Data Breach

Data Breach | News, how-tos, features, reviews, and videos

cso security breach hack gettyimages 966835276 by metamorworks
binary highway

A man casts the shadow of an ominous hooded figure against a circuit-based wall.

JHL Biotech's theft of Genentech data holds lessons for infosec

Genentech employees stole the company's data on behalf of JHL Biotech for years. What could they have done to spot the theft sooner?

cso security hack breach gettyimages 691171106 by peopleimages 2400x1600px

Cash App customer investment data hacked

The backers of the popular consumer payments app announced Monday that millions of customers are being contacted to warn that some of their personal information may have been compromised.

ransomware healthcare breach hacker

Hive ransomware group claims Partnership HealthPlan of California data breach

The group, known for attacks on healthcare organizations, claims to have stolen 850,000 personally identifiable information records from Partnership HealthPlan of California.

cso security hacker breach privacy ransomware malware attack gettyimages 1216075693 by towfiqu aham

LAPSUS$ ransomware group claims Okta breach

The ransomware group claims that it has had access to customer records since January 2022; Okta says there is no evidence of ongoing malicious activity.

Targeting user behavior.

SEC plans four-day cybersecurity breach notification requirement

The US stock market regulator wants to tighten reporting requirements for security breaches at publicly traded firms.

cso security hack breach gettyimages 691171106 by peopleimages 2400x1600px

Extortion group teases 190GB of stolen data as Samsung confirms security breach

LAPSUS$ data extortion group claims to have a huge collection of confidential data stolen from Samsung Electronics, which has confirmed a security breach.

adding processor to circuit board computer hardware

Nvidia hackers release code-signing certificates that malware can abuse

Researchers have already found example of malicious files signed with the stolen certificates.

green army soldier on a laptop keyboard

Purported massive leak of Russian soldiers' data could sink morale, digital security

The publication of personal data on 120,000 Russian soldiers, if accurate, could provide a means to demoralize troops in Ukraine and make them targets for cyber campaigns.

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties, and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.3 billion and counting.

8 data protection gdpr

European nations issue record €1.1 billion in GDPR fines

Authorities across Europe issued huge amounts in GDPR fines during 2021. Luxembourg and Ireland took up the top spots, replacing Italy and Germany.

woman holding playbook guide book guide binary by undefined undefined getty images

Three recent events prove the need for an insider risk playbook

Pfizer, Ubiquiti and Code42 all faced real or potential insider threats that could have been a lot worse if they did not have a plan to deal with them.

A stressed businessman with head in hand sits at a desk and computer in an office workspace.

The emotional stages of a data breach: How to deal with panic, anger, and guilt

Intense situations require both the security experts and stakeholders to be calm and focused, but that is easier said than done. This advice can help.

human weak link cybersecurity primary

Supply chain attacks show why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

online shopping cart magecart hackers shopping online

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world

Ubiquiti breach an inside job, says FBI and DoJ

Investigators claim Ubiquiti employee Nikolas Sharp stole company data and then played the role of whistleblower to draw attention away from is actions.

insurance

Cyber insurance explained and why you need it

Cyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.

Security threat   >   One endpoint on a network has been compromised.

GoDaddy WordPress data breach: A timeline

Domain registrar GoDaddy recently announced a data breach impacting 1.2 million customers via its Managed WordPress hosting environment. Here's how the breach is unfolding.

cyber attack alert / data breach

5 steps to security incident response planning

Most firms will experience a breach or vulnerability that exposes sensitive data. Minimizing impact on business and reputation depends on having a strong response plan before an incident happens.

Load More
You Might Also Like