Remove Blockchain Remove Insurance Remove Military Remove Security
article thumbnail

List of data breaches and cyber attacks in February 2022 – 5.1 million records breached

IT Governance

The cyber security industry, much like the rest of the world, is on edge. In the final days of February, there were a flurry of security incidents related, either directly or indirectly, to the Ukraine conflict. It will take place on Thursday, 3 March at 3pm, and you can register for on our website.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 April 2024

IT Governance

Compromised data includes names, passport numbers, Social Security numbers, online crypto account identifiers and bank account numbers. Publicly disclosed data breaches and cyber attacks: in the spotlight Criminal hackers threaten to leak World-Check screening database A criminal group known as GhostR claims to have stolen 5.3

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 January 2024

IT Governance

Publicly disclosed data breaches and cyber attacks: in the spotlight More than 70 million email addresses added to Have I Been Pwned The security researcher Troy Hunt has added more than 70 million email addresses from the Naz.API data set to his Have I Been Pwned data breach notification service. VF Corporation confirms 35.5

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

Until recently, I was fairly active on Twitter , regularly tweeting to more than 350,000 followers about important security news and stories here. The records also reveal how Conti dealt with its own internal breaches and attacks from private security firms and foreign governments. million users.

Passwords 225
article thumbnail

The Hacker Mind Podcast: Tales From A Ransomware Negotiator

ForAllSecure

Mark Lance, the VP of DFIR and Threat intelligence for GuidePoint Security, provides The Hacker Mind with stories of ransomware cases he’s handled. One other thing: the Conti source code was also leaked, allowing security companies to create their own decryption services for anyone infected with the Conti ransomware. By no means.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Recent guidance from the Securities and Exchange Commission (SEC) on disclosure and enforcement actions by the Federal Trade Commission (FTC) make clear that cybersecurity is no longer a niche topic, but a concern significant enough to warrant the oversight of corporate boards of directors. Designing an Enterprise-Level Approach. Principle 5.

article thumbnail

LockBit is back and threatens to target more government organizations

Security Affairs

The NCA and its global partners have secured over 1,000 decryption keys that will allow victims of the gang to recover their files for free. All of this information has no value because it is all passed to the FBI and without hacking the panel, after every transaction by insurance agents or negotiators.