Email Attacks a Problem for National Infrastructure Companies

Email Attacks a Problem for National Infrastructure Companies

Cyber attackers are repeatedly using malicious emails to infiltrate critical national infrastructure. Up to 80% of CNI companies experienced an email-related security breach in the last year, according to a new report from security solution provider OPSWAT. Compromising CNI, like utilities, transport, telecommunications, and now data centres, can lead to widespread disruption, making it a prime target for cyber attacks. A recent report from Malwarebytes found that the services industry is the worst affected by…

Read More

Security leaders discuss the National Public Data breach

Security leaders discuss the National Public Data breach

National Public Data, a background checking organization, experienced a breach potentially affecting 2.9 billion individuals. The breach exposed personally identifiable information (PII) such as names, phone numbers, mailing addresses, email addresses and Social Security numbers.  “Organizations rely on the exchange of data for their vitality,” says Clyde Williamson, Product Management, Innovations at Protegrity. “Consumers share their personal identifiable information (PII) like Social Security numbers and emails with the expectation that businesses will protect this data…

Read More

Report Highlights Rising Risks in Sensitive Data Management

Report Highlights Rising Risks in Sensitive Data Management

The volume of sensitive data that companies are harbouring in non-production environments, like development, testing, analytics, and AI/ML, is rising, according to a new report. Executives are also getting more concerned about protecting it — and feeding it into new AI products is not helping. The “Delphix 2024 State of Data Compliance and Security Report” found that 74% of organisations that handle sensitive data increased the volume kept in non-production, also known as lower, environments…

Read More

National Public Data Breach: 2.7bn Records Leaked on Dark Web

National Public Data Breach: 2.7bn Records Leaked on Dark Web

In August, a hacker dumped 2.7 billion data records, including social security numbers, on a dark web forum, in one of the biggest breaches in history. The data may have been stolen from background-checking service National Public Data at least four months ago. Each record has a person’s name, mailing address, and SSN, but some also contain other sensitive information, such as names of relatives, according to Bloomberg. How the data was stolen This breach…

Read More

Australian Organisations Experiencing Highest Rate of Data Breaches, Reports Rubrik

Australian Organisations Experiencing Highest Rate of Data Breaches, Reports Rubrik

Australian organisations have reported the highest rate of data breaches compared with global markets in 2023, according to a new survey. However, they were less likely than their global peers to experience a “significant” cyber attack. Australia’s quicker adoption of technologies, including cloud computing, is part of the story, according to backup and recovery firm Rubrik. The company has urged Australian organisations to review their backups to improve cyber resilience. Approximately 8 in 10 Australian…

Read More

Data breach victims increased by 490% since the first half of 2023

Data breach victims increased by 490% since the first half of 2023

The Identity Theft Resource Center (ITRC) has released a report analyzing H1 data breach incidents for 2024. According to the report, there was a 490% rise in data breach victims in H1 of 2024 compared to H1 of 2023. Yet, Q2 had 732 publicly reported data breaches, which represents a 12% decrease from Q1.  Security leaders weigh in  Stephen Kowski, Field CTO at SlashNext:  “The surge in breach victims is likely due to several large-scale…

Read More

Security leaders respond to the AT&T data breach

Security leaders respond to the AT&T data breach

On July 12, 2024, AT&T announced the records of calls and text messages of almost all AT&T cellular customers were compromised via a third-party cloud platform. According to a statement made by AT&T, the compromised data does not contain the content of the calls and text messages. It also does not contain personally identifiable information such as Social Security numbers, dates of birth or customer names. At this time, AT&T states there is no indication…

Read More

AT&T Hack Exposed ‘Nearly All’ Customer Phone Numbers

AT&T Hack Exposed ‘Nearly All’ Customer Phone Numbers

AT&T disclosed today that data from “nearly all” of its customers from May 1, 2022 to October 31, 2022 and on January 2, 2023 was exfiltrated to a third-party platform in April 2024. Customers whose data was exposed will be informed. AT&T said the access point through which the cyberattack was conducted has been secured, and the data is no longer available. Threat actor accessed phone numbers and call durations According to AT&T, the threat…

Read More

RockYou2024: Unpacking the Largest Password Leak in History | McAfee Blog

RockYou2024: Unpacking the Largest Password Leak in History | McAfee Blog

This Fourth of July brought fireworks in the form of a digital security breach, one that has been recorded as the most significant password leak in history. Dubbed RockYou2024, this colossal data dump was unveiled by a user named “ObamaCare” on a prominent hacking forum, revealing a staggering 9.9 billion unique passwords in plain text. The Scale of RockYou2024 The sheer volume of compromised passwords is enough to make any security enthusiast’s head spin. RockYou2024…

Read More

New APT Group

New APT Group

Jul 08, 2024NewsroomCyber Espionage / Cloud Security A previously undocumented advanced persistent threat (APT) group dubbed CloudSorcerer has been observed targeting Russian government entities by leveraging cloud services for command-and-control (C2) and data exfiltration. Cybersecurity firm Kaspersky, which discovered the activity in May 2024, said the tradecraft adopted by the threat actor bears similarities with that of CloudWizard, but pointed out the differences in the malware source code. The attacks wield an innovative data-gathering program…

Read More
1 2 3 4 25