#data-breaches

[ follow ]
#data-security
Forbes
1 day ago
Information security

Council Post: 4 Tips For Strengthening Data Security Through The Human Firewall

The role of Chief Information Security Officer (CISO) is increasingly challenging in the current landscape of data breaches and evolving technology. [ more ]
ITPro
3 weeks ago
Artificial intelligence

'You need your own bots' to wage war against rogue AI, warns Varonis VP

AI poses both a significant opportunity and threat to organizations, emphasizing the importance of securing data against rogue AI to prevent breaches. [ more ]
ReadWrite
2 months ago
Privacy professionals

Pornhub says adios! to Texas

Pornhub blocked access in Texas due to age verification laws
Concerns about data breaches prompted Pornhub's decision to restrict access in certain U.S. states [ more ]
Databreaches
5 months ago
Privacy professionals

New leak site reveals yet two more U.S. medical sector victims

A new leak site called 'DragonForce' has appeared on the dark web, listing data breaches from previous attacks.
Two medical sector victims, Heart of Texas Behavioral Health Network and Greater Cincinnati Behavioral Health Services, were identified on the site. [ more ]
Theregister
1 year ago
Privacy professionals

37m T-Mobile US customers hit in yet another privacy breach

T-Mobile US today said someone abused an API to download the personal information of 37 million subscribers.A regulatory filing [PDF] disclosed one or more miscreants were able to access potentially the "name, billing address, email, phone number, date of birth, T-Mobile account number and information such as the number of lines on the account and plan features" of each affected customer.
moredata-security
#cybersecurity
Above the Law
2 days ago
Information security

Securing The Bounty: Bug Bounties Take Center Stage In Uber CISO's Criminal Appeal

Criminal penalties are possible for mishandling data breaches and abusing bug bounty programs. [ more ]
Above the Law
1 week ago
Privacy professionals

Biglaw Firms Fall Prey To Cyberattacks, With Data Breaches On The Rise

2024 projected to be a record year for data breaches in law firms. [ more ]
Mail Online
2 weeks ago
Information security

The most and least common four-digit PIN numbers - is yours on list?

Using common PINs like '1234' can make users vulnerable to cyber attacks. [ more ]
www.columbiacountyspotlight.com
2 weeks ago
Medicine

Charles (Chuck) Thomas Ramsdell

The article discusses the importance of cybersecurity for businesses in the current digital landscape. [ more ]
CyberScoop
4 weeks ago
Information security

Microsoft organizational changes seek to address security failures

Microsoft ties executive compensation to security targets and prioritizes security over new features to address recent breaches. [ more ]
InfoQ
1 month ago
Data science

Rachael Greaves at QCon London: Ethical AI Can Decrease the Impact of Data Breaches

Data minimisation helps decrease the impact of data breaches by limiting the amount of information organizations hold. [ more ]
morecybersecurity
#cybercrime
ITPro
1 week ago
Information security

FBI seizes BreachForums infrastructure - but successor sites are already popping up

The FBI, in a joint operation, seized the underground cybercrime platform BreachForums hosting stolen data, raising concerns about the lasting impact and potential resurgence of such criminal activities. [ more ]
Ars Technica
2 weeks ago
Data science

BreachForums, an online bazaar for stolen data, seized by FBI

Law enforcement, led by the FBI, shut down BreachForums, a hub for trafficking stolen data and malware, for the second time in a year. [ more ]
London Business News | Londonlovesbusiness.com
4 months ago
EU data protection

Does your side hustle need insurance?

Having a side hustle may require you to have insurance.
Cybercrime and data breaches are common risks associated with running a side hustle. [ more ]
morecybercrime
Ars Technica
2 weeks ago
Privacy professionals

New SEC requirements give institutions 30 days to disclose security incidents

SEC mandates disclosure of security breaches by financial institutions within 30 days to protect customer data. [ more ]
#cyber-security
ComputerWeekly.com
3 weeks ago
Privacy professionals

Cyber attack victims need to speak up, says ICO | Computer Weekly

Organizations need to be transparent about cyber attacks to improve security postures. [ more ]
ComputerWeekly.com
3 weeks ago
Privacy professionals

Over 5.3 billion data records exposed in April 2024 | Computer Weekly

Over 5.3 billion data records breached in April 2024, a drastic increase from previous years. [ more ]
ITPro
4 weeks ago
Information security

Nearly half of EMEA data breaches were due to internal blunders in 2023

Almost half of EMEA data breaches are internal. Human error is a significant factor. Zero-day vulnerabilities are increasing, with ransomware exploiting them. [ more ]
Amazic
1 year ago
Privacy professionals

This is why you want to apply for a position in cyber security - Amazic

Are you looking for an exciting and challenging career that is in high demand?Look no further than cyber security.With the increasing frequency of cyber attacks and data breaches, companies and organizations are in desperate need of skilled cyber security professionals to protect their networks and data.
www.dw.com
1 year ago
Privacy professionals

T-Mobile: 37 million US customers' data breached DW 01/20/2023

TechnologyUnited States of America 01/20/2023January 20, 2023 Less than a year after settling a data leak lawsuit was settled for $350 million, T-Mobile has reported that details of 37 million customers were hacked.The Telecom company T-Mobile revealed on Thursday that the data of 37 million customers was hacked in November 2022.
morecyber-security
#ransomware-attacks
Theregister
3 weeks ago
Information security

Te years since the first corp ransomware and no end in sight

Ransomware attacks on corporations have increased over the past decade, with no sign of slowing down, posing a significant threat to information security. [ more ]
Databreaches
5 months ago
Privacy professionals

Apple report finds steep increase in data breaches, ransomware

Data breaches and ransomware attacks are increasing, with 2.6 billion personal records exposed in the past two years.
Apple is calling for greater use of encryption to combat these intrusions. [ more ]
moreransomware-attacks
CyberScoop
3 weeks ago
Information security

Stealing cookies: Researchers describe how to bypass modern authentication

The article highlights the weaknesses of password-based authentication and the importance of modern authentication methods like FIDO2 in enhancing security in digital systems. [ more ]
ComputerWeekly.com
1 month ago
Information security

EMEA CISOs must address human factors behind cyber incidents | Computer Weekly

Organizations in EMEA need to address human factors in data breaches, with 87% attributed to human errors, system intrusion, and social engineering. [ more ]
The Verge
1 month ago
Artificial intelligence

AI security bill aims to prevent safety breaches of AI models

A new bill, the Secure Artificial Intelligence Act, aims to establish a database to track AI system breaches and focus on counter-AI techniques. [ more ]
#data-protection
PinkNews | Latest lesbian, gay, bi and trans news | LGBTQ+ news
1 month ago
EU data protection

'We've got to give people a wake-up call': Info commissioner slams HIV data breaches

Data protection standards for people living with HIV in the UK are condemned for numerous breaches, leading to a significant loss of trust. [ more ]
BleepingComputer
3 months ago
Privacy professionals

Data breaches at Viamedis and Almerys impact 33 million in France

Over 33 million people in France have been impacted by data breaches at healthcare payment service providers Viamedis and Almerys.
The breaches exposed sensitive data such as names, dates of birth, insurer details, social security numbers, marital status, civil status, and guarantees open to third-party payment. [ more ]
moredata-protection
Iapp
1 month ago
Data science

ICO calls for increased data protections for those with HIV

Health care organizations in the UK urged to enhance data protection post HIV status data breaches. [ more ]
Amazic
1 month ago
JavaScript

Every organization needs an SBOM, and Anchore makes it continuous & automated - Amazic

Organizations need an SBOM for security amidst rising data breaches, but it's challenging due to cloud complexity.
Anchore provides automated compliance for cloud-native apps. [ more ]
#security-measures
Engadget
1 month ago
Web design

Proton Mail's paid users will now get alerts if their info has been posted on the dark web

Proton Mail introduces Dark Web Monitoring for paid users to provide alerts on breaches and leaks, enhancing proactive security measures. [ more ]
WIRED
4 months ago
Privacy professionals

Your Medical Data Is Code Blue

Medical data companies do not do enough to protect patient information.
Patients are the ones who suffer when medical data is hacked and stolen. [ more ]
moresecurity-measures
TeachPrivacy
2 months ago
Privacy professionals

The Failure of Data Security Law

Data security laws have three types: breach notification, security safeguards, private litigation. Law fails to prevent breaches, focuses on breached organizations, and lacks preventative measures. [ more ]
#mozilla
Ars Technica
2 months ago
Privacy professionals

Mozilla's privacy service drops a provider with ties to people-search sites

The $240 billion data broker industry profits from selling private information.
Mozilla cut ties with a key provider of privacy protections, Onerep, due to conflicts of interest. [ more ]
Ars Technica
3 months ago
Privacy professionals

Mozilla targets scummy data brokers with Monitor Plus removal service

Mozilla has launched an alternative to people-search websites called Mozilla Monitor Plus which automatically monitors and removes personal information from data broker sites and known data breaches.
The Plus version of Mozilla Monitor costs $14 per month or $108 per year, and offers a faster removal process compared to the free version.
Data brokers gather information from online traces left by account sign-ups, advertising, web browsing, and other activities, and sell it to customers like the NSA and FBI. [ more ]
moremozilla
TechCrunch
2 months ago
Privacy professionals

How to verify a data breach | TechCrunch

Verification of data breaches is crucial for both companies and victims to take prompt action.
Authenticating data breaches involves utilizing various tools and techniques tailored to each unique breach. [ more ]
www.theguardian.com
2 months ago
EU data protection

Home Office immigration database errors hit more than 76,000 people

Database at Home Office has errors for over 76,000 migrants
Merged identities in the database lead to severe issues for individuals [ more ]
Axios
2 months ago
Privacy professionals

Ransomware attacks aren't as sophisticated as you'd think

Cybercriminals are self-centered and egotistical.
Ransomware gangs are known to scam and betray each other. [ more ]
Entrepreneur
3 months ago
Artificial intelligence

New Book Reveals Top 10 Dangers of AI Technology | Entrepreneur

AI presents threats like manipulation and misinformation
Job automation can lead to significant job losses and income inequality [ more ]
#human-error
Databreaches
3 months ago
Privacy technologies

School cyber incidents on Long Island: Reported cases rose sharply in 2023

Increase in cyber incidents in Long Island schools in 2023 compared to the previous year
Human error is a major cause of exposing sensitive student information [ more ]
www.theguardian.com
3 months ago
Privacy professionals

Second accidental data leak in four months regrettable', Australian finance department says

Human errors are a significant cause of government data breaches.
Finance department mistakenly shared confidential information twice, leading to potential legal consequences. [ more ]
morehuman-error
www.cbc.ca
3 months ago
Digital life

Thieves stole $1,000 in Optimum points from this woman. Here's how to safeguard your points | CBC Radio

Fraudsters target loyalty points with real cash value.
Growing issue with account compromise and theft in loyalty points programs. [ more ]
#vulnerabilities
Medium
3 months ago
Privacy professionals

Frontend Application Security: Tips and Tricks

Data breaches are becoming more common, with the average cost reaching $4.45 million.
Frontend application security is crucial for businesses to protect against modern-day attackers. [ more ]
TechRepublic
1 year ago
Information security

IBM snags Polar Security to boost cloud data practice

IBM acquired the Israeli firm founded in 2021 to grow its relevance in the nascent realm of data security posture management, or DSPM.In an effort to grow its hybrid cloud and artificial intelligence capabilities, IBM announced on Tuesday that it was acquiring Polar Security, an Israel-based company specializing in data security posture management.
Amazic
1 year ago
Privacy professionals

8 common security risks associated with cloud-based DevOps and how to mitigate them - Amazic

Cloud-based DevOps has become a popular approach to software development in today's technology-driven world, enabling organizations to build and deploy software faster and more efficiently.However, this new approach also brings a range of security risks that must be considered.Having robust security measures in place is essential when using cloud computing services to facilitate software application development, testing, and deployment.
ITPro
1 year ago
Information security

Microsoft links PaperCut server attacks to Cl0p, LockBit ransomware

Researchers have linked leading ransomware groups Cl0p and LockBit to the ongoing exploitation of critical-rated vulnerabilities in print management software from PaperCut.The vulnerabilities, CVE-2023-27350 and CVE-2023-27351, have a near maximum 9.8 severity score and have enabled remote code execution on vulnerable PaperCut servers since at least January 2023.
morevulnerabilities
Medium
3 months ago
Privacy professionals

