What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2021-05-07 14:00:00 3 Ways to Reduce the Cost of a Government Data Breach (lien direct) As a government agency or jurisdiction, one of your goals is to build trust with the citizens you serve. You earn that trust by protecting their information from a government data breach. This also helps by making efficient use of taxpayer dollars. When a data breach does hit, both pillars are eroded. Your organization can […] Data Breach
InfoSecurityMag.webp 2021-05-06 16:05:00 CaptureRx Data Breach Impacts Healthcare Providers (lien direct) US healthcare providers affected by cyber-attack on third-party administrative services vendor Data Breach
AlienVault.webp 2021-05-06 10:00:00 Password security tips and best practices for enterprises (lien direct) In honor of World Password Day, we’re doing our part to help keep your business secure by discussing the good, the bad, the ugly and the critical about passwords. Let’s face it: between all the logins we need for work and all the accounts we use in our personal lives, there are too many passwords to remember. So many of us do what seems natural—use the same password for multiple accounts. After all, especially with corporate password policies, most employees use strong passwords with a mix of numbers, lowercase and uppercase letters, and special characters. Still, what about all those sticky notes we have “secretly” hidden in locations probably not far away from our devices? That security risk is only the tip of the iceberg. Because according to a 2019 Lastpass survey, US employees working in mid-sized corporate businesses must manage approximately 75 passwords for work. Unsurprisingly, employees recycle passwords 13 times on average. In other words, employees are using the same passwords over and over. And in many cases, especially for corporate applications and resources that lack strong password requirements, some passwords just aren’t strong enough. Cybercriminals know this, and it’s why breaches happen. If hackers get access to your trusted data, the ramifications can be dire. The costs of a data breach go well beyond financial, and include damage to your company’s brand, trust and reputation. Why do we need stronger and longer passwords? As malware, phishing, and ransomware continue to skyrocket, we must understand that the password is the primary method for attackers to gain access to corporate systems.  Phishing passwords may be the easiest method, but passwords can also be cracked. The stronger the password, the harder it is for cybercriminals to decode. In a typical attack—the brute force password attack—attackers will use software that quickly attempts every possible password combination of numbers, letters, and symbols. These software programs get better as computing power increases. For example, an eight-character strong password was not long ago considered secure and difficult to crack. Today, it can be cracked in eight hours. But if we tack on two more characters to make it ten-character, cracking the password can take approximately five years.  Why do we need unique passwords for every login? As mentioned above, phishing is one of the simplest ways for hackers to steal our passwords. If you think your company has been victimized by phishing, malware, or ransomware, perhaps you’ve taken steps to reset those passwords. But the security risk here is if employees are using the same passwords for different apps, sites or resources. Have you heard about credential stuffing? With credential stuffing, attackers take username and password combinations they already know (which have been stolen or paid for on the dark web) and try them everywhere they can. Use of credential stuffing is escalating, and businesses of all sizes should take note. This type of attack is only successful if and when employees use the same password for different logins. What about password managers? Managing all those passwords doesn’t have to be complicated. A password management system is software that keeps an up-to-date list of all your passwords and logins, using a master password to access the password “vault”. That master password is the only one you need to remember. What if a hacker accesses your vault? Isn’t that riskier? Sure, there is undoubtedly an element of risk, but it’s critical to think in terms of relative safety. As a general rule, using some type of password Ransomware Data Breach Hack LastPass
bleepingcomputer.webp 2021-05-04 19:54:24 U.S. Agency for Global Media data breach caused by a phishing attack (lien direct) The U.S. Agency for Global Media (USAGM) has disclosed a data breach that exposed the personal information of current and former employees and their beneficiaries. [...] Data Breach
