DATA OR SYSTEM DATA BREACH
Data or system breach mitigationSolution
Russian Cybercrime Forum 'Maza' Suffers Data Breach
Maza, a Russian carding and fraud discussion forum, has been breached, and hackers have leaked users' email addresses and forum credentials, security firms report.
Anatomy of a $2 Million Darkside Ransomware Breach
Days before the Darkside ransomware creators formally launched their business with a press release last August, a U.S. victim was already preparing to pay them a $2 million ransom.
United Nations’ Computers Breached by Hackers Earlier This Year
Hackers breached the United Nations’ computer networks earlier this year and made off with a trove of data that could be used to target agencies within the intergovernmental organization.
EA Games Hacked: Hackers Breach And Steal Game Source Code
Electronic Arts, the publisher of popular video games such as FIFA, Medal of Honor got its game source code stolen. Read on about the EA games that got hacked.
It Might Be Our Data, But It’s Not Our Breach
A cybersecurity firm says it has intercepted a large, unique stolen data set containing the names, addresses, email addresses, phone numbers, Social Security Numbers and dates of birth on nearly 23 million Americans.
Investigators Suggest Hackers Exploited Weak Password Security to Breach Florida Water Facility
A clearer picture of poor security practices in Oldsmar, Florida prior to the dangerous hack of its water treatment plant is beginning to emerge, even as an investigation into the matter continues one week after the incident.
Endpoint Security and Network Monitoring News for the Week of November 4; Cobalt, Akto, SafeBreach, and More
Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task.
Are Biometrics Any Safer than Old-Fashioned Passwords? With “Deep Nude” Tech, Sextortionists Run Rampant in India. Montrose Regional Health Data Breach.
Though many consider the use of biometric data like iris scans or fingerprints for login credentials a more secure method than traditional passwords, the fact is that biometric data, just like passwords, are ultimately turned into code, which can be easily exfiltrated by attackers.