Remove Subscribe
article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

From the telemarketer’s perspective, the TCPA can present something of a legal minefield in certain situations, such as when a phone number belonging to someone who’d previously given consent gets reassigned to another subscriber. Riip Digital did not respond to requests for comment.

Marketing 328
article thumbnail

6,009,014 MovieBoxPro Accounts Breached in Another Data Scraping Incident

IT Governance

At least 191 Australian organisations affected by ZircoDATA ransomware attack The ransomware group BlackBasta listed Australia-based ZircoDATA as a victim in February, allegedly exfiltrating 395 GB of data. Source 1 ; source 2 (Update) Insurance USA Yes 75,101 Airsoftc3.com Data breached: 1,201,000 people’s data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Management Lessons from Healthcare Woes

eSecurity Planet

Change Healthcare Ransomware The United Healthcare Group (UHG) acquisition of Change Healthcare in 2022 started paying the wrong type of dividends this February when stolen credentials led to over $870 million in damages. UHG didn’t do itself any favors with their communication strategy.

article thumbnail

List of data breaches and cyber attacks in July 2020 ­– 77 million records breached

IT Governance

Meanwhile, you can stay up to date with the latest news by subscribing to our Weekly Round-up or visiting our blog. Canadian insurer Heartland Farm Mutual says an employee’s email account breached (unknown). Brazilian health insurer Hapvida discloses cyber attack (unknown). Cyber attacks. In other news….

article thumbnail

What Is a Firewall Policy? Steps, Examples & Free Template

eSecurity Planet

Key firewall policy components include user authentication mechanisms, access rules, logging and monitoring methods, rule base, and numerous rule objects that specify network communication conditions. They define the conditions under which network communication is authorized and serve as key building blocks of network security regulations.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

The Kremlin breaks with all tradition and announces that — at the request of the United States — it has arrested 14 people suspected of working for REvil , one of the more ruthless and profitable Russian ransomware groups. Penchukov was arrested after leaving Ukraine to meet up with his wife in Switzerland.

Passwords 239
article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Compromised data includes policyholders’ and their families’ civil status, dates of birth and social security numbers, as well as the name of their health insurer and information relating to their contracts. Source New Defence USA Yes 1,051 Connecticut College Source New Education USA Yes 954 American Alarm & Communications Inc.