Anomali.webp 2021-05-04 15:25:00 Anomali Cyber Watch: Microsoft Office SharePoint Servers Targeted with Ransomware, New Commodity Crypto-Stealer and RAT, Linux Backdoor Targeting Users for Years, and More (lien direct) The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: Data Theft, Backdoor, Ransomware, Targeted Ransomware Attacks and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber News and Threat Intelligence Python Also Impacted by Critical IP Address Validation Vulnerability (published: May 1, 2021) Researchers have recently discovered that a bug previously discovered in netmask (a tool to assist with IP address scoping) is also present in recent versions of Python 3. The bug involves the handling of leading zeroes in decimal represented IP addresses. Instead of interpreting these as octal notation as specified in the standard, the python ipaddress library strips these and interprets the initial zero and interprets the rest as a decimal. This could allow unauthenticated remote attackers to perform a number of attacks against programs that rely on python's stdlib ipdaddress library, including Server-Side Request Forgery (SSRF), Remote File Inclusion (RFI), and Local File Inclusion (LFI). Analyst Comment: Best practices for developers include input validation and sanitization, which in this case would avoid this bug by validating or rejecting IP addresses. Additionally regular patch and update schedules will allow for rapid addressing of bugs as they are discovered and patches delivered. Proper network monitoring and policies are also an important part of protecting against these types of attacks. Tags: CVE-2021-29921, python Codecov Begins Notifying Affected Customers, Discloses IOCs (published: April 30, 2021) Codecov has disclosed multiple IP addresses as IOCs that were used by the threat actors to collect sensitive information (environment variables) from the affected customers. The company disclosed a supply-chain breach on April 15, 2021, and has now begun notifying customers. The breach went undiscovered for 2 months, and leveraged the Codecov Bash Uploader scripts used by a large number of projects. Analyst Comment: In light of the increasing frequency and sophistication of supply chain attacks, companies should carefully audit, examine, and include in their threat modelling means of mitigating and detecting third party compromises. A resilient and tested backup and restore policy is an important part of the overall security strategy. Tags: North America, Codecov, supply chain FBI Teams up with ‘Have I Been Pwned’ to Alert Emotet Victims (published: April 30, 2021) The FBI has shared more than 4.3 million email addresses with data breach tracking site Have I Been Pwned. The data breach notification site allows you to check if your login credentials may have been compromised by Emotet. In total, 4,324,770 email addresses were provided which span a wide range of countries and domains. The addresses are actually sourced from 2 separate corpuses of data obtained by the agencies. Analyst Comment: Frequently updated endpoint detection policies as well as network security Ransomware Data Breach Malware Tool Vulnerability Threat Patching Guideline
WiredThreatLevel.webp 2021-05-04 11:00:00 Then a Hacker Began Posting Patients\' Deepest Secrets Online (lien direct) A family-run psychotherapy startup grew into a health care giant. It was a huge success-until the data breach and the anonymous ransom notes sent to clients. Data Breach ★★★★★
SecurityAffairs.webp 2021-05-03 14:42:52 Most Common Causes of Data Breach and How to Prevent It (lien direct) Which are the most common causes of a Data Breach and how to prevent It? How can organizations prevent it? Data breaches are highly damaging and equally embarrassing for businesses andconsumers. If you look at Verizon's 2020 Data Breach Investigations Report, you canfind some of the most common causes of data breaches. However, you will also […] Data Breach
itsecurityguru.webp 2021-04-30 07:57:44 Dorset police investigating data breach (lien direct) ITV reports on how Dorset police are investigating a “serious data breach” involving pupils from two schools in Christchurch. This is after information about an alleged race hate crime was sent by mistake to a man from Wimborne who had initially emailed the police about a separate incident. Dorset police insist it was human error […] Data Breach
grahamcluley.webp 2021-04-30 07:30:29 DigitalOcean admits data breach exposed customers\' billing details (lien direct) DigitalOcean, the popular cloud-hosting provider, has told some of its customers that their billing details were exposed due to what it described as a "flaw." Read more in my article on the Hot for Security blog. Data Breach APT 32
The_Hackers_News.webp 2021-04-30 00:24:38 Passwordstate Warns of Ongoing Phishing Attacks Following Data Breach (lien direct) Click Studios, the Australian software firm which confirmed a supply chain attack affecting its Passwordstate password management application, has warned customers of an ongoing phishing attack by an unknown threat actor. "We have been advised a bad actor has commenced a phishing attack with a small number of customers having received emails requesting urgent action," the company said in an Data Breach Threat
