Earl Enterprises, owner of several popular restaurant brands, including Buca di Beppo, Planet Hollywood, and Mixology 101, admitted in early April that cybercriminals had stolen customer payment card data from several of its restaurant chains a period of 10 months.
German chemical manufacturer Bayer, maker of aspirin and other products, confirmed reports of a hacking attack, insisting no data had been stolen.
Two third-party Facebook application developers exposed users' personal information by leaving the data exposed in unsecured Amazon web hosting S3 buckets.
Facebook itself continues to struggle with privacy concerns and poor security practices.
Sources: TheHackerNews.com (Instagram) and TheHackerNews.com (Facebook)
India’s third-largest IT outsourcing company, Wipro, has been plagued by a network intrusion from what investigators initially assumed to be a state-sponsored attacker. Wipro engaged a forensics investigation firm after detecting abnormal activity in several employee accounts on their network, the result of an advanced phishing campaign.
A security incident lasting at least 90 minutes disrupted live broadcasting from The Weather Channel in mid-April.
Several municipalities have been dealing with the aftermath of ransomware attacks. Attacks impacted the cities of Augusta, Maine, Stuart, FL and Greenville, NC, and Imperial County in California.
Researchers recently stumbled upon an unprotected database, hosted on Microsoft cloud servers, storing 24GB of information on individuals in roughly 80 million (some 60%) of U.S. households. The owner of the database has not been identified, but Microsoft has stepped in to remove it until the database can be secured.
Cybercriminals deployed the Magecart card-skimming code to the Atlanta Hawks’ online store, stealing customers names, addresses and payment card numbers.
Sextortion scams, a type of ransom attack that seeks to obtain payment in exchange for withholding an alleged “sex tape” video from public release, is nothing new, but tactics have been evolving.
A threat actor, tracked as “TA505” is responsible for some of the largest malicious spam campaigns observed, distributing instances of the banking Trojans known as Dridex and The Trick, ransomware Locky and Jaff, and several other threat vectors in very high volumes.
U.S. authorities announced in federal court last month that they had obtained a Foreign Intelligence Surveillance Act (FISA) warrant enabling them to spy on and gather information from Huawei as the U.S. Attorney’s office builds its case against the Chinese telecom equipment manufacturer.
Cybersecurity researchers from Fire Eye have discovered the full source code of the malware known as Carbanak.
Europol, with the FBI and other law enforcement agencies, cracked down on an illegal goods trade in late March, making 61 arrests and shuttering the “Dream Market” dark web site.
How safe is your organization? Take the Cyber Risk Scorecard survey to assess your current cybersecurity standing and find additional steps your organization can take to protect against common cyber threats.
401(k) retirement plan data is a massive cyber breach waiting to happen, but who is actually responsible for keeping participant data safe? Join us for a Cybersecurity and your 401(k) plan webinar addressing your fiduciary obligations as a retirement plan sponsor.
Jake Omann specializes in providing clients with risk management and executive risk services that cover their liabilities as a corporation, as well as the personal liabilities of their directors and officers. He started his career over 10 years ago in sales at a multinational financial services co
Jake Omann specializes in providing clients with risk management and executive risk services that cover their liabilities as a corporation, as well as the personal liabilities of their directors and officers. He started his career over 10 years ago in sales at a multinational financial services corporation before beginning his broker career in managing executive risk programs for Fortune 500 companies. Jake currently sits on the board for ACES for Kids.
Wire transfer requests top the list of business email compromise (BEC) objectives, according to a study by Barracuda Networks. Additional objectives laid out by the report include duping users into clicking on malicious links, establishing rapport and stealing information, with the end goal of extorting millions of dollars from unsuspecting companies.
This month's Threat Intelligence Report is about a large hotel chain that reports an “unauthorized access” to its customer database since 2014, exposing data of 500 million guests; a vulnerability in a postal service site that left 60 million customers exposed for more than a year; a third-party vendor breach that exposes data of millions of healthcare patients; a new report that profiles notorious MageCart cyber criminals; court documents that reveal first-ever indictment on ransomware charges; and a bundled pack that makes SamSam and other ransomware easier for hackers to obtain and deploy.
Send a Message
Find a Location