How Data Security Posture Management Protects Against Data Breaches

The number of annual data breaches continues to rise
Data breaches cause major financial and reputational damage [ more ]
Iapp
3 months ago
EU data protection

Ransomware hackers were paid more than $1.1B in 2023

Ransomware groups received over $1.1 billion in payments in 2023 for selling back stolen data.
Hackers targeted high-profile institutions and critical infrastructure using zero-day vulnerabilities. [ more ]
Data Breach Insights - Be Aware & Stay Secure
4 months ago
Privacy professionals

Largest Data Breaches in The World [Updated 2024] - Data Breach Insights Data Breach Insights

The top 100 largest data breaches are analyzed to provide key insights and lessons from major cybersecurity incidents.
The breaches involve a wide range of industries, with the healthcare sector being the most targeted. [ more ]
ComputerWeekly.com
4 months ago
Privacy professionals

Security Think Tank: What to expect in cyber this year | Computer Weekly

2023 saw increased investment in generative AI (genAI) which will continue in 2024 as businesses embrace rapid experimentation and launch new genAI initiatives.
Organizations need to carefully balance the speed of innovation with governance and accountability in implementing AI-based technologies to mitigate security and privacy risks. [ more ]
Iapp
4 months ago
EU data protection

Ransomware groups face challenges after law enforcement's cybersecurity crackdowns

Law enforcement crackdown is making it harder for ransomware groups to carry out data breaches
Law enforcement efforts have decreased the number of infected computers and vulnerabilities [ more ]
#data breaches
Databreaches
6 months ago
Privacy professionals

Why we need legislation requiring more transparency in breach notices, Saturday edition (Bluefield University)

Legislation requiring more transparency in disclosures is needed to address cyberattacks and data breaches.
Bluefield University has experienced a cyberattack and data breach, with leaked data being published by a threat actor. [ more ]
TNW | Data-Security
6 months ago
Privacy professionals

Can you 'deGoogle' a phone? Murena tried - and added a kill switch

Murena is a phonemaker that claims to have the ultimate pro-privacy smartphone with features like a physical kill switch and an anti-tracking operating system.
Multiple scandals involving government agencies and tech companies mishandling user data highlight the need for privacy-focused smartphones like the Murena 2.
The proliferation of surveillance and the potential misuse of personal data by big tech pose significant threats to average consumers. [ more ]
TNW | Data-Security
6 months ago
Privacy professionals

Can you 'deGoogle' a phone? Murena tried - and added a kill switch

Murena is a phonemaker that claims to have the ultimate pro-privacy smartphone with features like a physical kill switch and an anti-tracking operating system.
Multiple scandals involving government agencies and tech companies mishandling user data highlight the need for privacy-focused smartphones like the Murena 2.
The proliferation of surveillance and the potential misuse of personal data by big tech pose significant threats to average consumers. [ more ]
Dark Reading
6 months ago
Privacy professionals

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Strict data privacy regulations have not been able to fully safeguard consumer data and prevent data breaches.
Data de-identification is a key safeguard measure in privacy laws, but it has weaknesses and challenges in the digital world. [ more ]
Dark Reading
6 months ago
Privacy professionals

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Strict data privacy regulations have not been able to fully safeguard consumer data and prevent data breaches.
Data de-identification is a key safeguard measure in privacy laws, but it has weaknesses and challenges in the digital world. [ more ]
Dark Reading
6 months ago
Privacy professionals

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Strict data privacy regulations have not been able to fully safeguard consumer data and prevent data breaches.
Data de-identification is a key safeguard measure in privacy laws, but it has weaknesses and challenges in the digital world. [ more ]
moredata breaches
TNW | Data-Security
6 months ago
Digital life

Can you 'deGoogle' a phone? Murena tried - and added a kill switch

Murena is a phonemaker that claims to have the ultimate pro-privacy smartphone with features like a physical kill switch and an anti-tracking operating system.
Multiple scandals involving government agencies and tech companies mishandling user data highlight the need for privacy-focused smartphones like the Murena 2.
The proliferation of surveillance and the potential misuse of personal data by big tech pose significant threats to average consumers. [ more ]
Dark Reading
6 months ago
EU data protection

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Strict data privacy regulations have not been able to fully safeguard consumer data and prevent data breaches.
Data de-identification is a key safeguard measure in privacy laws, but it has weaknesses and challenges in the digital world. [ more ]
Dark Reading
6 months ago
Information security

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Strict data privacy regulations have not been able to fully safeguard consumer data and prevent data breaches.
Data de-identification is a key safeguard measure in privacy laws, but it has weaknesses and challenges in the digital world. [ more ]
TechRepublic
6 months ago
Privacy professionals

How Do Password Managers Work and Why Do You Need One?

Creating unique passwords for online accounts is crucial for preventing data breaches.
Password managers are tools that can generate and store secure passwords to enhance security. [ more ]
TechRepublic
6 months ago
Privacy professionals

How Do Password Managers Work and Why Do You Need One?

Creating unique passwords for online accounts is crucial for preventing data breaches.
Password managers are tools that can generate and store secure passwords to enhance security. [ more ]
London Business News | Londonlovesbusiness.com
6 months ago
Privacy professionals

Guarding against human error: The unseen weakness in cyber security

Human error is responsible for 95% of all cyber security breaches.
There are two types of human error in cyber security: decision-based errors and skill-based errors.
Misdelivery is a common cause of data breaches and refers to the act of sending sensitive information to the wrong recipient. [ more ]
London Business News | Londonlovesbusiness.com
6 months ago
Privacy professionals

Guarding against human error: The unseen weakness in cyber security

Human error is responsible for 95% of all cyber security breaches.
There are two types of human error in cyber security: decision-based errors and skill-based errors.
Misdelivery is a common cause of data breaches and refers to the act of sending sensitive information to the wrong recipient. [ more ]
#people
Exchangewire
11 months ago
Marketing tech

Google Ad Tech May Break Up; Apple Threaten to Ban Damus Over Bitcoin Tipping

In today's ExchangeWire new's digest: Google may be forced to sell off part of its ad tech business; Apple threatens to remove Damus from the App Store over Bitcoin tipping; and a study finds that the majority of APAC consumers prefer dealing with companies who collect their data directly.Google may have to break up ad business
Google may have to sell part of its ad tech business after the EU Commission ruled that it had engaged in anti-competitive practices.
ComputerWeekly.com
1 year ago
Privacy professionals

NHS Highland rapped over data breach affecting HIV patients | Computer Weekly

The Information Commissioner's Office (ICO) has issued a reprimand to NHS Highland over a "serious breach of trust" after the health service inadvertently exposed personal details of patients likely to be accessing HIV services.The incident unfolded when someone at the organisation emailed 37 individuals likely to be accessing HIV services, inadvertently copying their email addresses into the carbon copy (CC) field rather than the blind carbon copy (BCC) field.
The Verge
1 year ago
Information security

1Password is trying for zero passwords

1Password is announcing today that, one day soon, it will support the option to create and unlock 1Password accounts using biometric-based passkey technology, ditching the feature that is the name of its entire product."For passkeys to be the way forward, it's not enough for them to replace some of your passwords," said 1Password chief product officer Steve Won.
www.nytimes.com
1 year ago
Tech industry

Alexa, Why Do We Keep Buying You?'

When Amazon released Alexa in 2014, the company had big dreams for the technology.The voice assistant, the company suggested, could succeed smartphones as the next essential consumer interface.Alexa, which was embedded in Amazon's voice-activated Echo smart speakers, soon became one of the most popular voice assistants, alongside Apple's Siri and Google's Assistant.
morepeople
SecurityWeek
1 year ago
Artificial intelligence

France Punishes Clearview AI For Failing To Pay Fine

France's privacy watchdog doled out further penalties to US firm Clearview AI Wednesday for failing to pay a 20-million-euro fine imposed last year over data breaches.The company collects images of faces from the internet without seeking permission and sells access to a trove of billions of pictures to clients, including law enforcement agencies.
#flexibility
Amazic
1 year ago
DevOps

Mirantis Releases New Version of Openstack for Kubernetes with Improvements in Security and User Experience - Amazic

Mirantis, cloud-native infrastructure expert, just announced the release of the latest version of their virtualized Infrastructure-as-a-Service offering, Mirantis OpenStack for Kubernetes (MOSK), with improved OpenStack security and enhanced user experience.OpenStack, the world's foremost open-source, private cloud IaaS framework, offers a feature-rich environment for hosting virtual machines, networks, and storage.
New Relic
1 year ago
DevOps

Obfuscate Logs using Fluent Bit in New Relic

If you need to protect sensitive information and follow data privacy regulations, it's critical to obfuscate your log data, which means obscuring personally identifiable information (PII).But effectively concealing PII in logs might take time to implement, can increase compute resources, and might not work well with all types of logs.
moreflexibility
#information
Ars Technica
1 year ago
Privacy professionals

T-Mobile discloses 2nd data breach of 2023, this one leaking account PINs and more

T-Mobile on Monday said it experienced a hack that exposed account PINs and other customer data in the company's second network intrusion this year and the ninth since 2018.The intrusion, which started on February 24 and lasted until March 30, affected 836 customers, according to a notification on the website of Maine Attorney General Aaron Frey.
Electronic Frontier Foundation
1 year ago
Privacy professionals

Age Verification Mandates Would Undermine Anonymity Online

Age verification systems are surveillance systems.Mandatory age verification, and with it, mandatory identity verification, is the wrong approach to protecting young people online.It would force websites to require visitors to prove their age by submitting information such as government-issued identification.
Theregister
1 year ago
Privacy professionals

Acer confirms someone broke into one of its servers

Acer has confirmed someone broke into one of its servers after a miscreant put up for sale a 160GB database of what's claimed to be the Taiwanese PC maker's confidential information."We have recently detected an incident of unauthorized access to one of our document servers for repair technicians," an Acer spokesperson told The Register on Tuesday.
www.cbc.ca
1 year ago
Canada news

Ransomware attack stole some employee data, Indigo says | CBC News

A ransomware attack compromised the data of current and former employees at Canada's biggest bookstore chain, Indigo Books & Music Inc. says.In a statement on its website, Indigo said the breach on Feb. 8 left no indication that personal customer information, such as credit card numbers, had been accessed, but that "some employee data was."
moreinformation
HousingWire
1 year ago
Real estate

Mortgage fintech Maxwell launches SSO tool for lenders

Maxwell, the mortgage fintech backed by Wells Fargo and Fin Capital, has launched Maxwell Single-Sign On, an SSO (single sign-on) tool for lenders to enhance security and reduce the risk of data breaches, the company announced on Monday.The tool is designed to address the issue of sensitive data being handled by lenders and loan officers on a daily basis, including social security numbers, paystubs, and tax returns.
Engadget
1 year ago
Privacy professionals

FBI says it has 'contained' a cybersecurity incident on its network | Engadget

STR/NurPhoto via Getty Images
The FBI is dealing with another attack on its digital infrastructure, although the severity isn't yet clear.The law enforcement agency tells CNN it has "contained" a recent cybersecurity incident on its network.The bureau isn't commenting on the perpetrator, scope or damage, but says it's gathering "additional information."
Acm
1 year ago
Digital life

NSA Says: Do These Things to Keep Your Home Network Cafe from Cyberattack

Remote working brings benefits for employees, but by working from outside the company's internal network, there's also the added threat that employees are left more vulnerable to cyberattacks.And if hackers can compromise a remote employee by stealing their corporate username and password, or infecting their computer with malware, it could become a costly network security risk for the entire organization.
Theregister
1 year ago
Privacy professionals

FBI and international cops catch a NetWire RAT

International law enforcement agencies have claimed another victory over cyber criminals, after seizing the website, and taking down the infrastructure operated by crims linked to the NetWire remote access trojan (RAT).Police in Croatia on Tuesday arrested a suspect who allegedly administered the worldwiredlabs website, which has sold the NetWire malware for several years.
Independent
1 year ago
Privacy professionals

Gardai and Fastway among those reprimanded by watchdog for data breaches in 2022

An Garda Siochana and the Fastway delivery firm are among the organisations that were reprimanded over data breaches, according to a watchdog's annual report.ardai reported a breach to the Data Protection Commission (DPC) involving the names and addresses of 108 individuals, some of whom were children, processed at Kilmainham Garda Station.
[ Load more ]