DataBreachToday.com
Stronger Oversight Needed as Healthcare Risks Multiply
1 week ago
The Edmund Group's Adler on Managing Third- and Fourth-Party Risk in Healthcare
Healthcare organizations face growing risks from data distribution, vendor dependencies and global instability. Steven Adler, partner at The Edmund Group, discusses practical steps to strengthen vendor oversight and resilience.
Healthcare organizations face growing risks from data distribution, vendor dependencies and global instability. Steven Adler, partner at The Edmund Group, discusses practical steps to strengthen vendor oversight and resilience.
Jaguar Land Rover Slowly Starts Making Cars Again
1 week ago
Manufacturer Resumes Operations at Wolverhampton Unit
British car maker Jaguar Land Rover began on Monday a phased restoration of operations following a month of cyberattack-induced idleness. Fears of large-scale job losses at the car manufacturer and its extensive network of suppliers led the U.K. government to guarantee a 1.5 billion pound loan.
British car maker Jaguar Land Rover began on Monday a phased restoration of operations following a month of cyberattack-induced idleness. Fears of large-scale job losses at the car manufacturer and its extensive network of suppliers led the U.K. government to guarantee a 1.5 billion pound loan.
EyeMed Agrees to Pay $5M to Settle Email Breach Litigation
1 week ago
2020 Hack Has Cost EyeMed About $12.6M in Multiple Regulatory Fines, Settlements
Benefits provider EyeMed Vision Care has agreed to pay $5 million and improve its security practices to settle class action litigation involving a 2020 phishing breach. The incident has been the subject of previous multimillion dollar settlements and enforcement actions by multiple state regulators.
Benefits provider EyeMed Vision Care has agreed to pay $5 million and improve its security practices to settle class action litigation involving a 2020 phishing breach. The incident has been the subject of previous multimillion dollar settlements and enforcement actions by multiple state regulators.
Discord Vendor Hack Exposes ID Data in Ransom Bid
1 week ago
Proliferating Age Verification Systems a Hacker Target
A vendor breach linked to Discord exposed government ID uploads used in age verification, raising alarms among privacy experts who warn that third-party data collection systems are becoming high-value targets amid rising legislative mandates for online age checks.
A vendor breach linked to Discord exposed government ID uploads used in age verification, raising alarms among privacy experts who warn that third-party data collection systems are becoming high-value targets amid rising legislative mandates for online age checks.
Android Spyware Targets UAE Messaging Users
1 week 3 days ago
Fake Messaging Apps Use Previously Undocumented Malware
Android spyware campaigns using previously undocumented spyware masquerade as upgrades or plugins for secure messaging apps Signal and ToTok, warn researchers. The two campaigns appear to target residents of the United Arab Emirates.
Android spyware campaigns using previously undocumented spyware masquerade as upgrades or plugins for secure messaging apps Signal and ToTok, warn researchers. The two campaigns appear to target residents of the United Arab Emirates.
New Open Systems CEO Bets on Service to Win in SASE Market
1 week 3 days ago
New CEO Dennis Monner Outlines Open Systems' Global Expansion, SASE Differentiation
New CEO Dennis Monner said Open Systems stands out by combining SASE technology with 24/7 expert-led service. Backed by Swiss Post, the company aims to capture more enterprise customers in Europe and the U.S. who seek a trusted alternative to U.S. and Israeli vendors.
New CEO Dennis Monner said Open Systems stands out by combining SASE technology with 24/7 expert-led service. Backed by Swiss Post, the company aims to capture more enterprise customers in Europe and the U.S. who seek a trusted alternative to U.S. and Israeli vendors.
UK Home Office Seeks Apple Backdoor Access
1 week 3 days ago
New Investigatory Powers Act Request Reportedly Transmitted in September
The U.K. Home Office reportedly again ordered Apple to give it backdoor access to an encrypted cloud service after backing down in August from a similar demand made earlier this year. The order comes after a similar attempt by the Home Office in January.
The U.K. Home Office reportedly again ordered Apple to give it backdoor access to an encrypted cloud service after backing down in August from a similar demand made earlier this year. The order comes after a similar attempt by the Home Office in January.
ISMG Editors: US Federal Government Shutdown Fallout
1 week 3 days ago
Also: the UK's $7B Bitcoin Case, Implications of Vectra's Netography
In this week's update, ISMG editors examine how the U.S. shutdown and the lapse of CISA 2015 liability shield are straining cyber operations, what Vectra’s move for Netography signals for multi-cloud visibility and NDR, and how British prosecutors unraveled a bitcoin hoard now worth $7 billion.
In this week's update, ISMG editors examine how the U.S. shutdown and the lapse of CISA 2015 liability shield are straining cyber operations, what Vectra’s move for Netography signals for multi-cloud visibility and NDR, and how British prosecutors unraveled a bitcoin hoard now worth $7 billion.
Cryptohack Roundup: White House Pulls CFTC Chair Nom
1 week 4 days ago
Also: Texas Brothers Charged in $8M Crypto-Linked Kidnapping Case
This week, Brian Quintenz won't lead the U.S. CFTC, Canada fined KuCoin $14M, Texas brothers charged in an $8M kidnapping case, South Korean actor given suspended sentence for embezzlement, phishing campaign used robots.txt and an ex-LASD deputy pleaded guilty in a business extortion scam.
This week, Brian Quintenz won't lead the U.S. CFTC, Canada fined KuCoin $14M, Texas brothers charged in an $8M kidnapping case, South Korean actor given suspended sentence for embezzlement, phishing campaign used robots.txt and an ex-LASD deputy pleaded guilty in a business extortion scam.
