Data Breach

Data Breach | News, how-tos, features, reviews, and videos

binary highway

Uber CISO's trial underscores the importance of truth, transparency, and trust

The criminal trial offers a lesson in the value of both CISOs and organizations adhering to a policy of truth, transparency and trust when it comes to security.

A man casts the shadow of an ominous hooded figure against a circuit-based wall.

JHL Biotech's theft of Genentech data holds lessons for infosec

Genentech employees stole the company's data on behalf of JHL Biotech for years. What could they have done to spot the theft sooner?

cso security hack breach gettyimages 691171106 by peopleimages 2400x1600px

Cash App customer investment data hacked

The backers of the popular consumer payments app announced Monday that millions of customers are being contacted to warn that some of their personal information may have been compromised.

cso security hacker breach privacy ransomware malware attack gettyimages 1216075693 by towfiqu aham

LAPSUS$ ransomware group claims Okta breach

The ransomware group claims that it has had access to customer records since January 2022; Okta says there is no evidence of ongoing malicious activity.

Targeting user behavior.

SEC plans four-day cybersecurity breach notification requirement

The US stock market regulator wants to tighten reporting requirements for security breaches at publicly traded firms.

cso security hack breach gettyimages 691171106 by peopleimages 2400x1600px

Extortion group teases 190GB of stolen data as Samsung confirms security breach

LAPSUS$ data extortion group claims to have a huge collection of confidential data stolen from Samsung Electronics, which has confirmed a security breach.

adding processor to circuit board computer hardware

Nvidia hackers release code-signing certificates that malware can abuse

Researchers have already found example of malicious files signed with the stolen certificates.

green army soldier on a laptop keyboard

Purported massive leak of Russian soldiers' data could sink morale, digital security

The publication of personal data on 120,000 Russian soldiers, if accurate, could provide a means to demoralize troops in Ukraine and make them targets for cyber campaigns.

8 data protection gdpr

European nations issue record €1.1 billion in GDPR fines

Authorities across Europe issued huge amounts in GDPR fines during 2021. Luxembourg and Ireland took up the top spots, replacing Italy and Germany.

man looking through binocs spy hacker breach infiltrate gettyimages 164644457 by selimaksan 2400x16

A tale of two breaches: Bunnings and the South Australia government

Minimising data collection limited the data exposure from third-party compromise at one of the victims.

woman holding playbook guide book guide binary by undefined undefined getty images

Three recent events prove the need for an insider risk playbook

Pfizer, Ubiquiti and Code42 all faced real or potential insider threats that could have been a lot worse if they did not have a plan to deal with them.

A stressed businessman with head in hand sits at a desk and computer in an office workspace.

The emotional stages of a data breach: How to deal with panic, anger, and guilt

Intense situations require both the security experts and stakeholders to be calm and focused, but that is easier said than done. This advice can help.

human weak link cybersecurity primary

Supply chain attacks show why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

online shopping cart magecart hackers shopping online

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world

Ubiquiti breach an inside job, says FBI and DoJ

Investigators claim Ubiquiti employee Nikolas Sharp stole company data and then played the role of whistleblower to draw attention away from is actions.

Security threat   >   One endpoint on a network has been compromised.

GoDaddy WordPress data breach: A timeline

Domain registrar GoDaddy recently announced a data breach impacting 1.2 million customers via its Managed WordPress hosting environment. Here's how the breach is unfolding.

cso security fist hacker breach gettyimages 163928143 by smitt 2400x1600px

Australian firms are confident about withstanding cyberattacks—should they be?

A survey shows breach costs have gone down, but the reasons are unclear. And the cost of customer data lost through supplier breaches is rising.

cyber attack alert / data breach

5 steps to security incident response planning

Most firms will experience a breach or vulnerability that exposes sensitive data. Minimizing impact on business and reputation depends on having a strong response plan before an incident happens.

broken binary code matrix / breached / failed / hacked

Twitch breach highlights dangers of choosing ease of access over security

Attackers essentially broke into the Twitch house and cleaned out everything. Following least-privilege access principles and encrypted datasets will help others avoid that scenario.

A magnifying lens examines top secret information amid binary code.

How corporate data and secrets leak from GitHub repositories

Attackers constantly search public code repositories like GitHub for secrets developers might inadvertently leave behind, and any tiny mistake can be exploited.

Load More
You Might Also Like