#data-breaches

[ follow ]
#cybersecurity
Privacy technologies
fromTechCrunch
2 months ago

Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunch

Stalkerware companies are continuously facing data breaches, revealing sensitive information of millions of victims.
Privacy professionals
fromDatabreaches
2 months ago

Attorney General James Sues National General and Allstate Insurance for Failing to Protect New Yorkers' Personal Information

New York AG sues National General and Allstate for data breaches exposing personal information of over 165,000 New Yorkers.
Privacy technologies
fromTechCrunch
2 months ago

Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunch

The stalkerware industry faces significant cybersecurity issues, with multiple breaches leading to massive data exposures.
Stalkerware apps expose sensitive user data, posing severe privacy risks for victims.
Growth hacking
fromThe Hacker News
2 months ago

How New AI Agents Will Transform Credential Stuffing Attacks

Credential stuffing attacks soared in 2024, driven by infostealer infections and a rise in stolen credentials, complicating online security significantly.
Privacy technologies
fromTechCrunch
2 months ago

Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunch

Stalkerware companies are continuously facing data breaches, revealing sensitive information of millions of victims.
Privacy professionals
fromDatabreaches
2 months ago

Attorney General James Sues National General and Allstate Insurance for Failing to Protect New Yorkers' Personal Information

New York AG sues National General and Allstate for data breaches exposing personal information of over 165,000 New Yorkers.
Privacy technologies
fromTechCrunch
2 months ago

Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunch

The stalkerware industry faces significant cybersecurity issues, with multiple breaches leading to massive data exposures.
Stalkerware apps expose sensitive user data, posing severe privacy risks for victims.
Growth hacking
fromThe Hacker News
2 months ago

How New AI Agents Will Transform Credential Stuffing Attacks

Credential stuffing attacks soared in 2024, driven by infostealer infections and a rise in stolen credentials, complicating online security significantly.
Information security
fromThe Hacker News
2 weeks ago

Third Parties and Machine Credentials: The Silent Drivers Behind 2025's Worst Breaches

Third-party exposure and machine credential abuse significantly contributed to data breaches, necessitating comprehensive identity governance for both human and machine identities.
#cybercrime
Information security
fromDatabreaches
2 months ago

Criminal hacker known as ALTDOS, DESORDEN, GHOSTR and 0mid16B arrested

A notorious hacker known for multiple aliases has been arrested after a long-term cybercrime campaign targeting sensitive data for extortion.
fromHackernoon
1 year ago
Privacy professionals

Where Were You When the World Shut Down? I Was on BreachForums. | HackerNoon

Information security
fromDatabreaches
2 months ago

Criminal hacker known as ALTDOS, DESORDEN, GHOSTR and 0mid16B arrested

A notorious hacker known for multiple aliases has been arrested after a long-term cybercrime campaign targeting sensitive data for extortion.
fromHackernoon
1 year ago
Privacy professionals

Where Were You When the World Shut Down? I Was on BreachForums. | HackerNoon

#data-protection
EU data protection
fromDatabreaches
2 months ago

Hundreds of Dutch medical records bought for pocket change at flea market

A man discovered sensitive medical records on discarded hard drives bought at a flea market in the Netherlands.
EU data protection
fromDatabreaches
2 months ago

Hundreds of Dutch medical records bought for pocket change at flea market

A man discovered sensitive medical records on discarded hard drives bought at a flea market in the Netherlands.
Information security
fromSecuritymagazine
1 month ago

Why every business needs a data security strategy

Data breaches expose sensitive information, necessitating robust data security measures to prevent financial loss, reputational damage, and compliance violations.
Privacy professionals
fromDatabreaches
2 months ago

Privilege Under Pressure: The Shifting Data Breach Investigation Landscape

Federal courts are reducing protections for forensic reports in data breaches.
Communications with forensic firms may not be protected by privilege.
Careful communication strategies are essential in breach investigations.
fromwww.eff.org
4 months ago

Digital Rights and the New Administration | EFFector 37.1

This edition of the newsletter covers our tongue-in-cheek 'awards' for some of the worst data breaches in 2024, The Breachies; an explanation of 'real-time bidding,' the most privacy-invasive surveillance system you may have never heard of.
Privacy professionals
[ Load more ]