ESET.webp 2021-04-29 15:22:48 FBI teams up with \'Have I Been Pwned\' to alert Emotet victims (lien direct) The data breach notification site now allows you to check if your login credentials may have been compromised by Emotet Data Breach
grahamcluley.webp 2021-04-28 17:52:18 Etsy-owned musical instrument marketplace Reverb suffers data breach (lien direct) The online musical instrument marketplace Reverb has suffered a data breach which has exposed the personal details of 5.6 million users. Read more in my article on the Hot for Security blog. Data Breach
bleepingcomputer.webp 2021-04-28 16:09:13 DigitalOcean data breach exposes customer billing information (lien direct) Cloud hosting provider DigitalOcean has disclosed a data breach after a flaw exposed customers' billing information. [...] Data Breach APT 32
InfoSecurityMag.webp 2021-04-27 16:23:00 Online Music Marketplace Suffers Data Breach (lien direct) Cybersecurity researcher finds millions of Reverb.com records on unprotected server Data Breach
bleepingcomputer.webp 2021-04-27 10:46:26 (Déjà vu) MangaDex discloses data breach after stolen database shared online (lien direct) Manga scanlation site MangaDex disclosed a data breach last week after learning that the site's user database was privately circulating among threat actors. [...] Data Breach Threat
bleepingcomputer.webp 2021-04-27 10:46:26 MangaDex discloses data breach after stolen data gets shared online (lien direct) Manga scanlation site MangaDex disclosed a data breach last week after learning that the site's user database was privately circulating among threat actors. [...] Data Breach Threat
bleepingcomputer.webp 2021-04-26 17:10:48 Reverb discloses data breach exposing musicians\' personal info (lien direct) Popular musical instrument marketplace Reverb has suffered a data breach after an unsecured database containing customer information was exposed online. [...] Data Breach
SecurityWeek.webp 2021-04-26 15:05:53 Oilfield Services Company Gyrodata Discloses Data Breach (lien direct) Oilfield services company Gyrodata last week revealed that it was recently targeted in a cyberattack that resulted in sensitive employee information being compromised. Houston, Texas-based Gyrodata provides surveying and wireline services for oil and gas, mining, and civil engineering projects. Data Breach
AlienVault.webp 2021-04-26 10:00:00 The 5 most crucial Cybersecurity updates for businesses in 2021 (lien direct) This blog was written by an independent guest blogger. For as long as businesses have used computers, cybersecurity has been crucial. Now, as modern business and data are becoming inseparable, it’s an absolute necessity. As companies start to recover from 2020 losses, they should consider investing in security updates. Cybercrime reached new heights in the past year, with internet crime reports rising 69.4% and costing more than $4.2 billion. Now that more companies are embracing digital services after the pandemic, this trend will likely continue. All businesses, regardless of size or industry, must revisit their cybersecurity. Here are the five most important cybersecurity updates for this year. 1. Implementing a Zero-Trust framework The single most crucial cybersecurity upgrade for businesses this year is adopting a zero-trust security framework. These systems, which rely on network segmentation and thorough user verification, aren’t new but are increasingly crucial. In light of rising cyberthreats, companies can’t afford to trust anything inside or outside their networks without proof. A 2020 survey found that 82% of company leaders plan to let their employees work remotely at least part time after the pandemic. That many people accessing data remotely raises security concerns. Hackers could pose as remote workers to gain access or install spyware, and IT teams wouldn’t know it. Zero-trust models mitigate these threats. Verifying user identity at every step helps guarantee only employees can access mission-critical data. Segmentation ensures that only those who need access can get it, and if a breach occurs, it won’t impact the entire network. 2. Securing machine learning training data Machine learning algorithms are becoming increasingly common among companies in various industries. These models take considerable amounts of data to train, which presents an enticing opportunity for cybercriminals. As more companies rely on machine learning, more threat actors will likely try to poison the training data. By injecting incorrect or corrupt data into the training pool, cybercriminals could manipulate a machine learning system. If companies don’t catch the problem before it’s too late, the algorithms they rely on could influence poor or even harmful business decisions. Given this threat, securing machine learning training data is a must. Businesses should carefully inspect the information they use to train machine learning models. They should also enact stricter access controls over training pools, including activity monitoring. 3. Verifying third-party and partner security Businesses should also look outward when improving their cybersecurity. The growing public awareness of cyberthreats is changing expectations about visibility, and that’s a good thing. It’s no longer sufficient to trust that a business partner or third party has robust data security. Companies must verify it. Third-party data breaches in 2020 exposed millions of records, and major events like the SolarWinds hack have revealed how fragile some systems are. In light of these risks, businesses must ask all potential partners to prove Data Breach Hack Threat Guideline
