Topic: data breaches

  • Take Back Control of Your Online Shopping Data

    Take Back Control of Your Online Shopping Data

    Online shopping involves extensive collection and sharing of personal data, often without full user awareness or consent, posing significant privacy risks. Data is frequently stored indefinitely and shared with third parties, increasing exposure to breaches, misuse, and targeted scams, as seen in...

    Read More »
  • Healthcare Breach Hits 600k, ShinyHunters Strike, DeepSeek Bias Exposed

    Healthcare Breach Hits 600k, ShinyHunters Strike, DeepSeek Bias Exposed

    Healthcare and luxury brands face significant cybersecurity threats, with major breaches at Goshen Medical Center and Kering-owned fashion labels exposing sensitive data of hundreds of thousands. Critical software vulnerabilities, such as Chaotic Deputy in Chaos-Mesh, and AI-generated code biases...

    Read More »
  • Chanel & Pandora Hacked in Ongoing Salesforce Cyberattack

    Chanel & Pandora Hacked in Ongoing Salesforce Cyberattack

    Luxury brands Chanel and Pandora experienced data breaches via compromised Salesforce accounts, exposing customer information and highlighting third-party platform vulnerabilities. Stolen data (names, emails, addresses) can enable phishing and identity fraud, with experts warning about insufficie...

    Read More »
  • Infostealer Attacks Surge 800% - Protect Your Credentials Now

    Infostealer Attacks Surge 800% - Protect Your Credentials Now

    Identity-based attacks are surging, with 1.8 billion stolen credentials in early 2025, an 800% increase, highlighting the need for stronger defenses like multi-factor authentication (MFA). Over 20,000 new vulnerabilities were disclosed, with 12,200 not yet in the National Vulnerability Database (NV...

    Read More »
  • Apple Pulls Women's Dating Safety App from App Store

    Apple Pulls Women's Dating Safety App from App Store

    Apple removed the women's dating safety app Tea from its App Store for violating terms related to content moderation and user privacy, including the exposure of minors' personal information. Tea experienced multiple security breaches that exposed users' driver's licenses, selfies, and private mes...

    Read More »
  • Crypto at Risk: The Dangers of Outdated Encryption

    Crypto at Risk: The Dangers of Outdated Encryption

    The cryptocurrency industry faces critical security vulnerabilities, with no tested applications supporting post-quantum encryption and millions of user records already circulating on dark web markets, creating a "Harvest Now, Decrypt Later" risk. Despite overall concerns, exchanges like Coinbase...

    Read More »
  • Secure Your Google Workspace: Protect Data, Not Just Access

    Secure Your Google Workspace: Protect Data, Not Just Access

    Modern digital workplaces face security challenges from interconnected tools, where attackers exploit legitimate access tokens rather than breaching traditional perimeters. Recent incidents, like the Drift Email compromise, show that third-party integrations can bypass robust security frameworks,...

    Read More »
  • Unlock Better Security with a Password Audit

    Unlock Better Security with a Password Audit

    Regular password audits help organizations identify weak or exposed credentials and strengthen overall cybersecurity defenses by revealing vulnerabilities before they can be exploited. Weak password practices, such as widespread reuse and infrequent updates, contribute significantly to data breac...

    Read More »
  • 61% of US Firms Hit by Insider Data Breaches

    61% of US Firms Hit by Insider Data Breaches

    61% of US companies faced insider data breaches in the last two years, costing an average of $2.7 million per organization due to penalties and operational disruptions. Insider threats include both intentional malicious actions and unintentional mistakes, with file storage systems and web-based t...

    Read More »
  • Cyber Security Month: Are You at Risk of a Cyber Crash?

    Cyber Security Month: Are You at Risk of a Cyber Crash?

    This October's Cyber Security Awareness Month is a critical call to action for Australian businesses, emphasizing the urgent need to address digital vulnerabilities highlighted by recent data breaches and sophisticated phishing attacks. Organizations must modernize legacy technology and implement...

    Read More »
  • Insight to Acquire Cybersecurity Firm Sekuro

    Insight to Acquire Cybersecurity Firm Sekuro

    Insight Enterprises' Australian subsidiary is acquiring Sekuro to strengthen its cybersecurity offerings in the Asia Pacific region, addressing the increasing cyber threats faced by enterprises and governments. Sekuro provides comprehensive services including managed security, governance, and com...

