BreachExchange: by date

282 messages starting Jul 02 18 and ending Sep 28 18
Date index | Thread index | Author index


Monday, 02 July

You Might Be an Inside Trader If…You Trade on Your Unconfirmed Suspicions of a Cybersecurity Event Prior to Its Public Revelation or Disclosure Audrey McNeil
What backup security measures protect against data breaches? Audrey McNeil
How to Measure Cybersecurity Success Audrey McNeil
Data Breaches Prove Costly for Major Businesses Audrey McNeil
GDPR sparks rise in data protection complaints Audrey McNeil
Effective Data Security Is A Team Effort Audrey McNeil

Tuesday, 03 July

Fourth Circuit Weighs in on Standing in Data Breach Litigation Audrey McNeil
Insider Threat: Common Myths and Misconceptions Audrey McNeil
Prediction of (Cyber)warfare — Security Teams Under Attack! Audrey McNeil
HIPAA & Medical Data Security for Web Developers Audrey McNeil
Cyber Security Insurance: Nine Questions to Ask to Determine Your Exposure Audrey McNeil

Thursday, 05 July

Software Patching Integral to PHI Data Security, HIPAA Compliance Audrey McNeil
Is GDPR Good For SME Data? Audrey McNeil
How your business can ensure HIPAA-compliant backups Audrey McNeil
Should Your Customers Trust You with Their Data? Audrey McNeil
Six Ways To Ensure Your Data Stays Private Audrey McNeil

Friday, 06 July

The data dichotomy: are transformation and data security incompatible? Audrey McNeil
Pulling Lessons From Bad Cybersecurity News Audrey McNeil
Does your organisation have cyber insurance? Audrey McNeil
The ostrich security strategy is now very risky Audrey McNeil
The physical key to cybersecurity Audrey McNeil
Motivations and malware: inside the mind of a hacker Audrey McNeil

Monday, 09 July

Using the Blockchain to Secure Sensitive Information Audrey McNeil
Four tips for keeping security worries away this summer Audrey McNeil
Suffered a data breach? Here’s how you manage the fallout Audrey McNeil
The Plight of the Password Audrey McNeil
In Security, What We Don't See Can Hurt Us Audrey McNeil

Tuesday, 10 July

Cyber crime poses a massive threat to businesses, thanks to remote workers using unsecured public wifi Audrey McNeil
Hacker vs. Cybercriminals: What’s the Difference and Why It Matters Audrey McNeil
The Biggest Risk to Your Business: Inadequate Cybersecurity Audrey McNeil
Email data leaks just got riskier Audrey McNeil
Are You Failing To Learn From Cyberattack News? Audrey McNeil
Know your smart devices, they can be cyber villains Audrey McNeil

Wednesday, 11 July

How Will The GDPR Survive In The Jungle of Big Data? Audrey McNeil
Why Cybersecurity Is Critical to Healthcare Innovation Audrey McNeil
How to Solve the Developer vs. Cybersecurity Team Battle Audrey McNeil
How to Avoid Self-Inflicted Cybersecurity Wounds Audrey McNeil
How Worried Should a Small Business Be About Cybersecurity? Audrey McNeil
Small business IT support: Why you need it Audrey McNeil

Thursday, 12 July

SEC Cybersecurity Update May Lead to Increased Oversight Audrey McNeil
Stop training your employees to fall for phishing attacks Audrey McNeil
Innovation in healthcare: A hacker’s dream and CISO’s nightmare? Audrey McNeil
Cybersecurity: It's about time Audrey McNeil
These Are The Top 3 Habits For Companies Hoping To Escape A Hack Audrey McNeil
California May Lower the Standing Threshold in Data Breach Litigation Audrey McNeil

Friday, 13 July

Innovation in healthcare: A hacker’s dream and CISO’s nightmare? Audrey McNeil
HIPAA Enforcement: Where’s the Action? Audrey McNeil
Four Ways to Improve IT Security on a Limited Budget Audrey McNeil
How to Protect Your Organization from Spear Phishing Audrey McNeil
GDPR – emerging risks for SMEs Audrey McNeil
Five Tips for Minimizing Data Loss Risk in a Hybrid IT Environment Audrey McNeil

Monday, 16 July

The Types of Hackers & Why They Hack Audrey McNeil
Security Think Tank: A good password policy alone is not enough Audrey McNeil
Your 2018 guide to cyber insurance is here Audrey McNeil
Three Emerging Technologies to Accelerate Incident Readiness Audrey McNeil
What is phishing and how to protect against It? by Liam Johnson Audrey McNeil

Tuesday, 17 July

IMB data breach prompts 'comprehensive response' Audrey McNeil
We’ve had a data breach… let’s not tell anyone Audrey McNeil
HIPAA Changes May Be on the Way Audrey McNeil
Less Than Half of Cyberattacks Detected via Antivirus: SANS Audrey McNeil
California and GDPR “light”: A Match Made in Plaintiffs’ Lawyers Heaven? Audrey McNeil
Cyber security and data privacy: what are you over-looking? Audrey McNeil

Wednesday, 18 July

Millions of Telefonica customers’ data exposed after security breach Audrey McNeil
Cyber Smarts: How to Avoid a Data Breach Lawsuit Audrey McNeil
Why Every Business Should Have a Data Protection Officer Audrey McNeil
What New Entrepreneurs Should Be Doing to Prevent Cybercrime Audrey McNeil
Memory Protection beyond the Endpoint Audrey McNeil
How to Teach Your Employees About Cybersecurity Audrey McNeil

Thursday, 19 July

Fallout From HIV Data Breach Concerns Legal Experts Audrey McNeil
PayPal's pal Venmo spaffs your pals' payments – and yours Audrey McNeil
Brit watchdog fines child sex abuse inquiry £200k over mass email blunder Audrey McNeil
Addressing incident response with some common sense Audrey McNeil
Cybersecurity | A forward-thinking approach Audrey McNeil
Network visibility and assurance for GDPR compliance Audrey McNeil

Friday, 20 July

Voters' data was left exposed online because of course it was Audrey McNeil
Cyber security is being tightened at Australian airports after an identity card data hack Audrey McNeil
The Fundamental Flaw in Security Awareness Programs Audrey McNeil
Hack like a CISO Audrey McNeil
Getting Started with Successful Security Breach Detection Audrey McNeil
A Short Guide to Cyber Security for Small Businesses Audrey McNeil

Monday, 23 July

Singapore's Largest Healthcare Group Hacked, 1.5 Million Patient Records Stolen Audrey McNeil
6 ways you are sabotaging your cyber defences Audrey McNeil
Understanding Why Spear Phish Are Highly Effective Audrey McNeil
The cybersecurity incident response team: the new vital business team Audrey McNeil
The Path to Securing IoT Ecosystems Starts at the Network Audrey McNeil
Tips For Getting Your GDPR Compliant Solution Approved Audrey McNeil

Tuesday, 24 July

Insecure server left carmakers' trade secrets wide open Destry Winant
Don't Confuse GDPR Compliance with Security Destry Winant
What Does “Reasonable” Data Security Mean, Exactly? Destry Winant
Singapore public healthcare sector limits internet use Destry Winant
A Hidden Bug In The System Puts 21, 000 U.K. Students At Risk Destry Winant

Wednesday, 25 July

8 types of malware and how to recognize them Destry Winant
SIX REASONS TO THINK TWICE ABOUT YOUR DATA LAKE STRATEGY Destry Winant
Employee Causes Five Years of Data Breach Litigation Destry Winant

Thursday, 26 July

The Foundation of Cyber-Attacks: Credential Harvesting Destry Winant
Best Ways To Protect Your Organization & Keeping Your Employees Well-Versed in Data Security Destry Winant
Emotet Malware Evolves Beyond Banking to Threat Delivery Service Destry Winant
Sias says 2013 data breach hit 70,000 members Destry Winant

Friday, 27 July

Chili’s and Macy’s Teach Very Different Lessons about Breach Response Destry Winant
Shipping Giant Cosco Hit by Ransomware Attack Destry Winant
Could complacency be setting in when it comes to ransomware? Destry Winant
A year later, cities using Click2Gov are still getting hacked Destry Winant
Proposed Settlement in Lawsuit Tied to Insider Breach Destry Winant

Monday, 30 July

1.4 million online fashion shoppers exposed after data breach at UK ecommerce provider Inga Goddijn
How rogue data puts organisations at risk of GDPR noncompliance Inga Goddijn
Idaho Prison Officials: Inmates Hacked System to Get Credits Inga Goddijn
California Consumer Privacy Act: What you need to know to be compliant Inga Goddijn

Tuesday, 31 July

Cybersecurity & Business: Not Just an IT Problem Destry Winant
How Are Apps Like Slack And Dropbox Vulnerable To Attack? Destry Winant
10 Common File Transfer Risks and How to Avoid Them Destry Winant
Telstra customer stumbles across contact details of 66, 000 fellow customers Destry Winant
New Spectre Variant Hits the Network Destry Winant

Wednesday, 01 August

Blue Springs Family Care hit by ransomware attack that potentially compromised data of over 44, 000 patients Destry Winant
Data Breach? Don’t Panic—Just Remember These 4 Tips Destry Winant
Every Week Is Shark Week in Cyberspace Destry Winant
How COSCO responded to a cyberattack on its systems Destry Winant

Thursday, 02 August

“Typewriters are productive again”, the aftermath of Mat-Su’s Ransomware Attack Destry Winant
Yale University discloses old school data breach Destry Winant
UK shipping giant deals with data breach by the book, recovers stolen data Destry Winant
Jersey Mike's Warns Customers Of External Data Breach Inga Goddijn

Friday, 03 August

Reddit breach shows limits of SMS-based two-factor authentication Destry Winant
Allentown computer virus fix to cost extra $220, 000 Destry Winant
Huge Cryptomining Attack on ISP-Grade Routers Spreads Globally Inga Goddijn

Monday, 06 August

Social engineering attacks: What makes you susceptible? Destry Winant
Halt the Hackers: How to Make a Website Secure Destry Winant
Malware Hits Plants of Chip Giant TSMC Destry Winant
Salesforce.com Warns Marketing Customers of Data Leakage SNAFU Destry Winant
Risks associated with third-party access Destry Winant

Tuesday, 07 August

They're not fraud victims yet, but plaintiffs quickly sue Pompano Beach company over data breach Destry Winant
TSMC says variant of WannaCry virus brought down its plants Destry Winant
Why Penetration Testing is Important Destry Winant
These Are The Five Most Dangerous Email Attachments Destry Winant
From Zero Day Attack to Zero Day Recovery Destry Winant

Wednesday, 08 August

Understanding the differences between IT security and cybersecurity Destry Winant
Don’t Forget Victimology as a Cybersecurity Strategy Destry Winant
Do you need a vulnerability disclosure program? The feds say yes Destry Winant

Thursday, 09 August

No, The Mafia Doesn't Own Cybercrime: Study Destry Winant
And now professional golf is being ransomed for bitcoin Destry Winant
Snapchat source Code leaked after an iOS update exposed it Destry Winant
300, 000 Records Found at Hospital Slated for Demolition Destry Winant
Hey, you know what a popular medical record system doesn't need? 23 security vulnerabilities Destry Winant

Friday, 10 August

5 Things Your Average Employee Doesn't Know About IT Destry Winant
Cyber-attack! Would your firm handle it better than this? Destry Winant
Four Ways to Mitigate Cyber Risks for ERP Applications Destry Winant
The four most popular methods hackers use to spread ransomware Destry Winant
Millions of health records exposed to public in Mexico Destry Winant

Monday, 13 August

Adams County data breach exposed personal information of up to 250, 000 people Destry Winant
Hi-de-Hack! Redcoats red-faced as Butlin's holiday camp admits data breach hit 34, 000 Destry Winant
Expert Warns that Hacked Satellite Systems Could be Used to Launch Microwave-Like Attacks Destry Winant
New Variant of Dharma Ransomware Discovered Destry Winant

Tuesday, 14 August

Can cramming code with bugs make it more secure? Some think so Destry Winant
Where You Store Your Data and Why it Matters Destry Winant
Critical vulnerability in Oracle Database, patch without delay! Destry Winant
Attackers could ‘faxploit’ all-in-one printer to penetrate network and steal data Destry Winant

Wednesday, 15 August

CVE? Nope. NVD? Nope. Serious must-patch type flaws skipping mainstream vuln lists – report Destry Winant
Urgent care provider notifies 13K to data breach Destry Winant
Should Staff Ever Use Personal Devices to Access Patient Data? Destry Winant
Cyber security should be a Proactive affair Destry Winant

Thursday, 16 August

2.6 billion records exposed in 2, 300 disclosed breaches so far this year Destry Winant
Hack mobile point-of-sale systems? Researchers count the ways Destry Winant
NotPetya malware attack: Chaos but not cyber warfare Destry Winant

Friday, 17 August

The Latest Thing You Need to Worry About Cybercriminals Hacking? Your Voice. Destry Winant
India's Cosmos Bank loses $13.5 mln in cyber attack Destry Winant

Monday, 20 August

417, 000 Individuals Affected by Augusta University Health Phishing Attack Destry Winant
TEENAGE HACKER HOPING TO WORK FOR APPLE BROKE INTO THE COMPANY'S SECURE NETWORK Destry Winant
How to Go From No Incident Response Program to SOAR Destry Winant
Real Security is a Question of Business Value Destry Winant

Tuesday, 21 August

Legacy Health email breach exposes 38, 000 patients' information Destry Winant
Eastern Maine Community College Data Breach Exposed 42000 Records Destry Winant
4 Ways To Avoid Data Breaches Through Sales And Marketing Alignment Destry Winant
What most companies forget when fighting off cyberattacks Destry Winant

Wednesday, 22 August

Super-mugs: Hackers claim to have snatched 20k customer records from Brit biz Superdrug Destry Winant
Change How You Think About Risk. Your Company May Depend on It Destry Winant
Who’s Really Responsible For Third-Party Vendor Breaches? Destry Winant
The 5 types of cyber attack you're most likely to face Destry Winant

Thursday, 23 August

It’s Time To Protect Your Enterprise From DDoS Attacks Destry Winant
Leaky API exposes Black Hat attendees’ personal data Destry Winant
Data breach notifications may facilitate identity theft Destry Winant
Disrupting the Economics of Cybercrime Destry Winant
Watch Out! Another Nasty Apache Struts Vulnerability Has Been Disclosed! Destry Winant

Friday, 24 August

90% of E-Commerce Global Login Traffic is from Hackers Destry Winant
IT Postmortems: How to continuously improve by learning from failure and success Destry Winant
Darden reports possible data breach at Cheddar's Scratch Kitchen Destry Winant
Spyware Company Leaves ‘Terabytes’ of Selfies, Text Messages, and Location Data Exposed Online Destry Winant

Monday, 27 August

IT Professionals in Today’s Challenging World of Corporate IT Infrastructure Destry Winant
Weak Security Socializes Risk Destry Winant
A False Sense of Security Destry Winant
99% of Texas Voter Records Exposed Destry Winant

Tuesday, 28 August

Weak passwords let a hacker access internal Sprint staff portal Destry Winant
Iranian Hackers Target Universities in Global Cyberattack Campaign Destry Winant
Critical Apache Struts flaw just waiting to be exploited; PoC reported in the wild Destry Winant
Our Reports Clickbait? No. Click Here To Find Out Why… Destry Winant
Brazilian Crypto Platform Atlas Quantum Reveals Data Breach Affecting 260K Customers Destry Winant

Wednesday, 29 August

3 characters from Jurassic Park that could’ve benefited from an IT disaster recovery plan Destry Winant
How Full Admin Rights Could Pose a Threat to Your Business Destry Winant
Bank of Spain Reveals Its Website Suffered a DoS Attack Destry Winant
3 months after GDPR data breach complaints already more than doubled Destry Winant

Thursday, 30 August

Data of 130 Million Chinese Hotel Chain Guests Sold on Dark Web Forum Destry Winant
Hackers Publish PoC of Zero-day Vulnerability in Windows on Twitter Destry Winant
ABBYY woes: Doc-reading software firm leaves thousands of scans blowing in wind Destry Winant
Air Canada mobile app breached, data of 20, 000 customers may have been accessed Destry Winant
Apache Struts Distraction Continues While Over 600 Additional Vulnerabilities Have Been Released Inga Goddijn

Friday, 31 August

How One Company’s Cybersecurity Problem Becomes Another's Fraud Problem Destry Winant
Why everyone’s thinking about ransomware the wrong way Destry Winant
Three Ways of Looking at Security Operations Destry Winant
Your Biggest Cybersecurity Threat is Poor Communication Destry Winant

Tuesday, 04 September

DDoS attack from Anonymous Catalonia cripples Bank of Spain website Destry Winant
MagentoCore Card Skimmer Found on Mass Numbers of E-Commerce Sites Destry Winant
Government transparency site revealed Social Security numbers, other personal info Inga Goddijn
Beef Up Your Cybersecurity, No Second Thoughts Please! Inga Goddijn

Wednesday, 05 September

Destroyed Computer Hampers Lawsuit in Premera Breach Destry Winant
Parental control spyware app Family Orbit hacked, pictures of hundreds of monitored children were exposed Destry Winant
Hackers hit West Vancouver's server Destry Winant
Insult To Injury – Florida Health Care Management Firm Accidentally Gives Data To Attackers Destry Winant

Thursday, 06 September

Google fixes Chrome issue that allowed theft of WiFi logins Destry Winant
Is Your Company Ready For A Bug Bounty Program? Destry Winant
Vodafone Tells Hacked Customers with "1234" Password to Pay Back Money Destry Winant
Nova Scotia re-launches FOIPOP website after 152 days of being offline Destry Winant

Monday, 10 September

British Airways hacked with 380, 000 sets of payment details stolen Destry Winant
Opinion Hackers reaping greater rewards with hybrid cyber attacks Destry Winant
U.S. charges North Korean hacker over Sony, WannaCry incidents Destry Winant
Why a Healthy Data Diet Is the Secret to Healthy Security Destry Winant

Tuesday, 11 September

RBS Hits The Road In September Destry Winant
Law firm launches £500 million group action over British Airways hack Destry Winant
APIs: The Trojan horses of security Destry Winant
Attackers Made 9, 000 Unauthorized Database Queries in Equifax Hack: Report Destry Winant
City of Tyler's Click2Gov payment system breached Destry Winant

Wednesday, 12 September

Data Breach Notification Laws: Is it Time for a Uniform Standard? Destry Winant
Top 5 IT tips for remote and mobile teams Destry Winant
British Airways Breach Linked to Ticketmaster Breach Attackers Destry Winant
Phishing for Trouble: One Manufacturer’s Mistakes, and How to Avoid Them Destry Winant

Thursday, 13 September

Why do cybercriminals target vulnerabilities? Destry Winant
Whisky business: Uni of Edinburgh servers Irn-Scru'd by cyber-attack Destry Winant
Is hiring a hacker ever a good idea? Destry Winant
Ontario town plans to pay ransom after computers locked down Destry Winant

Friday, 14 September

Companies “over-reporting” data breaches as ICO takes 500 calls per week Destry Winant
Blue Cross blames vendor for breach of customer information in R.I. Destry Winant
Veeam server lapse leaks over 440 million email addresses Inga Goddijn

Monday, 17 September

5 Steps on How to Create Your Own Cybersecurity Risk Assessment Destry Winant
Natural disasters bring cyberthreats small and large Destry Winant
Targeted Attacks or Untargeted Attacks – Which is Most Common? Destry Winant
Board members and cyber responsibility Destry Winant
Colorado Timberline Shuts Down Destry Winant

Tuesday, 18 September

Bristol Airport hit by Windows ransomware Destry Winant
Amazon investigating reports of employees leaking data for bribes Destry Winant
Expectations for CISOs Have Changed Destry Winant
You Didn’t Think the Sony Saga Was Over, Did You? Destry Winant

Wednesday, 19 September

Independence Blue Cross discloses data breach by employee Destry Winant
Peekaboo vulnerability exposes hundreds of thousands of security cameras to hacking Destry Winant
A New variant of Brrr Dharma Ransomware has been released Destry Winant
MongoDB server leaks 11 million user records from e-marketing service Destry Winant

Thursday, 20 September

Virus shuts down city services Destry Winant
Equifax fined by ICO over data breach that hit Britons Destry Winant
Mirai authors avoid the jail by helping US authorities in other investigations Destry Winant
Hackers stole customer credit cards in Newegg data breach Destry Winant

Friday, 21 September

How To Stay Ahead of Cyber Breaches, the Boardroom’s Biggest Fear Destry Winant
Tick-tock, tick-tock. Oh, that's just the sound of compromised logins waiting to ruin your day Destry Winant
UMass Memorial health care entities to pay $230,000 over data breaches — 15,000 patients exposed Destry Winant
AdGuard resets all user passwords after credential stuffing attack Destry Winant

Monday, 24 September

Scotland's Arran Brewery Slammed by Dharma Bip Ransomware Destry Winant
Security priorities are shifting in response to increased cybersecurity complexity Destry Winant
Yahoo! Data Breach Estimated to Cost Successor Company Net $47 Million Destry Winant
NCIX servers sold on Craigslist with 15 years of user data Destry Winant

Tuesday, 25 September

Hackers Spreading New Virobot Ransomware with Powerful Botnet & Keylogging Capabilities Destry Winant
CISO Should Stand For Chief Influence Security Officer Destry Winant
5 Ways to Help Your Customers Feel Comfortable Paying Online Destry Winant
Twitter API Flaw Exposed Users Messages to Wrong Developers For Over a Year Destry Winant

Wednesday, 26 September

SHEIN fashion retailer announces breach affecting 6.42 million users Audrey McNeil
Tesco Bank faces £30m FCA fine over cyber attack Audrey McNeil
Twitter bug sent user's direct messages to third-party developers Audrey McNeil
Let’s face it, users should never be the last line of defense in cybersecurity Audrey McNeil
5 Cybersecurity Tips for Small Businesses Audrey McNeil
Without Handcuffs: Creating A Culture of Compliance Audrey McNeil

Thursday, 27 September

Online textbook rental and tutorial company Chegg plunges after disclosing data breach Destry Winant
Uber reaches $148 million settlement over its 2016 data breach, which affected 57 million globally Destry Winant
Can't read my, can't read my... broker face: Premium Credit back online a week after cyber attack Destry Winant
Businesses in Arkansas Hit with Ransomware Destry Winant
Village People LLC Notifies of Security Incident Destry Winant

Friday, 28 September

Exploited server in SingHealth cyber attack did not get security update for 14 months, COI finds Destry Winant
Port of San Diego hit by ‘ransomware’ cyberattack Destry Winant
Top 3 issues CISOs face today Destry Winant
SEC fines Voya $1M for cybersecurity failures Destry Winant