Search Results

Showing 1-11 of 11 results.


Data or system breach mitigation


Russian Cybercrime Forum 'Maza' Suffers Data Breach

Maza, a Russian carding and fraud discussion forum, has been breached, and hackers have leaked users' email addresses and forum credentials, security firms report.

Bank Info Security

Anatomy of a $2 Million Darkside Ransomware Breach

Days before the Darkside ransomware creators formally launched their business with a press release last August, a U.S. victim was already preparing to pay them a $2 million ransom.

Zetter Substack

United Nations’ Computers Breached by Hackers Earlier This Year

Hackers breached the United Nations’ computer networks earlier this year and made off with a trove of data that could be used to target agencies within the intergovernmental organization.


EA Games Hacked: Hackers Breach And Steal Game Source Code

Electronic Arts, the publisher of popular video games such as FIFA, Medal of Honor got its game source code stolen. Read on about the EA games that got hacked.

Republic World

It Might Be Our Data, But It’s Not Our Breach

A cybersecurity firm says it has intercepted a large, unique stolen data set containing the names, addresses, email addresses, phone numbers, Social Security Numbers and dates of birth on nearly 23 million Americans.

Krebs on Security

Investigators Suggest Hackers Exploited Weak Password Security to Breach Florida Water Facility

A clearer picture of poor security practices in Oldsmar, Florida prior to the dangerous hack of its water treatment plant is beginning to emerge, even as an investigation into the matter continues one week after the incident.


Endpoint Security and Network Monitoring News for the Week of November 4; Cobalt, Akto, SafeBreach, and More

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task.

Solutions Review

Are Biometrics Any Safer than Old-Fashioned Passwords? With “Deep Nude” Tech, Sextortionists Run Rampant in India. Montrose Regional Health Data Breach.

Though many consider the use of biometric data like iris scans or fingerprints for login credentials a more secure method than traditional passwords, the fact is that biometric data, just like passwords, are ultimately turned into code, which can be easily exfiltrated by attackers.

The CyberWire