Remove 10
Remove 2016 Remove 2020 Remove Retail Remove Security
article thumbnail

List of data breaches and cyber attacks in March 2020 – 832 million records breached

IT Governance

Australia’s Defence Force Recruiting systems were taken offline after security breach (unknown). South African utility provider Eskom is still feeling effects of a cyber security incident (unknown). Wichita State University notifies students and staff of a security incident (1,762). Data breaches. School District (+24).

article thumbnail

Wawa Breach May Have Compromised More Than 30 Million Payment Cards

Krebs on Security

10 and contained the breach by Dec. Wawa said the breach did not expose personal identification numbers (PINs) or CVV records (the three-digit security code printed on the back of a payment card). Pennsylvania-based Wawa says it discovered the intrusion on Dec. Gemini monitors multiple carding sites like Joker’s Stash.

Sales 310
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Latest MITRE EDR Evaluations Contain Some Surprises

eSecurity Planet

MITRE Engenuity last month released the latest MITRE ATT&CK evaluations of endpoint security products, and the results contain some pretty big surprises. The latest evaluations were dubbed Carbanak+FIN7 and were modeled after threat groups that target the banking and retail industries.

Analytics 133
article thumbnail

Regulatory Update: NAIC Fall 2019 National Meeting

Data Matters

The National Association of Insurance Commissioners (the NAIC) held its Fall 2019 National Meeting (Fall Meeting) in Austin, Texas, from December 7 to 10, 2019. The draft revisions include a requirement for producers to act in the “best interest” of a retail customer when making a recommendation of an annuity. AI Working Group.

article thumbnail

Regulatory Update: NAIC Fall 2019 National Meeting

Data Matters

The National Association of Insurance Commissioners (the NAIC) held its Fall 2019 National Meeting (Fall Meeting) in Austin, Texas, from December 7 to 10, 2019. The draft revisions include a requirement for producers to act in the “best interest” of a retail customer when making a recommendation of an annuity. AI Working Group.

article thumbnail

UK: Important judgment on de minimis threshold in data protection compensation claims – Wolfe -v- Veale

DLA Piper Privacy Matters

The Claimants claimed damages for misuse of confidential information, breach of confidence, negligence, damages under Article 82 of the General Data Protection Regulation 2016/279 and s169 Data Protection Act 2018 1 , plus a declaration and an injunction, interest and further or other relief. 3 Vidal-Hall v Google [2016] QB 1003.

Retail 91
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Rogue security software. Architect a premium network security model like SASE that encompasses SD-WAN , CASB , secure web gateways , ZTNA , FWaaS , and microsegmentation. In 2008, the Kraken botnet with 495,000 bots infected 10% of the Fortune 500 companies. In 2016, the Mirai botnet attack left most of the eastern U.S.

Phishing 104