Breaches: Page 9


  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    LastPass says it contained August breach, leaving customer data and vaults secure

    After investigating alongside Mandiant, the widely used password manager has enhanced a number of security protocols in response to the four-day incident.  

    By Sept. 16, 2022
  • Golden circuit cloud showing cloud computing technology
    Image attribution tooltip
    PhonlamaiPhoto via Getty Images
    Image attribution tooltip

    Cloud security pros expect elevated risk for serious data breaches

    Just one out of five cybersecurity and engineering professionals escaped the previous year without incident.

    By Sept. 14, 2022
  • An abstract photo copy background in black and white. Explore the Trendline
    Image attribution tooltip
    BNMK0819 via Getty Images
    Image attribution tooltip
    Trendline

    Securing the cloud

    A host of new technologies and a spate of incidents at top providers means businesses have even more cloud security conundrums to consider. 

    By Cybersecurity Dive staff
  • The threat actor JuiceLedger launched a supply chain attack against PyPI contributors.
    Image attribution tooltip
    Permission granted by SentinelOne
    Image attribution tooltip

    PyPI contributors targeted by JuiceLedger in latest attack against open source

    The supply chain attack represents a potential risk to organizations using open source, researchers from SentinelOne and Checkmarx say.

    By Sept. 6, 2022
  • A rendering of an empty hospital corridor with a reception desk.
    Image attribution tooltip
    Ninoon via Getty Images
    Image attribution tooltip

    Cyberattacks pivot from large health systems to smaller hospitals, specialty clinics

    The trend of attacks focusing on a systemic technology used across most providers is one that Critical Insights expects to continue this year. 

    By Rebecca Pifer • Aug. 29, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Twilio discloses more victims as phishing attack effects cascade

    The communications and identity authentication provider said it has discovered 163 victims thus far.

    By Aug. 29, 2022
  • An octopus floats, depicted in a deep blue background
    Image attribution tooltip
    TheSP4N1SH via Getty Images
    Image attribution tooltip

    Almost 10K credentials compromised in phishing spree that ensnared Twilio, Mailchimp

    Attackers targeted Okta identity credentials and two-factor authentication in the campaign dubbed Oktapus.

    By Aug. 26, 2022
  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    LastPass breached, portions of source code stolen, CEO says

    The unauthorized actor did not access data or encrypted vaults from its more than 33 million registered users, however the company deployed containment and mitigation measures. 

    By Aug. 26, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Third-party attacks spike as attackers target software connections

    Every third-party tool and partnership is a potential path for attack and an opportunity to exploit human behavior. The risks spread far and wide.

    By Aug. 22, 2022
  • A Mailchimp logo on a phone with a larger Mailchimp in the background.
    Image attribution tooltip

    Rafael Henrique/Zumapress/Newscom

    Image attribution tooltip

    Mailchimp breach shines new light on digital identity, supply chain risk

    Sophisticated threat actors are targeting weak links in the email marketing space to go after vulnerable financial targets.

    By Aug. 18, 2022
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images
    Image attribution tooltip

    DigitalOcean, caught in Mailchimp security incident, drops email vendor

    An attack on the email marketing firm raises questions about the continued risk of a supply chain compromise. 

    By Aug. 17, 2022
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Twilio phishing attack fallout spreads to Signal

    The vendor’s widely used two-factor authentication service became a point of potential compromise for 1,900 Signal users. One user suffered a direct hit.

    By Aug. 15, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    How attackers are breaking into organizations

    Threat actors lean heavily on phishing attacks, vulnerabilities in software and containers, and stolen credentials, according to top cyber vendor research.

    By Aug. 15, 2022
  • A sample phishing text message that targeted Cloudflare employees.
    Image attribution tooltip

    Cloudflare

    Image attribution tooltip

    Cloudflare thwarts ‘sophisticated’ phishing attack strategy that bruised Twilio

    Dissimilar responses from Cloudflare and Twilio bear important lessons in transparency, resiliency and access.

    By Aug. 9, 2022
  • Hospitals have low level of accountability for connected device breaches

    Only an average of 3.4% of hospitals’ IT budgets are being spent on device security, a recent survey shows.

    By Rebecca Pifer • Aug. 5, 2022
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Data breach costs spread downstream, IBM says

    Nearly half of all organizations studied by IBM have minimal or no cloud security practices in place.

    By July 29, 2022
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Entrust acknowledges June cyberattack, remains tight-lipped on the details

    The cybersecurity vendor has yet to disclose how the incident occurred, the type of data stolen and if ransomware was involved.

    By July 28, 2022
  • A closeup up a car dashboard with a a driver's hand. A phone is on a mount to the right of the steering wheel.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Uber reaches non-prosecution deal with feds after concealing data breach

    The ride-sharing firm had been under investigation by the Federal Trade Commission, when the 2016 data breach occurred, an event undisclosed until new management entered the picture. 

    By July 26, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Data breach at debt collector affects almost 2M healthcare patients

    It’s the second-largest health data breach this year after the Shields Health Care Group cyberattack in March, the Department of Health and Human Services breach reporting portal shows.

    By Rebecca Pifer • July 19, 2022
  • A rendering of an empty hospital corridor with a reception desk.
    Image attribution tooltip
    Ninoon via Getty Images
    Image attribution tooltip

    Hospital ransomware concerns rise after payment vendor breach, North Korea threats

    A recently disclosed ransomware attack could have exposed patient data from more than 650 healthcare providers.

    By Rebecca Pifer • July 11, 2022
  • A sign is posted in front of a Marriott hotel.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Latest Marriott breach shows a human error pattern

    The latest incident at Marriott is relatively minor compared to major breaches in late 2018 and early 2020, but it signals a pattern of neglect.

    By July 7, 2022
  • Carnival, Cruise, Privacy, violatons
    Image attribution tooltip
    Courtesy of Carnival Corp.
    Image attribution tooltip

    Carnival to pay $5M for cyber violations to NY financial regulator

    The cruise line failed to implement multifactor authentication and took 10 months to report the first of four data incidents.

    By June 27, 2022
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Attackers keep targeting VMware Horizon, exploiting unpatched Log4Shell

    In one case, CISA found multiple threat actors compromising an organization using Log4Shell, which leveraged access to gain remote command and control.

    By June 24, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Breach at Flagstar Bank impacts more than 1.5M customers

    The breach, which occurred between Dec. 3 and Dec. 4, is the second to impact the bank in less than two years.

    By Anna Hrushka • June 22, 2022
  • A person looks at their smartwatch, which shows their pulse in blue
    Image attribution tooltip
    Nastasic via Getty Images
    Image attribution tooltip

    Employees cause more cyber breaches in healthcare than other industries: report

    Basic web application attacks, miscellaneous errors and system intrusions are at the root of the bulk of healthcare breaches, Verizon research shows.

    By Rebecca Pifer • May 24, 2022
  • Image attribution tooltip
    Getty / edited by Healthcare Dive
    Image attribution tooltip

    Tenet says 'cybersecurity incident' disrupted hospital operations

    The for-profit health system has restored most critical functions, while affected facilities are starting to resume normal operations.

    By Rebecca Pifer • April 27, 2022