InfoSecurityMag.webp 2021-04-26 08:39:00 US Drilling Giant Gyrodata Reveals Employee Data Breach (lien direct) Ransomware attack earlier this year to blame Ransomware Data Breach
Veracode.webp 2021-04-23 09:34:12 Reporting Live From Collision Conference 2021: Part Two! (lien direct) If you caught part one of our recap series on this year???s Collision conference, you know we covered a roundtable talk hosted by Veracode???s own Chris Wysopal. The talk focused on the risks of AI and machine learning, delving into discussions of how to manage the security aspects of these future-ready technologies ???ツ?especially when it comes down to consumer privacy.ツ? Chris also had the opportunity to host a session of his own, covering the critical aspects of modern application security and the reasons that organizations need to get serious about security-minded approaches to their code. Here???s what we learned.ツ? Secure from the top down Chris began his session Secure From the Top Down by noting that, today, it???s important to think about application and product security through the eyes of the developer or the builder. With so many applications running in the cloud and so many devices connected to the Internet of Things (IoT), Chris pointed out that the attack surface for threat actors is growing exponentially and that everyone building and deploying technology needs to consider the risks moving forward. Connected devices are everywhere, Chris said, but they???re not typically behind a firewall. Normally, these devices are connected to 5G or Wi-Fi. According to Chris, this means devices essentially need to secure themselves and all of the connection points where they talk to other devices or they pose a security risk.ツ? Further, everything is connected through APIs today. ???We used to have big, monolithic software packages with one big block of code,??? Chris said. ???Today, we have a lot of small devices; even with applications running in the cloud, they???re built with microservices and are talking to each other through APIs.??? This is a way an attacker can exploit a device or an application, and means the builders of today need to improve the security around their APIs for a more secure tomorrow. It???s already a problem; Chris pointed out in his session that, according to the 2020 Verizon Data Breach Investigations Report, 43 percent of breaches come from single page applications. Developers working on building these single page apps need to be more considerate with their security.ツ? Looking ahead at trends Time is the biggest competitor for most organizations, according to Chris, and there are three main trends that are going to impact product security moving forward: ubiquitous connectivity, abstraction and componentization, and hyperautomation of software delivery.ツ? Ubiquitous connectivity While this involves the rise of APIs and IoT devices, what it really comes down to is that each piece of software connected through the network and APIs must think about securing itself. ???Each code that is exposing an API needs to think about how it will authenticate, encrypt, and secure itself from all Data Breach Threat Patching
no_ico.webp 2021-04-22 11:52:42 Eversource Energy Data Breach Comment (lien direct) It has been reported that a misconfiguration error has exposed personal data belonging to customers of New England’s largest energy provider. On March 16, Eversource discovered that one of its cloud data storage… Data Breach
grahamcluley.webp 2021-04-22 08:30:22 Smashing Security podcast #224: The Lazarus Heist, Facebook faux pas, and no-cost security (lien direct) Facebook has managed to do the seemingly impossible - and had a data breach about its handling of a data breach. Meanwhile, we chat to the host of the brand new podcast about North Korea's hackers targeting the rest of the world, and discuss if an intern can be trusted to monitor your security. All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Geoff White and featuring an interview with Duo's Helen Patton. Data Breach APT 38 APT 28
kovrr.webp 2021-04-22 00:00:00 Travailler à domicile: une année en revue les entreprises sont obligées de permettre à leurs employés de travailler à distance, la surface d'attaque devient plus large.
Working From Home: A Year in ReviewAs companies are obliged to allow their employees to work remotely, the attack surface becomes broader.Read More
(lien direct)
Cyber Trends, Risks and the Global PandemicAs we mark a year of working from home through the global pandemic, this is a good time to discuss and delve into the IT changes and trends in our day-to-day work environment and their implications for user privacy, corporate cyber security and cyber insurance. The 3 main categories of software and applications that saw a significant increase in usage over the past year include:Video Conferencing and online communication platformsVPNs and Remote Desktop (RDP) softwaresTwo Factor (2FA) and Multiple Factor Authentication (MFA) applicationsWorking from home has increased the usage of the aforementioned technologies as well as other similar applications, broadened the attack surface and provided new opportunities for various malicious actors as there are more external-internal connections compared to the past, meaning more types of services to keep track of and monitor. This also implies a heavier traffic load due to video streaming, database connections and more. ‍Easier communication, but at what cost?Away from our colleagues and offices, employees have had to adapt quickly to various methods of online communication and meetings in order to keep things running, whether it’s Zoom, Webex, Microsoft Teams, Google meet or any other platform, co-workers are now able to chat, share video and documents easily from computers and phones. Right from the start of the pandemic, Zoom solidified itself as the dominant platform for video conferencing with an increase of 67% in usage between January and the middle of March 2020. By April 2020 it already had more than 300 million daily Zoom meeting participants in comparison to 10 million meeting participants in December 2019.(1)Number of daily Zoom users, December 2019 - April 2020This convenience comes with significant underlying risks to users and corporate networks, as poorly implemented encryption protocols and other security measures can result in unauthorized participants access to otherwise personal or confidential calls. This sort of intrusion, commonly referred to as “Zoom Bombing”, can be at best innocent trolling and cause annoyance but at worst allow access to a malicious actor who can gather sensitive information on the company for espionage purposes(2), harvest participants\' credentials and other PII and leak the call’s content and video as well as use the meeting chat to send phishing links which could escalate to a full-blown ransomware attack on the company\'s network(3). This sort of attack can be carried out by an attacker exploiting vulnerabilities such as (or similar to) CVE-2019-13450(4) which would allow them to forcefully join a meeting. ‍Multiple Factor Authentication - double the safety but not without risks Multiple Factor Authentication (MFA) and Two Factor Authentication (2FA) have been adopted in recent years as an additional security tool to ensure the safety of one’s accounts and personal information. As previously mentioned, the migration to a remote work routine necessitated a secure and verified method for each employee to access their company’s assets online on a daily basis. This basic work necessity came with restrictions and guidelines such as remote desktop applications to create a virtual work environment and 2FA applications in an attempt to strengthen the company’s cybersecurity posture. By May 2020, around 70% of British businesses were already using some type of MFA and a VPN for better cyber security risk management of the changed work environment(5).There are numerous ways by which MFA or 2FA methods can be bypassed, either through brute force (if the requested code is between 4-6 numbers), social engineering or a conventional session management in which attackers use the password reset function. This is due to the fact that 2FA is often not implemented on the system’s login page after a password reset.VPNs and RDPs - work from anywhere and be attacked from anywhereVi Ransomware Data Breach Malware Tool Vulnerability ★★★
Cybereason.webp 2021-04-21 14:16:50 CISO Stories Podcast: He Fought the FTC Over a Breach and Won (lien direct) CISO Stories Podcast: He Fought the FTC Over a Breach and Won Hopefully, you won't ever have to hire a lawyer to defend yourself against a government regulator. So what happens when the Federal Trade Commission or other powerful body baselessly accuses your company of wrongdoing where a data breach is concerned? Data Breach
InfoSecurityMag.webp 2021-04-20 19:53:00 Dating Service Suffers Data Breach (lien direct) Cyber-attackers gain access to Manhunt's accounts database Data Breach
grahamcluley.webp 2021-04-20 15:47:59 Facebook suffers a data breach about how it\'s hoping to stop the media talking about its last data breach (lien direct) The social network has goofed again. But this time it's Facebook's PR team's handling of a data breach rather than its users who have been left exposed. Data Breach
bleepingcomputer.webp 2021-04-20 13:45:02 Eversource Energy data breach caused by unsecured cloud storage (lien direct) Eversource, the largest power supplier in New England, has suffered a data breach after customers' personal information was exposed on an unsecured cloud server. [...] Data Breach
SecurityWeek.webp 2021-04-20 12:27:09 Auto Insurance Giant GEICO Discloses Data Breach (lien direct) American auto insurance provider GEICO has disclosed a cyber-incident that resulted in driver's license numbers being compromised. Data Breach
AlienVault.webp 2021-04-19 20:38:00 Introducing AT&T\'s Managed Endpoint Security with SentinelOne (lien direct) With 5G, edge solutions, and digital transformation all around us, every enterprise should be taking a closer look at their endpoint security and evaluate options that will be able to keep pace with this dynamic new environment.The newly introduced  AT&T Managed Endpoint Security with SentinelOne™ offer brings world class managed services with comprehensive endpoint security. SentinelOne brings best-of-breed Endpoint Protection Platform (EPP) and Endpoint Detection and Response (EDR) with deep integration into the AT&T Unified Security Management (USM) platform and Alien Labs Open Threat Exchange (OTX). This deep integration, along with AT&T’s 500+ partner integrations, can provide businesses Extended Detection and Response (XDR) capabilities from the endpoint to the network to the cloud. Plus, through the AT&T Security Operations Center, businesses can rely on world class monitoring and management of their endpoints. Here are the unique benefits it can bring to enterprises: Industry leading technology Joining forces with the best of the best is crucial especially when it comes to endpoint security. AT&T has teamed up with SentinelOne who provides next-generation endpoint security combining antivirus, EPP, and EDR into one agent. SentinelOne has been highly recognized in the industry and was number 1 in the 2020 MITRE ATT&CK test - APT 29 for most total detections and most correlated alerts through comprehensive storyline technology. This autonomous agent utilizes Artificial Intelligence (AI) and machine learning (ML) to help protect against known and unknown threats and eliminates reliance on external factors for protection. This faster, “machine-speed” detection & response provides continuous protection, even when offline. And, in the event of an attack, the SentinelOne agent can perform 1-click remediation and rollback with no custom scripting or re-imaging required. Deep integration with AT&T’s USM platform and Alien Labs OTX AT&T Cybersecurity and SentinelOne bring one of the most unique combinations in the market via the deep integrations between the SentinelOne platform and the AT&T USM platform. This deep integration allows for orchestrated and automated incident response on the endpoints. Additionally, deep integrations were built between the world’s largest open threat intelligence community, AT&T Alien Labs Open Threat Exchange (OTX), and the SentinelOne agent. The AT&T Alien Labs OTX encompasses over 145,000 security professionals submitting over 20 million threat indicators per day. Additional context is provided from the USM sensor network with an additional 20 million threat observations per day and AT&T’s Chief Security Office analyzing over 446 PB of traffic from 200 countries and territories. By correlating the incidents of compromise from AT&T Alien Labs OTX, AT&T is able to deliver added context that allows for faster responses. These same AT&T Alien Labs detections and threat intelligence also informs threat hunting on SentinelOne’s EDR data to help yield richer insights and easier detection of evasive threats. Expert management As one of the world's top MSSPs, AT&T Cybersecurity employs highly experienced and industry certified individuals for the Managed Endpoint Security with SentinelOne offering. AT&T brings over 25 years of experience in delivering managed security services and knows what it takes to keep pace with the dynamic threat landscape. To stay ahead, AT&T’s security analysts maintain security certifications including GSE, CISSP, CEH, and more.  For the Managed Endpoint Security with SentinelOne offering, AT&T Data Breach Threat Guideline APT 29
bleepingcomputer.webp 2021-04-19 18:27:46 Geico data breach exposed customers\' driver\'s license numbers (lien direct) Car insurance provider Geico has suffered a data breach where threat actors stole the driver's licenses for policyholders for over a month. [...] Data Breach Threat
grahamcluley.webp 2021-04-19 15:46:19 Six million male members may have been exposed after hack of gay dating service (lien direct) Manhunt, a popular gay dating service, has suffered a data breach which may have put members at risk of exposure. Data Breach Hack
itsecurityguru.webp 2021-04-19 15:42:02 Domino\'s India suffers data breach (lien direct) Domino’s in India has suffered a data breach in which credit card details and personal information of both customers and employees have been exposed. The leaked information is being sold on the dark web, for which the hacker is demanding 10 BTC. Included in the data stolen are names, contact numbers, email IDs, addresses, credit […] Data Breach
no_ico.webp 2021-04-19 11:49:50 Facebook Facing Mass Legal Action Over Data Breach (lien direct) Facebook is facing mass legal action from users whose data was compromised in a massive data leak. If found to be in breach, Facebook could face fines of up to 4% of… Data Breach