Hospital Chain to Pay $7.6M to Settle Breach Litigation
1 week 4 days ago
Hospital Sisters Health System's 2023 Hack Affected Nearly 900,000 People
A network of 13 Catholic hospitals, community health centers and clinics in the Midwest will pay $7.6 million and implement improvements to its data security practices to settle consolidated class action litigation filed in the aftermath of a 2023 hacking incident affecting nearly 900,000 people.
A network of 13 Catholic hospitals, community health centers and clinics in the Midwest will pay $7.6 million and implement improvements to its data security practices to settle consolidated class action litigation filed in the aftermath of a 2023 hacking incident affecting nearly 900,000 people.
Descope Gets $35M for AI Agent Identity Controls, Governance
1 week 4 days ago
Identity Security Vendor to Expand AI Governance Tools Including MCP Server Defense
Descope raised $35 million to expand its agentic identity hub and MCP authorization capabilities. As enterprises adopt AI, CISOs demand granular governance, auditing and secure identity frameworks for nonhuman agents. Descope aims to lead this emerging space.
Descope raised $35 million to expand its agentic identity hub and MCP authorization capabilities. As enterprises adopt AI, CISOs demand granular governance, auditing and secure identity frameworks for nonhuman agents. Descope aims to lead this emerging space.
Breach Roundup: FTC Sues Sendit Over Kid's Data Collection
1 week 4 days ago
Also, Cyberattack Disrupts Asahi’s Japan Operations, Halts Production
This week, FTC sued Sendit, another Harrods breach, Allianz data breach and a cyberattack disrupted Asahi's Japan operations. WestJet disclosed data theft. Hackers targeted Kido Nursery chain, a VMware privilege escalation flaw was exploited as zero-day, DarkCloud infostealer resurfaced.
This week, FTC sued Sendit, another Harrods breach, Allianz data breach and a cyberattack disrupted Asahi's Japan operations. WestJet disclosed data theft. Hackers targeted Kido Nursery chain, a VMware privilege escalation flaw was exploited as zero-day, DarkCloud infostealer resurfaced.
Extortionists Claim Mass Oracle E-Business Suite Data Theft
1 week 4 days ago
Executives Receiving Ransom Demands of Up to $50 Million, Warns Ransomware Expert
Extortionists are shaking down executives at organizations that use Oracle E-Business Suite, claiming to have stolen their sensitive data and demanding ransoms of up to $50 million, multiple cybersecurity firms are warning. The criminals claim to be associated with the Clop ransomware group.
Extortionists are shaking down executives at organizations that use Oracle E-Business Suite, claiming to have stolen their sensitive data and demanding ransoms of up to $50 million, multiple cybersecurity firms are warning. The criminals claim to be associated with the Clop ransomware group.
Shutdown Snares Federal Cybersecurity Personnel
1 week 5 days ago
US Cyber Defense Agency Faces 65% Furlough Rate Amid Federal Shutdown
The U.S. federal government shutdown has slashed staff at the nation's cyber defense agency and other key cyber entities, freezing daily operations, stalling grants and weakening threat coordination as state and local systems brace for lapses in federal support.
The U.S. federal government shutdown has slashed staff at the nation's cyber defense agency and other key cyber entities, freezing daily operations, stalling grants and weakening threat coordination as state and local systems brace for lapses in federal support.
Tool Evaluation Skills: A Cure for Shiny Object Syndrome
1 week 5 days ago
Evaluating Tools Saves Money But Requires Technical, Compliance and Business Acumen
Shiny object syndrome is more than a metaphor in cybersecurity. Organizations that chase every new tool often discover that what looked impressive in a demo fails to meet operational needs. The cure for this common malady is a structured tool evaluation process.
Shiny object syndrome is more than a metaphor in cybersecurity. Organizations that chase every new tool often discover that what looked impressive in a demo fails to meet operational needs. The cure for this common malady is a structured tool evaluation process.
From Spend to Strategy: A CISO's View
1 week 5 days ago
Armis CISO Curtis Simpson on Spend Justification, AI Risks, Real-Time Visibility
Curtis Simpson, CISO at Armis, shares how CISOs can frame spend in terms executives value, the underestimated risks of AI and which technology trends will truly reshape enterprise security.
Curtis Simpson, CISO at Armis, shares how CISOs can frame spend in terms executives value, the underestimated risks of AI and which technology trends will truly reshape enterprise security.
Nursing Home Fined $182K for Posting Patient Photos Online
1 week 5 days ago
'Success Stories' Social Media Program Impermissibly Disclosed PHI of 150 Patients
A "Success Stories" marketing campaign by a Delaware nursing home that involved posting photos and names of patients on social media resulted in a $182,000 federal fine. Regulators say the company violated HIPAA rules through the unauthorized disclosure of patients' protected health information.
A "Success Stories" marketing campaign by a Delaware nursing home that involved posting photos and names of patients on social media resulted in a $182,000 federal fine. Regulators say the company violated HIPAA rules through the unauthorized disclosure of patients' protected health information.
Russia, Chinese Hacking Buffets Europe
1 week 5 days ago
ENISA: Nation-State Hacking 'Steadily Intensified' Over 12-Month Period
Nearly every member government of the European Union experienced a cyberattack from a nation-state hacker in the 12 months ending in July, primarily from Russian and Chinese threat actors who "steadily intensified" hacking, says the European cyber agency.
Nearly every member government of the European Union experienced a cyberattack from a nation-state hacker in the 12 months ending in July, primarily from Russian and Chinese threat actors who "steadily intensified" hacking, says the European cyber agency.
Webinar | Unlock the Strategic Value of Cyber Threat Intelligence (CTI) to Reduce Enterprise Risk
1 week 5 days ago
Checked
4 hours ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed