Data breach
Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program
In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key ...
3 Tips to Protect Employees From External Exploitation Threats
Here's how credentialed insider attacks work and how to avoid situations where user negligence can lead to successful attacks ...
Third Party Lets Pepsi Data Out of the Bottle, PII Nicked
Current and former contractors and employees at Pepsi Bottling Ventures LLC (PBV) were victims of a security incident that exposed their personal information ...
The Biggest Data Breach in Australian History: An awakening for Organizations
The biggest data breach in 2023 so far was at Latitude Financial, an Australian financial services company. The breach, discovered in March 2023, exposed the personal information of more than 14 million ...
Data Breaches in June 2023 – Infographic
A data breach is when sensitive, protected, or confidential information is accessed, stolen, or exposed by an unauthorized individual or group. These incidents can occur in various ways, such as hacking, theft, ...
MOVEit Cyberattack, The Problem with Password Rotations, Military Alert on Free Smartwatches
Several major organizations, including British Airways and the BBC, fell victim to the recent MOVEit cyberattack. We discuss the alarming trend of hackers targeting trusted suppliers to gain access to customer data, ...
How Advances in IT Security are Assisting in The Fight Against Data Breaches
With the rise of the digital age, businesses have experienced unprecedented growth and opportunities. Advanced technology has streamlined processes and provided practical access to global markets. However, alongside these benefits, there is ...
Ironic: LetMeSpy Spyware Hackers Were Hacked (by Hackers)
Content warning: Abuse, stalking, controlling behavior, Schadenfreude, irony, doxxing ...
What is RepoJacking and How Organizations are Vulnerable to It?
Introduction In recent months, a threat to open-source repositories has emerged in the form of repository hijacking, commonly known as RepoJacking. RepoJacking involves a malicious actor intentionally taking over the account of ...
CISA Pressures Federal Civilian Agencies to Secure Network Devices
CISA put federal civilian agencies on notice that they were expected to secure network devices within 14 days of discovering they had been exposed on the internet ...