    Read More »
  • Hackers Extort 39 Victims With New Data Leak Site

    Hackers Extort 39 Victims With New Data Leak Site

    A new cybercriminal group, Scattered Lapsus$ Hunters, is extorting nearly 40 major corporations by threatening to leak stolen data from Salesforce databases obtained through social engineering. The stolen data includes personal and contact details, sensitive information like Social Security numbe...

    Read More »
  • PQC Adoption, Android Spyware, and FEMA Data Breach: Key Updates

    PQC Adoption, Android Spyware, and FEMA Data Breach: Key Updates

    Microsoft has enhanced its security products with AI-ready Sentinel and Security Copilot, enabling automated threat response and easier deployment through the Microsoft Security Store. Insider threats and data breaches were highlighted, including a bribery attempt on a BBC journalist and breaches...

    Read More »
  • Small Business Cyber Insurance Demand Jumps 50%

    Small Business Cyber Insurance Demand Jumps 50%

    Small business cyber insurance adoption surged 50% in one year and 85% over three years, reflecting a major shift in risk management strategies. The increase is driven by growing awareness of cyberattacks' devastating financial impacts, including operational costs, legal fees, and reputational da...

    Read More »
  • 1 in 5 Teens Have Dated AI or Know Someone Who Has

    1 in 5 Teens Have Dated AI or Know Someone Who Has

    One in five high school students reports having or knowing someone with a romantic relationship with AI, and 42% have used AI for companionship, indicating a shift in youth-tech interactions. Schools with extensive AI integration face increased risks, including data breaches, deepfakes used for h...

    Read More »
  • Google Exposes Internal Security Threats

    Google Exposes Internal Security Threats

    The profile of cybercriminals is shifting from state-sponsored actors to individuals, including teenagers in Western nations, who pose a growing internal threat. Groups like Scattered Spider, composed of minors from allied countries, engage in diverse criminal activities from sextortion to ransom...

    Read More »
  • Salesloft & Drift Breach Results, Malicious GitHub Installers Exposed

    Salesloft & Drift Breach Results, Malicious GitHub Installers Exposed

    Major platforms like Salesloft and Drift were breached via unauthorized GitHub access, emphasizing the need for strong access controls and monitoring. A malvertising campaign in the EU is distributing fake GitHub Desktop installers to deliver malware, urging IT professionals to verify software so...

    Read More »
  • Relyance AI Data Defense Engineer: Securing AI-Driven Data

    Relyance AI Data Defense Engineer: Securing AI-Driven Data

    Relyance AI's Data Defense Engineer provides continuous, AI-driven monitoring and protection of data pathways, autonomously enforcing security policies without human intervention. The platform offers real-time visibility into data flows and allows security teams to query data movements in plain E...

    Read More »
  • NVIDIA Triton Server Exposes Critical Security Vulnerabilities

    NVIDIA Triton Server Exposes Critical Security Vulnerabilities

    Security researchers discovered high-risk vulnerabilities in NVIDIA's Triton Inference Server, allowing attackers to remotely take control of systems without authentication. The flaws (CVE-2025-23319, CVE-2025-23320, CVE-2025-23334) could lead to model theft, data breaches, response manipulation,...

    Read More »
  • Fighting Next-Gen Financial Fraud: Key Strategies

    Fighting Next-Gen Financial Fraud: Key Strategies

    Synthetic identity scams cost U.S. banks $6 billion annually, with criminals using data breaches and AI-powered tools to create and exploit fake identities. AI accelerates fraud by enabling large-scale scams, such as advance-fee schemes, where criminals target victims more efficiently and at mini...

    Read More »
  • Data Hoarding Risks: Financial & Security Dangers Exposed

    Data Hoarding Risks: Financial & Security Dangers Exposed

    Businesses face significant financial and security risks from data hoarding, as cybercriminals exploit vulnerabilities created by retaining unnecessary data. Nearly half of enterprises store unneeded data, leading to breaches and leaks, with 86% of organizations experiencing breaches in the past ...

    Read More »
  • Zero Trust: Slash Cyber Risk and Insurance Claims

    Zero Trust: Slash Cyber Risk and Insurance Claims

    Businesses in Australia and Oceania are facing a sharp rise in sophisticated cyberattacks, and adopting a Zero Trust security architecture can significantly reduce both the frequency and financial impact of these incidents. Research shows that implementing Zero Trust could have prevented up to 42...

    Read More »
  • Netgear's New Enterprise Security for Small Businesses

    Netgear's New Enterprise Security for Small Businesses

    Netgear has launched the Exium platform, an all-in-one SASE and hybrid firewall solution specifically designed for small and medium enterprises to address their critical cybersecurity needs. The platform integrates advanced features like AI-driven zero-trust network access, secure web gateway, SD...

    Read More »
  • CISOs Bet on Metadata as Key to 2026 Cyber Defense

    CISOs Bet on Metadata as Key to 2026 Cyber Defense

    Metadata is becoming central to cybersecurity defense strategies for 2026, with 86% of CISOs emphasizing its importance alongside packet-level data for enhancing security posture. AI is viewed as both a transformative technology and a challenge, accelerating digital transformation while increasin...

    Read More »
  • US Data at Risk as Key Cyber Law Expires

    US Data at Risk as Key Cyber Law Expires

    The Cybersecurity Information Sharing Act (CISA 2015) has expired, removing legal immunity for companies that share cyber threat intelligence and exposing them to lawsuits. Experts warn the lapse undermines national security by discouraging threat data sharing, increasing risks like software supp...

    Read More »
  • UK Renews Push for Apple to Unlock Encrypted iCloud Data

    UK Renews Push for Apple to Unlock Encrypted iCloud Data

    The UK government is pressuring Apple to create access to encrypted iCloud data for British users, despite previous claims that such efforts had stopped. Apple has removed its Advanced Data Protection feature from the UK market and reaffirmed its commitment to not building backdoors into its serv...

    Read More »
  • NETGEAR Exium: Unified SASE & Firewall for SMEs & MSPs

    NETGEAR Exium: Unified SASE & Firewall for SMEs & MSPs

    NETGEAR has launched Exium, a unified SASE and hybrid firewall platform specifically designed for SMEs and MSPs, consolidating multiple security functions into a single, easy-to-manage system to address a critical market gap. Exium integrates advanced security features like threat protection, zer...

    Read More »
  • Secure Your Digital Life This Cybersecurity Month

    Secure Your Digital Life This Cybersecurity Month

    Digital technology's pervasive role in daily life makes online safety a critical necessity, with governments emphasizing mandatory protection against cyber threats in our interconnected environment. Australians have suffered over $48 million in losses from approximately 25,000 scam incidents this...

    Read More »
  • 2025 Fraud Trends: Rising Risks for Online Retailers

    2025 Fraud Trends: Rising Risks for Online Retailers

    The eCommerce sector is experiencing a surge in fraudulent activities driven by financial pressures, geopolitical instability, and evolving cyber threats, requiring urgent action from retailers. Emerging fraud trends include remote access attacks, card testing, and loyalty program exploitation, w...

    Read More »
  • Neon App Pays Users to Record Calls & Sells Data to AI

    Neon App Pays Users to Record Calls & Sells Data to AI

    Neon Mobile, an app that pays users to record their phone calls and sells the audio to AI companies, has rapidly risen to the number two spot in the U.S. Apple App Store's Social Networking category. The app records only the user's side of conversations unless both parties are Neon users, a strat...

    Read More »
  • Cut IT Costs with Self-Service Password Resets

    Cut IT Costs with Self-Service Password Resets

    Self-service password reset (SSPR) solutions reduce IT support costs and improve security by allowing employees to independently handle login issues, freeing up help desk resources and minimizing productivity losses. Implementing SSPR addresses the financial burden of password resets, which can c...

    Read More »
  • NCA Chairs Five Eyes Group, Singles Out "The Com"

    NCA Chairs Five Eyes Group, Singles Out "The Com"

    The UK's National Crime Agency now leads the Five Eyes Law Enforcement Group, focusing on combating digital threats and dismantling criminal networks like "The Com." "The Com" is a dangerous online network involved in cybercrime, financial laundering, child exploitation, and links to groups like ...

    Read More »