Articles tagged: data-breaches
21 articles found

Supply Chain Under Siege
Recent supply chain attacks have compromised CPUID's API, exposed Eurail customer data, and stolen millions from Bitcoin Depot. Learn about these high-severity breaches and how to protect yourself.

Data Breaches Expose Sensitive Info, $3.6M Stolen
Recent data breaches have exposed sensitive information and resulted in significant financial losses, highlighting the need for robust cybersecurity measures. This article provides an overview of the latest threats and offers recommendations for protection.

Data Breaches Surge with SaaS Integrator and Eurail Attacks
Recent data breaches at a SaaS integrator and Eurail have exposed sensitive information for hundreds of thousands of individuals, highlighting the need for better security practices. Cyber fraud is also increasing in mobile-first regions.

High-Profile Cyber Attacks Intensify
Recent cyber attacks on high-profile organizations like Hasbro and The Drift Protocol have resulted in significant financial losses and data breaches. These targeted attacks highlight the increasing threat of sophisticated operations and the need for robust cybersecurity measures.

Drift Crypto Hack Exposes $280M, Supply Chains Under Siege
A critical hack of the Drift crypto platform has resulted in the theft of $280 million. Meanwhile, supply chain attacks and data breaches continue to pose significant threats to cybersecurity. Learn about these incidents and how to protect yourself.

Supply Chain Attacks Hit Axios, Mercor, and Nissan
Recent supply chain attacks have targeted major companies like Axios, Mercor, and Nissan, resulting in data breaches and compromised systems. Learn about the key facts and takeaways from these incidents.

DeepLoad Malware & CareCloud Breach
A new AI-powered malware called 'DeepLoad' is evading detection, while a data breach at healthcare tech firm CareCloud exposed sensitive patient data. Learn about these emerging threats and how to protect yourself.

Critical Data Breaches Hit Stryker and Telus Digital
Iranian hacktivists have struck medical device maker Stryker, while a hacker claims to have stolen nearly 1 petabyte of data from Telus Digital, highlighting the need for robust cybersecurity measures and incident response plans.

Critical Supply Chain Attacks Hit Veeam and Cloud Environments
Supply chain attacks and data breaches are on the rise, with Veeam Software patching critical flaws in its Backup & Replication solution and a threat actor breaching a cloud environment in 72 hours. Learn about the key threats and how to protect your organization.

Critical Data Breaches and AI-Powered Cybersecurity
Multiple critical data breaches have exposed sensitive information, while AI-powered cybersecurity solutions are being developed to combat these threats. Learn about the latest breaches and advancements in cybersecurity research and funding.

Insider Threats Expose Sensitive Data
A recent incident involving a DOGE employee stealing Social Security data highlights the risks of insider threats. Organizations must implement strict access controls to prevent such breaches, which can lead to financial and reputational damage.

Phishing Attacks Surge with New Tactics
Phishing attacks are on the rise with new tactics, including abusing .arpa DNS and IPv6 reverse DNS. Data breaches and cybersecurity strategy updates are also in focus. Learn about the latest threats and how to protect yourself.

Critical Threats: UNC4899, Cisco Vulnerability, and Phishing Attacks
The cybersecurity landscape is threatened by active exploitation of vulnerabilities, phishing and social engineering attacks, and data breaches. UNC4899 is suspected to be behind a sophisticated cloud compromise campaign, while a recent Cisco Catalyst SD-WAN vulnerability is being widely exploited. Phishing attacks impersonating US city and county officials are also on the rise.

Major Data Breaches Hit LexisNexis and University of Hawaii
Two significant data breaches have been confirmed, affecting millions. Learn about the impacts on LexisNexis and the University of Hawaii Cancer Center, including sensitive information compromised.

Iranian Cyberattacks & Chrome Zero-Days
The UK warns of heightened Iranian cyberattack risks, while Chrome vulnerabilities put thousands at risk. Data breaches and cybercrime continue to threaten global security.

Ongoing Cyberattacks and Data Breaches
Multiple high-severity cyberattacks and data breaches are ongoing, including North Korean hackers deploying new malware to breach air-gapped networks and compromises of medical device manufacturer UFP Technologies and Sangoma FreePBX instances. These attacks highlight the need for vigilance in cybersecurity.

Chinese Cyberspies Breach Telecom Firms as Malicious Packages Target Developers
Chinese cyberspies have breached dozens of telecom firms and governments worldwide, while malicious packages target developers and the financial sector. Ransomware and data breaches affect multiple industries, and security patches address critical vulnerabilities.

Ransomware Attacks Surge
A surge in ransomware attacks targets healthcare organizations, while a medical device maker discloses a data breach and phishing campaigns hit freight companies. Learn about the key threats and how to protect yourself.

Ransomware Payments Plummet Amidst Rising Attacks
Despite a surge in ransomware attacks, payments to threat actors have reached an all-time low. Recent incidents include the breach of Olympique Marseille and a lawsuit against SonicWall. Learn about the evolving landscape of ransomware threats and how to defend against them.

Data Breaches, Extortion, and Code Execution Flaws
Multiple high-severity data breaches and extortion attempts have been reported, alongside critical vulnerabilities in software that could allow for remote code execution. These threats pose significant risks to organizations and individuals alike, highlighting the need for robust security measures.

Zero-Day Vulnerability Under Active Exploitation
A critical zero-day vulnerability is being actively exploited, while significant data breaches and new malware campaigns pose high risks to users. Immediate action is necessary to prevent further exploitation.