Data Breach

Data Breach | News, how-tos, features, reviews, and videos

online shopping cart magecart hackers shopping online
broken binary code matrix / breached / failed / hacked

A magnifying lens examines top secret information amid binary code.

How corporate data and secrets leak from GitHub repositories

Attackers constantly search public code repositories like GitHub for secrets developers might inadvertently leave behind, and any tiny mistake can be exploited.

woman with hands over face mistake oops embarrassed shy by marisa9 getty

Human errors compromising Australian government data more than cybercriminals

Mistakes caused 74% of government agencies’ reported data breaches, the latest OAIC report shows, even as other industries averaged about 30%.

shutterstock editorial 11801637u tmobile

The T-Mobile data breach: A timeline

Telecommunications giant T-Mobile warns data belonging to almost 50 million individuals has been exposed. Here is a timeline of the data breach and its ramifications.

shutterstock editorial 11281853b tmobile sign

How attackers could exploit breached T-Mobile user data

Follow-on attacks using stolen T-Mobile data are a real risk for victims. Here's how attackers can leverage that data to compromise accounts or launch phishing campaigns.

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

Insider threats  >  Employees suspiciously peering over cubicle walls

Security firm COO indicted for allegedly aiding hospital's attackers: What CSOs should know

A grand jury has indicted Securolytics COO Vikas Singla for allegedly helping attackers access Gwinnett Medical Center's phone system and printers. This breach of trust presents a dilemma for CISOs.

7 response plan be prepared are you ready typewriter

10 things to do now to reduce the cost of your next data breach

Taking these steps will save money, time, and reputation when that next breach hits.

Social engineering / social media security / privacy breach / fraud

How cybercriminals turn ‘harmless’ stolen or leaked data into dollars

By merging data from multiple sources, cybercriminals can build profiles of hacked account owners to enable other attacks or increase the effectiveness of social engineering campaigns.

tc vcmar routh

Lessons from the SolarWinds attack on securing the software supply chain

The SolarWinds breach represents a tectonic shift in threat actor tactics, suggesting this kind of attack vector will be replicated. Not only were the attacker’s sophistication and technical proficiency high -- allowing them to stay...

vcmar harknett richard

The politics and policy of SolarWinds

Richard Harknett, PhD., Co-Director of the Ohio Cyber Range Institute, has examined the SolarWinds hack that’s not only dominated the news for months, but is defined by the level of sophistication, persistence, and patience exhibited...

8 getting breached is bad for business

Minimizing damage from a data breach: A checklist

How you respond to a data breach and the amount of damage it causes depends on how well prepared you are. Have you done everything on this list?

vcmar global copy

SolarWinds, ransomware, critical infrastructure and more: CSO’s editors discuss regional challenges around the world

Today’s security challenges – from Solarwinds to ransomware, regulation, hybrid workforces, data privacy, critical infrastructure and more -- pose unique risks to various global regions. Join us as CSO’s editors around the world...

backdoor / abstract security circuits, locks and data blocks

5 questions CISOs should be able to answer about software supply chain attacks

The SolarWinds attack put a spotlight on the threats that compromised third-party software present organizations. Here are the top questions executive management, boards and partners are asking CISOs about their preparedness.

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties, and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.3 billion and counting.

Targeting user behavior.

Accellion file-sharing breach claims more Australian victims

Regulators, key agencies counting the cost as cybercriminals flaunt stolen data.

cso security hacker breach shadowy figure with briefcase by jordidelgado getty images 2400x1600px

Australian data breaches could lead to $86 billion in fines if prosecuted

As OAIC reports 539 more breaches during 2020, penalties put a price on their psychological harm.

human weak link cybersecurity primary

Supply chain attacks show why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

Load More
You Might Also Like