Breaches: Page 11


  • A lightbulb with a cycle circle around it.
    Image attribution tooltip
    Permission granted by Gartner
    Image attribution tooltip
    Sponsored by Gartner Peer Insights

    Cybersecurity quarterly benchmarks: Q1, 2022

    Gartner Peer Insights data and opinions run the gamut on cybersecurity maturity, budgets, and initiatives.

    Oct. 24, 2022
  • Lights reflect off of server cases.
    Image attribution tooltip
    Kwarkot/iStock via Getty Images
    Image attribution tooltip

    As cybersecurity threats rage, colleges invest in risk prevention and pay higher insurance premiums

    Cyber insurance policy renewal price increases are typically between 40% and 60%, with some increases hitting the triple digits, S&P said.

    By Rick Seltzer • Oct. 14, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    CommonSpirit’s ‘IT security incident’ was likely cyberattack, security experts say

    Experts view moving systems offline and interrupting access to electronic health records as a defensive move.

    By Samantha Liss • Oct. 7, 2022
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    American Airlines phishing attack involved unauthorized access to Microsoft 365

    The airline has begun disclosing additional details to state regulators, confirming more than 1,700 people were impacted.

    By Sept. 26, 2022
  • Shot of Morgan Stanley logo
    Image attribution tooltip
    Mario Tama via Getty Images
    Image attribution tooltip

    Morgan Stanley fined $35M by SEC over improper data disposal

    The bank hired a company with no data-destruction experience to decommission hard drives and servers, which were sold to a third party and auctioned with some unencrypted customer data intact, the regulator found.

    By Gabrielle Saulsbery • Sept. 21, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Stolen single sign-on credentials for major firms available for sale on dark web

    Stolen SSO credentials are available for half of the top 20 public companies, and 25% of the entire S&P 500, BitSight found.

    By Sept. 21, 2022
  • American Airlines jet taking off from an airport runway.
    Image attribution tooltip
    Joe Raedle / Staff via Getty Images
    Image attribution tooltip

    American Airlines targeted by threat actor in July data incident

    The airline has notified customers about the potential release of personal data, but said there is no evidence of the data being misused. 

    By Sept. 20, 2022
  • The Capital One flag flies over its headquarters March 13, 2006 in Mclean, Virginia.
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    Capital One freed from consent order tied to 2019 breach

    The Office of the Comptroller of the Currency determined the bank had reached a level of “safety and soundness” no longer requiring extra oversight regarding a leak of 106 million customers’ data.

    By Gabrielle Saulsbery • Sept. 20, 2022
  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    LastPass says it contained August breach, leaving customer data and vaults secure

    After investigating alongside Mandiant, the widely used password manager has enhanced a number of security protocols in response to the four-day incident.  

    By Sept. 16, 2022
  • Golden circuit cloud showing cloud computing technology
    Image attribution tooltip
    PhonlamaiPhoto via Getty Images
    Image attribution tooltip

    Cloud security pros expect elevated risk for serious data breaches

    Just one out of five cybersecurity and engineering professionals escaped the previous year without incident.

    By Sept. 14, 2022
  • The threat actor JuiceLedger launched a supply chain attack against PyPI contributors.
    Image attribution tooltip
    Permission granted by SentinelOne
    Image attribution tooltip

    PyPI contributors targeted by JuiceLedger in latest attack against open source

    The supply chain attack represents a potential risk to organizations using open source, researchers from SentinelOne and Checkmarx say.

    By Sept. 6, 2022
  • A rendering of an empty hospital corridor with a reception desk.
    Image attribution tooltip
    Ninoon via Getty Images
    Image attribution tooltip

    Cyberattacks pivot from large health systems to smaller hospitals, specialty clinics

    The trend of attacks focusing on a systemic technology used across most providers is one that Critical Insights expects to continue this year. 

    By Rebecca Pifer • Aug. 29, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Twilio discloses more victims as phishing attack effects cascade

    The communications and identity authentication provider said it has discovered 163 victims thus far.

    By Aug. 29, 2022
  • An octopus floats, depicted in a deep blue background
    Image attribution tooltip
    TheSP4N1SH via Getty Images
    Image attribution tooltip

    Almost 10K credentials compromised in phishing spree that ensnared Twilio, Mailchimp

    Attackers targeted Okta identity credentials and two-factor authentication in the campaign dubbed Oktapus.

    By Naomi Eide • Aug. 26, 2022
  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    LastPass breached, portions of source code stolen, CEO says

    The unauthorized actor did not access data or encrypted vaults from its more than 33 million registered users, however the company deployed containment and mitigation measures. 

    By Aug. 26, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Third-party attacks spike as attackers target software connections

    Every third-party tool and partnership is a potential path for attack and an opportunity to exploit human behavior. The risks spread far and wide.

    By Aug. 22, 2022
  • A Mailchimp logo on a phone with a larger Mailchimp in the background.
    Image attribution tooltip

    Rafael Henrique/Zumapress/Newscom

    Image attribution tooltip

    Mailchimp breach shines new light on digital identity, supply chain risk

    Sophisticated threat actors are targeting weak links in the email marketing space to go after vulnerable financial targets.

    By Aug. 18, 2022
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images
    Image attribution tooltip

    DigitalOcean, caught in Mailchimp security incident, drops email vendor

    An attack on the email marketing firm raises questions about the continued risk of a supply chain compromise. 

    By Aug. 17, 2022
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Twilio phishing attack fallout spreads to Signal

    The vendor’s widely used two-factor authentication service became a point of potential compromise for 1,900 Signal users. One user suffered a direct hit.

    By Aug. 15, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    How attackers are breaking into organizations

    Threat actors lean heavily on phishing attacks, vulnerabilities in software and containers, and stolen credentials, according to top cyber vendor research.

    By Aug. 15, 2022
  • A sample phishing text message that targeted Cloudflare employees.
    Image attribution tooltip

    Cloudflare

    Image attribution tooltip

    Cloudflare thwarts ‘sophisticated’ phishing attack strategy that bruised Twilio

    Dissimilar responses from Cloudflare and Twilio bear important lessons in transparency, resiliency and access.

    By Aug. 9, 2022
  • Hospitals have low level of accountability for connected device breaches

    Only an average of 3.4% of hospitals’ IT budgets are being spent on device security, a recent survey shows.

    By Rebecca Pifer • Aug. 5, 2022
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Data breach costs spread downstream, IBM says

    Nearly half of all organizations studied by IBM have minimal or no cloud security practices in place.

    By July 29, 2022
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Entrust acknowledges June cyberattack, remains tight-lipped on the details

    The cybersecurity vendor has yet to disclose how the incident occurred, the type of data stolen and if ransomware was involved.

    By July 28, 2022
  • A closeup up a car dashboard with a a driver's hand. A phone is on a mount to the right of the steering wheel.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Uber reaches non-prosecution deal with feds after concealing data breach

    The ride-sharing firm had been under investigation by the Federal Trade Commission, when the 2016 data breach occurred, an event undisclosed until new management entered the picture. 

    By July 26, 2022