Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunchStalkerware companies are continuously facing data breaches, revealing sensitive information of millions of victims.
Identity: The New Cybersecurity BattlegroundIdentity vulnerabilities are the primary attack vector for cyber threats, necessitating modernized security strategies.
The biggest data breaches of 2025 - so far | TechCrunch2025 is poised to exceed previous years in data breaches, with significant incidents already reported affecting millions.
Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunchThe stalkerware industry faces significant cybersecurity issues, with multiple breaches leading to massive data exposures.Stalkerware apps expose sensitive user data, posing severe privacy risks for victims.
How New AI Agents Will Transform Credential Stuffing AttacksCredential stuffing attacks soared in 2024, driven by infostealer infections and a rise in stolen credentials, complicating online security significantly.
Bluesight's 2025 Breach Barometer Report Reveals Surge in Healthcare Data BreachesMore than 300 million patient records were breached in 2024, a 26% increase from 2023, underscoring the growing cybersecurity challenges in healthcare.
Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunchStalkerware companies are continuously facing data breaches, revealing sensitive information of millions of victims.
Identity: The New Cybersecurity BattlegroundIdentity vulnerabilities are the primary attack vector for cyber threats, necessitating modernized security strategies.
The biggest data breaches of 2025 - so far | TechCrunch2025 is poised to exceed previous years in data breaches, with significant incidents already reported affecting millions.
Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunchThe stalkerware industry faces significant cybersecurity issues, with multiple breaches leading to massive data exposures.Stalkerware apps expose sensitive user data, posing severe privacy risks for victims.
How New AI Agents Will Transform Credential Stuffing AttacksCredential stuffing attacks soared in 2024, driven by infostealer infections and a rise in stolen credentials, complicating online security significantly.
Bluesight's 2025 Breach Barometer Report Reveals Surge in Healthcare Data BreachesMore than 300 million patient records were breached in 2024, a 26% increase from 2023, underscoring the growing cybersecurity challenges in healthcare.
Criminal hacker known as ALTDOS, DESORDEN, GHOSTR and 0mid16B arrestedA notorious hacker known for multiple aliases has been arrested after a long-term cybercrime campaign targeting sensitive data for extortion.
Hacker Who Targeted NATO, US Army Arrested in SpainAn 18-year-old hacker suspected of breaching over 40 organizations has been arrested in Spain.
Idaho man who hacked medical entities and made vile threats sentenced to 10 years in prisonAn Idaho IT specialist was imprisoned for hacking medical offices and extorting ransom, exposing vulnerabilities in healthcare cybersecurity.
Criminal hacker known as ALTDOS, DESORDEN, GHOSTR and 0mid16B arrestedA notorious hacker known for multiple aliases has been arrested after a long-term cybercrime campaign targeting sensitive data for extortion.
Hacker Who Targeted NATO, US Army Arrested in SpainAn 18-year-old hacker suspected of breaching over 40 organizations has been arrested in Spain.
Idaho man who hacked medical entities and made vile threats sentenced to 10 years in prisonAn Idaho IT specialist was imprisoned for hacking medical offices and extorting ransom, exposing vulnerabilities in healthcare cybersecurity.
Privilege Under Pressure: The Shifting Data Breach Investigation LandscapeFederal courts are reducing protections for forensic reports in data breaches.Communications with forensic firms may not be protected by privilege.Careful communication strategies are essential in breach investigations.
Hundreds of Dutch medical records bought for pocket change at flea marketA man discovered sensitive medical records on discarded hard drives bought at a flea market in the Netherlands.
Product Walkthrough: How Satori Secures Sensitive Data From Production to AISecuring sensitive data is increasingly difficult due to rapid data growth, changing user roles, and stricter compliance requirements.
Hundreds of Dutch medical records bought for pocket change at flea marketA man discovered sensitive medical records on discarded hard drives bought at a flea market in the Netherlands.
Product Walkthrough: How Satori Secures Sensitive Data From Production to AISecuring sensitive data is increasingly difficult due to rapid data growth, changing user roles, and stricter compliance requirements.
FTC Finalizes Order with Marriott and Starwood Requiring Them to Implement a Robust Data Security Program to Address Security FailuresMarriott and Starwood must implement a comprehensive information security program after FTC breaches affected over 344 million customers.
3 reasons to consider a data security posture management platformData security is crucial due to the increasing number of breaches, requiring effective management practices such as DSPM.
FTC orders Marriott to implement information security programMarriott must enhance its data security practices following FTC allegations of failures that led to massive data breaches affecting millions.
FTC Finalizes Order with Marriott and Starwood Requiring Them to Implement a Robust Data Security Program to Address Security FailuresMarriott and Starwood must implement a comprehensive information security program after FTC breaches affected over 344 million customers.
3 reasons to consider a data security posture management platformData security is crucial due to the increasing number of breaches, requiring effective management practices such as DSPM.
FTC orders Marriott to implement information security programMarriott must enhance its data security practices following FTC allegations of failures that led to massive data breaches affecting millions.
Digital Rights and the New Administration | EFFector 37.1The EFFector newsletter updates readers on digital rights, with features like annual data breach awards and insights into privacy issues.
Happy Holidays from DataBreaches.net!DataBreaches.net prioritizes integrity and transparency in its reporting.
Marriott and Starwood hotels will have to get better at data securityMarriott and Starwood mandated to enhance digital security due to FTC findings of lax practices during significant data breaches.
UT Southwestern Medical Center has disclosed at least four breaches since July 2023. Is HHS investigating?Multiple patient data breaches increase scrutiny from HHS OCR regarding compliance with HIPAA Security Rule.
Is your phone infected with Pegasus spyware? This $1 app can checkSmartphone security threats, including Pegasus spyware, are significant concerns, with recent findings highlighting infections in user devices.iVerify offers an accessible tool for regular users to check their smartphones for vulnerabilities.
Data breaches: Preventing and respondingData breaches are escalating due to expanded attack surfaces as organizations digitize and embrace remote access.
In 2025: Identities conquer, and hopefully unite | Computer WeeklyCyber security threats are evolving rapidly due to the rise of AI, necessitating new strategies for access control and risk management.
Data breaches: Preventing and respondingData breaches are escalating due to expanded attack surfaces as organizations digitize and embrace remote access.
In 2025: Identities conquer, and hopefully unite | Computer WeeklyCyber security threats are evolving rapidly due to the rise of AI, necessitating new strategies for access control and risk management.
HHS OCR settles charges that Inmediata Health Group exposed 1.6 million patients' PHI onlineHealth care entities must proactively secure patient information to prevent unauthorized online access, as per HHS OCR announcements.
Leiden University study tracks misconfigurations at 215 companiesProper configuration of cloud storage services is crucial to prevent data breaches.Misconfigurations can expose sensitive information, affecting various sectors.Human error is often the main cause of vulnerabilities in cloud storage.
Are Long-Lived Credentials the New Achilles' Heel for Cloud Security?Enterprises in Australia and APAC must phase out long-lived credentials to mitigate significant cloud security risks, as they remain a serious threat.
IAM: Enterprises face a long, hard road to improve | Computer WeeklyEffective identity and access management (IAM) is crucial for balancing security and ease of use in enterprises.
Are Long-Lived Credentials the New Achilles' Heel for Cloud Security?Enterprises in Australia and APAC must phase out long-lived credentials to mitigate significant cloud security risks, as they remain a serious threat.
IAM: Enterprises face a long, hard road to improve | Computer WeeklyEffective identity and access management (IAM) is crucial for balancing security and ease of use in enterprises.
Organizations are blind to their software supply chainMost organizations lack visibility in their software supply chains, leading to increased security risks.Implementing a Software Bill of Materials is crucial for supply chain security.