Breaches: Page 8


  • Employee in front of a laptop
    Image attribution tooltip
    PeopleImages via Getty Images
    Image attribution tooltip

    Broad MFA, rapid patching a must to stop cyberattacks, Marsh McLennan finds

    A study says organizations need to implement automated hardening techniques to protect systems against future data breaches. 

    By April 6, 2023
  • Trade secrets
    Image attribution tooltip
    ridvan_celik via Getty Images
    Image attribution tooltip

    IT security leaders still told to keep data breaches quiet, study finds

    Bitdefender research found 7 in 10 IT and security professionals in the U.S. have been asked to keep a breach confidential.

    By April 6, 2023
  • Teacher Giving Computer Science Lecture to Diverse Multiethnic Group of Female and Male Students in Dark College Room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    3CX retains Mandiant to investigate supply chain attack with global reach

    Google has invalidated the 3CX software security certificate, and Microsoft software installer files can no longer be downloaded via Chrome. A new installer and certificate are in development.

    By March 31, 2023
  • Exclamation mark depicted over code.
    Image attribution tooltip
    WhataWin/Getty Images via Getty Images
    Image attribution tooltip

    CISA summons outside tips to alert victims of early-stage ransomware

    Post-breach notifications might seem too late for victim organizations, but swift action can prevent ransomware and data exfiltration.

    By March 27, 2023
  • Wawa
    Image attribution tooltip
    Retrieved from Wawa website.
    Image attribution tooltip

    Wawa to pay up to $28.5M in data breach settlement

    The chain’s latest payout will go to the financial institutions involved in the 2019 incident, continuing a series of payments it has made to customers and states over the past year.

    By Brett Dworski • March 16, 2023
  • Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Blackbaud to pay $3M to settle SEC charges of a misleading ransomware investigation

    The regulator said the cloud-based software provider made misleading disclosures about the scope of a 2020 ransomware attack. 

    By March 10, 2023
  • An illustration of personal info cards passing through a medical cross shape opening in a person's chest.
    Image attribution tooltip

    Illustration: Yann Bastard for Industry Dive 

    Image attribution tooltip
    Deep Dive

    Hacking healthcare: With 385M patient records exposed, cybersecurity experts sound alarm on breach surge

    Healthcare companies must harden their defenses, but it may require regulators and lawmakers to raise the bar on security standards, experts say.

    By March 10, 2023
  • Connection network in dark servers data center room storage systems.
    Image attribution tooltip
    sdecoret via Getty Images
    Image attribution tooltip

    Worried about data breaches? Blame the information sector

    Three in five records exposed in a data breach last year came from software, telecom, data processing and web hosting companies, Flashpoint found.

    By March 9, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Suebsiri via Getty Images
    Image attribution tooltip

    Insurance holding company Group 1001 says operations restored after ransomware attack

    The company did not pay a ransom following a February attack that disrupted operations at several of its member companies.

    By March 7, 2023
  • Post-its on a glass wall
    Image attribution tooltip
    Hispanolistic via Getty Images
    Image attribution tooltip

    LastPass aftermath leaves long to-do list for business customers

    Organizations using the password manager are exposed after a major breach compromised credentials and, potentially, business secrets.

    By March 6, 2023
  • Aerial view of a winding mountain road.
    Image attribution tooltip
    Bim via Getty Images
    Image attribution tooltip

    LastPass breach timeline: How a monthslong cyberattack unraveled

    A threat actor evaded detection for months and blended in with legitimate activity after targeting 1 of 4 engineers with access to keys to the kingdom.

    By Updated March 3, 2023
  • Computer engineer working with a computer interface in a factory.
    Image attribution tooltip
    Thinkhubstudio via Getty Images
    Image attribution tooltip

    CISA red team cracks a critical infrastructure provider’s defenses, a lesson in lateral access

    The voluntary assessment raises concerns as the unnamed organization with a mature security program was unable to detect simulated actors moving laterally across its systems for months.

    By March 1, 2023
  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    LastPass compromise grew worse after DevOps engineer targeted for encryption key

    A threat actor used data from multiple breaches and a vulnerability on a high-level employee’s home computer to steal customer passwords.

    By Feb. 28, 2023
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Phishing takes financial bite out of more victim organizations

    The majority of organizations, 84%, experienced at least one successful phishing attack in 2022, Proofpoint research found.

    By Feb. 28, 2023
  • GoDaddy logo depicted on the floor of the New York Stock Exchange
    Image attribution tooltip
    Spencer Platt/Getty Images via Getty Images
    Image attribution tooltip

    For GoDaddy customers, a long dwell time means all could be victims

    The web hosting provider has not shared additional details outlining the extent of the breach, but experts are highlighting the incident's multiple red flags.

    By Feb. 23, 2023
  • Gulls swarm to eat fishing waste from vessel.
    Image attribution tooltip
    Matt Cardy / Stringer via Getty Images
    Image attribution tooltip

    Attackers reduce complexity to catch more potential victims

    Palo Alto Networks warns attackers are building economies of scale by conducting more efficient operations and complementing their skills with commercially available tools.

    By Feb. 23, 2023
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    Phishing, king of compromise, remains top initial access vector

    IBM Security X-Force’s annual threat intelligence report highlights what makes phishing such a dangerous and persistent point of entry.

    By Feb. 22, 2023
  • GoDaddy banner hangs outside of the New York Stock Exchange
    Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    GoDaddy source code stolen as part of a multiyear campaign

    An investigation into the root cause of the incident is ongoing. The web hosting provider declined to say how many potential customers are impacted.

    By Feb. 17, 2023
  • The seal of the FBI
    Image attribution tooltip
    Chip Somodevilla / Staff via Getty Images
    Image attribution tooltip

    FBI contains ‘isolated’ malicious activity on network

    The agency said an investigation into the incident is ongoing. The origin and scope of the incident have yet to be confirmed.

    By Feb. 17, 2023
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Companies grapple with post-breach disclosure risks

    The concerns leading organizations to withhold information are aplenty, including reputational damage and financial impacts.

    By Feb. 16, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    Reddit says limited amount of source code, employee data accessed in phishing attack

    Hackers stole an employee’s credentials in a sophisticated attack this week, after prompting workers to interact with a fake intranet site.

    By Feb. 10, 2023
  • Pair of hands type on keyboard while coding
    Image attribution tooltip
    scyther5 via Getty Images
    Image attribution tooltip

    98% of organizations worldwide connected to breached third-party vendors

    A report by SecurityScorecard shows the extent to which third- and fourth-party relationships increase the risk of cyberattacks.

    By Feb. 2, 2023
  • Connection network in dark servers data center room storage systems.
    Image attribution tooltip
    sdecoret via Getty Images
    Image attribution tooltip

    Microsoft disables phishing campaign after researchers flag OAuth app abuse

    Proofpoint researchers uncovered a malicious campaign where threat actors abused Microsoft’s “verified publisher” status and tricked executives into granting permissions.

    By Feb. 1, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Suebsiri via Getty Images
    Image attribution tooltip

    GitHub resets code signing certificates following breach

    The incident closely follows a series of indirect source code repository breaches impacting Slack and Okta.

    By Feb. 1, 2023
  • A depiction of computer hardware.
    Image attribution tooltip
    solarseven via Getty Images
    Image attribution tooltip

    Most data breach notices lacked detail in 2022

    Organizations were not forthright with the causes or potential risks stemming from disclosed incidents.

    By Jan. 30, 2023