no_ico.webp 2021-04-16 14:40:38 Expert Comment On DPC Facebook Investigation (lien direct) Please see below for comment by cybersecurity expert on the Irish Data Protection Commission launching an investigation into the Facebook data breach that caused the leak of 533 million phone… Data Breach
SecureMac.webp 2021-04-16 09:04:12 Checklist 226: Yet Another Facebook Data Breach (lien direct) A Facebook data breach has exposed 500 million + users. On this episode of the Checklist: Details, how to check if you were affected, and staying safe. Data Breach
InfoSecurityMag.webp 2021-04-15 15:45:00 Arrest Made Over California City Data Breach (lien direct) One Huntington Park financial official arrested and others placed on leave following data breach Data Breach
securityintelligence.webp 2021-04-13 11:00:00 Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach (lien direct) “It has gotten to the point, unfortunately, where they are so frequent and common these days, that it’s like, here we go again,” Christopher Sitter says when I asked him about the prospect of a third-party data breach. Sitter is the senior director of information security at Juniper Networks. He manages all things incident response-related — […] Data Breach
Troy_Hunt.webp 2021-04-13 05:29:43 Data Breaches, Class Actions and Ambulance Chasing (lien direct) This post has been brewing for a while, but the catalyst finally came after someone (I'll refer to him as Jimmy) recently emailed me regarding the LOQBOX data breach from 2020. Their message began as follows:I am currently in the process of claiming compensation for a severe data breach Data Breach
SecurityAffairs.webp 2021-04-12 09:48:37 LinkedIn confirmed that it was not a victim of a data breach (lien direct) LinkedIn has formally denied that the recently disclosed data leak was caused by a security breach, data were obtained via web scraping. LinkedIn has issued a formal statement to deny that the recent leak that exposed the account details of more than 500 million of its registered users was caused by a security breach. A […] Data Breach
The_Hackers_News.webp 2021-04-12 09:04:02 Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users\' Data (lien direct) Online trading and discount brokerage platform Upstox has become the latest Indian company to suffer a security breach of its systems, resulting in the exposure of sensitive information of approximately 2.5 million users on the dark web. The leaked information includes names, email addresses, dates of birth, bank account information, and about 56 million know your customer (KYC) documents pulled Data Breach
securityintelligence.webp 2021-04-08 16:30:00 How Vulnerability Management Can Stop a Data Breach (lien direct) Vulnerability management may not be the sexiest topic. But, while buzzier topics are certainly important, vulnerability management may just be the key to an effective data security strategy. According to a Ponemon Institute report, 42% of nearly 2,000 surveyed IT and security workers indicated that they had suffered a data breach in the last two […] Data Breach Vulnerability
SecurityWeek.webp 2021-04-08 14:19:27 Belden Says Health-Related Information Exposed in Data Breach (lien direct) Specialty networking solutions provider Belden on Wednesday shared an update on the data breach disclosed in November 2020, and said health-related information was also exposed. Data Breach
ESET.webp 2021-04-08 13:00:15 Does data stolen in a data breach expire? (lien direct) Some personal information just doesn't age – here's what the Facebook data leak may mean for you Data Breach
itsecurityguru.webp 2021-04-08 12:09:33 Carding Mafia hack: 300,000 user accounts exposed (lien direct) Have I been Pwned reported that the data breach exposed users’ email addresses, hashed passwords, usernames, and IP addresses. Of the 500,000 users of the hacking forum, 297,744 have been affected; however, the forum operators have not yet notified their users. The founder of Have I Been Pwned has confirmed the authenticity of the stolen […] Data Breach
NakedSecurity.webp 2021-04-08 10:46:54 S3 Ep27: Census scammers, beg bounties and data breach fines [Podcast] (lien direct) New episode - listen now! Data Breach
SecureMac.webp 2021-04-07 22:40:40 Facebook data breach exposes details of 500 million users (lien direct) A Facebook data breach has exposed the personal information of more than 500 million users. In this article: Details | Impact | Staying Safe Data Breach
InfoSecurityMag.webp 2021-04-07 16:25:00 Consulting Firm Data Breach Impacts MSU (lien direct) Michigan State University affected by ransomware attack on contractor's law firm Ransomware Data Breach
NakedSecurity.webp 2021-04-06 22:22:58 Too slow! Booking.com fined for not reporting data breach fast enough (lien direct) It's not just the breach, it's the speed of the breach response... Data Breach
bleepingcomputer.webp 2021-04-06 13:50:58 Have I Been Pwned adds search for leaked Facebook phone numbers (lien direct) Facebook users can now use the Have I Been Pwned data breach notification site to check if their phone number was exposed in the social site's recent data leak. [...] Data Breach
Last update at: 2024-06-16 08:10:32
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter