breach Report. Dynamic application security testing (DAST) is a crucial technique used by development teams and security professionals to secure web applications in the software development lifecycle. In fact, Veracode\'s State of Software Security Report reveals that 80% of web applications have critical vulnerabilities that can only be found with a dynamic application security testing solution. But modern software development practices prioritize tight deadlines. The demand is for faster releases without introducing vulnerabilities, making it difficult for teams to prioritize security. Security testing needs to work and scale within your DevOps speed and release frequency.  Getting Started with Veracode DAST Essentials Veracode DAST Essentials is a dynamic application…
Data Breach Vulnerability ★★
SecurityWeek.webp 2024-02-02 14:50:09 La FTC commande Blackbaud pour aborder les mauvaises pratiques de sécurité
FTC Orders Blackbaud to Address Poor Security Practices
(lien direct)
> La société de logiciels FTC et de collecte de fonds Blackbaud atteint le règlement sur les mauvaises pratiques de sécurité qui ont conduit à une violation de données majeure.
>FTC and fundraising software company Blackbaud reach settlement over poor security practices that led to a major data breach.
Data Breach ★★★
zataz.webp 2024-02-02 09:22:56 Fuite de passeports pour les employés de Lush ? (lien direct) La marque de cosmétiques éthique Lush face à un piratage informatique. Le hacker malveillant annonce l'exfiltration de documents sensibles internes.... Data Breach Threat ★★★
BBC.webp 2024-02-01 23:21:22 Ancien pirate de la CIA condamné à 40 ans de prison
Former CIA hacker sentenced to 40 years in prison
(lien direct)
Joshua Schulte, 35 ans, a été condamné en 2022 pour la plus grande violation de données de l'histoire de la CIA.
Joshua Schulte, 35, was convicted in 2022 for the largest data breach in the history of the CIA.
Data Breach Legislation ★★★
bleepingcomputer.webp 2024-02-01 17:23:56 La FTC ordonne à Blackbaud pour augmenter la sécurité après une violation de données massive
FTC orders Blackbaud to boost security after massive data breach
(lien direct)
Blackbaud s'est installé avec la Federal Trade Commission après avoir été accusé de mauvaise sécurité et de pratiques imprudentes de conservation des données, ce qui a conduit à une attaque de ransomware de mai 2020 et à une violation de données affectant des millions de personnes.[...]
Blackbaud has settled with the Federal Trade Commission after being charged with poor security and reckless data retention practices, leading to a May 2020 ransomware attack and a data breach affecting millions of people. [...]
Ransomware Data Breach ★★
Last update at: 2024-05-09 21:08:19
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter