Duo offers a variety of features that can help you secure your organization's resources quickly and easily, including Multi-factor authentication (MFA), Device verification and Risk-based policies
England's Norfolk and Suffolk constabularies report that they accidentally exposed information on victims and witnesses in response to freedom of information requests just one week after police in Northern Ireland accidentally exposed information on all police officers and staff via an FOI request.
Abnormal Security has brought on former Exabeam, Forescout and McAfee leader Mike DeCesare to spearhead its push into the U.S. government, Japanese and German markets. Abnormal has tasked DeCesare with bringing Abnormal's technology to enterprise organizations in non-English-speaking markets.
A Chinese state-sponsored hacking group likely deployed more than a dozen malware variants to target critical infrastructure across Eastern European as part of an espionage campaign, warns security firm Kaspersky. The firm attributes the activity, with medium to high confidence, to APT31.
A global law firm that handles data breach litigation is faced with defending itself against a proposed class action lawsuit filed in the aftermath of its own data breach. The lawsuit stems from a March hacking incident at San Francisco-based Orrick, Herrington & Sutcliffe.
U.K. authorities recently reprimanded health service provider NHS Lanarkshire after staff members shared patient data on messaging service WhatsApp. That privacy lapse demonstrates the risks of shadow IT and the legacy of COVID-19 practices, said attorney Jonathan Armstrong of Cordery Compliance.
Property listings nationwide are being disrupted due to an apparent ransomware attack against California-based Rapattoni, which hosts Multiple Listing Services used by real estate brokers to list, market and sell properties. Rapattoni said it's not clear when its systems might be back online.
The LockBit ransomware-as-a-service group may have become a victim of its own success, having grown "too fast and too quick," to the point where its infrastructure and ability to handle affiliates' requests is lagging, leading many to desert the operation, says ransomware researcher Jon DiMaggio.
In this video, we will examine the mechanisms cybercriminals use to exploit retail stores and platforms, what they look for, and, most importantly, what can be done to thwart threats and leave cyber criminals on the shelf.
An activist investor urged identity verification and e-signature provider OneSpan to cut costs, return more money to shareholders and find a buyer for the company. "We strongly believe there are numerous strategic and financial parties interested in acquiring OneSpan," Legion Partners said Monday.
Multiple vulnerabilities in data center power management systems and supply technologies enable threat actors to gain unauthorized access and perform remote code injection. The attackers can chain multiple vulnerabilities to gain full access to data center systems.
A Georgia healthcare system is notifying over 180,000 individuals of a data compromise involving a hack first detected a year ago, in which attackers accessed and copied a range of patient information. The incident spotlights growing breach response and notification challenges some entities face.
The fallout from the Clop cybercrime group's mass theft of data from MOVEit servers continues to increase. Colorado's state healthcare agency alone is now notifying 4 million affected individuals. The latest tally of victims has reached 670 organizations and 46 million individuals.
Russian-speaking ransomware hackers may be responsible for deploying malware onto the network of an electric utility in southern Africa in an attack researchers say underscores heightened risks of industrial ransomware attacks. An unknown actor deployed a variant of SystemBC malware dubbed DroxiDat.
Secureworks has executed its second round of layoffs since February, axing 15% of its workforce as the company pursues high-growth products and improved operating margins. The company will reduce its 2,149-person staff by roughly 322 positions as it seeks break-even adjusted EBITDA by January 2024.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.