All Security Breaches and Attacks articles – Page 10
-
News
Connecticut gives companies some protection from cyber security breaches
The governor of Connecticut, Ned Lamont, has signed into law legislation which protects businesses from punitive damages if personal or restricted information is improperly accessed.
-
News
Client info stolen in Morgan Stanley data breach
Personal information belonging to clients of the leading investment bank Morgan Stanley have been stolen following a data breach stemming from a vulnerability in one of its third-party IT suppliers.
-
News
German council paralysed by country’s first cyber catastrophe
Computer-based operations at the local authority serving Anhalt-Bitterfeld district in eastern Germany have virtually ground to a halt after being hacked.
-
News
UK transgender charity fined for data breach
The Information Commissioner’s Office (ICO) in the UK has imposed a financial penalty of £25,000 ($34,600, €29,200) on transgender charity Mermaids for failing to keep personal data of its users secure
-
News
Garante serves up change for Foodinho
Food delivery company Foodinho has to amend how it processes riders’ data through a digital platform, says Italy’s data protection authority Garante.
-
News
British Airways settles data breach case
UK airline British Airways has resolved on confidential terms litigation brought by customers and staff affected by a leakage of personal information in 2018.
-
News
Beijing cracks down on ride-hailing app Didi
Chinese regulators have told Didi Global to stop taking new registrations and ordered its app be removed from China’s app stores pending a cyber security review.
-
News
Air India sued following data breach of 4.5m passengers
An Air India customer has filed a lawsuit for damages against the company following the leak of 4.5m passengers’ personal data earlier this year.
-
News
New Zealand patients’ data appears on web
Personal information of hospital patients and staff in New Zealand have been published online, around six weeks after a ransomware attack on the Waikato District Health Board (DHB).
-
News
Data for 700M LinkedIn users for sale
Just two months after LinkedIn was the subject of a government probe after data on 500 million of its users was scraped and published online, a new posting with 700 million LinkedIn records has appeared.
-
Sponsored
4 Ways to Strengthen Cybersecurity for a Hybrid Workforce
Workplace tech used to be a lot more uniform: When you walked into an office, you likely saw an all-desktop-PC environment with a fairly consistent suite of software and tools, all used within the confines of a single network.
-
News
Mercedes-Benz customer data exposed online
Sensitive personal information of Mercedes-Benz customers and would-be customers in the US from around six years ago has been made accessible on a cloud storage platform.
-
News
Microsoft detects new security breach
An attacker gained access to a Microsoft customer service agent and used the information gained to launch hacking attempts against customers.
-
Video
Politics, Economics, Social: Russia’s State-Led Cyber Espionage and Influence Operations
Whether it be the SolarWinds attack, the 2016 US election interference, or a number of other cyber operations over the past few years, there’s a growing perception/reality that Russia is increasingly flexing its cyber muscles internationally, using the lessons its learned through years of focused cyber-attacks and influence operations in Ukraine and other regional adversaries.
-
Video
Third Party Risk Management: Cybersecurity Expertise into Board Governance and a Company’s Digital Defense
As companies the world over grapple with the rising cyber security threat, is it now time to have a director in charge of cybersecurity in the boardroom? If so, how do you ensure you find the right person.
-
Video
IT vs OT: Is There Too Much Operational Technology Online for Hackers?
The attack on the Colonial Pipeline was one of the most major hacks in the history of critical infrastructure. But, this was not a hack on Colonial Pipeline’s IT, but their Operational Technology. The pipeline, which normally carries 2.5m barrels a day, is digital in terms of its operations.
-
Video
Women and Diversity in Cybersecurity: Why Are We Still Having this Conversation?
Recent research by Tessian found that a higher proportion of young men were likely to consider a career in cyber security than young women.
-
Video
Engaging Your Line of Business for Cybersecurity Initiatives
Security cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities.
-
Video
How to Prevent Credential Stuffing Attacks While Managing Risk and Trust
Credential stuffing is a brute force attack that can be low-risk, high-reward for cyber criminals. This panel will debate the defence techniques that can be used to guard against this threat.
-
News
Covid-19 ‘has permanently altered cyber risks’
The threat landscape reached a critical tipping point during the height of the coronavirus pandemic, changing cyber security forever, says SonicWall.