Updated news, analysis and everything else you need to know about the Target data breach *New articles added 12/23* Millions of Target shoppers woke up Thursday to news headlines that their credit or debit card information may have been compromised in the last month while shopping at the massive retailer.Target, which confirmed the breach, said as many as 40 million accounts may have been impacted, and that the that the attackers behind the breach were active between November 27 and December 15.CSO’s news team is carefully following the developments of this story as it unfolds. Here is a comprehensive guide from CSO writers and contributors of news and analysis about the Target breach.Target customer data said to be at risk after store thefts Target falls victim to data compromiseTarget confirms breach, but shoppers should keep a cool headAttention Target shoppers: What you need to know about the credit breachSalted Hash: Target breach never should’ve happenedHow to explain the Target breach to friends, family and coworkersInside knowledge likely in Target breach, experts sayRaising awareness quickly: The aftermath of Target’s data breach 5 Things you should do to protect yourself from Target data breach Related content news analysis Cisco unveils AI-powered assistants to level up security defenses New AI-driven tools aim to simplify and bolster policies, alerts and prevention to reduce complexity when setting security policies and assess traffic without decryption. By Rosalyn Page Dec 05, 2023 5 mins Encryption Cloud Security brandpost Sponsored by Microsoft Security How Microsoft and Amazon are expanding the fight against international tech support fraud By partnering with other companies to share vital information and resources, Microsoft is taking the fight to ever-evolving support fraud in 2024…and beyond. By Microsoft Security Dec 05, 2023 1 min Security news analysis Russia's Fancy Bear launches mass credential collection campaigns The campaigns exploit Outlook and WinRAR flaws to target government, defense, and other entities, and they represent a change of tactic for the APT28 group. By Lucian Constantin Dec 05, 2023 5 mins Advanced Persistent Threats Critical Infrastructure Vulnerabilities brandpost Sponsored by Palo Alto Networks Addressing vulnerabilities in OT environments requires a Zero Trust approach Here’s a rundown of why manufacturers are so exposed and how Zero Trust can help solve many security issues. By Navneet Singh, vice president of marketing, network security, Palo Alto Networks Dec 05, 2023 6 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe