Remove Communications Remove IT Remove Retail Remove Security
article thumbnail

Volvo retailer leaks sensitive files

Security Affairs

The Brazilian retail arm of car manufacturing giant Volvo leaked sensitive files, putting its clientele in the vast South American country in peril. Volvo’s retailer in Brazil, Dimas Volvo, leaked sensitive files through its website. website, belonging to an independent Volvo retailer in the Santa Catarina region of Brazil.

Retail 93
article thumbnail

Black Friday and Cyber Weekend: Navigating the Tumultuous Waters of Retail Cybersecurity

Thales Cloud Protection & Licensing

Black Friday and Cyber Weekend: Navigating the Tumultuous Waters of Retail Cybersecurity sparsh Tue, 11/21/2023 - 05:01 As global consumers gear up for the much-anticipated shopping bonanza that is Black Friday and Cyber Weekend, retailers brace themselves for the frenzied onslaught of shoppers and the deluge of cyber threats lurking in the shadows.

Retail 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Multiple Retailers Sued Under CCPA for Sharing Data Used to Identify Fraudulent Returns

Hunton Privacy

Earlier this year, The Retail Equation, a loss prevention service provider, and Sephora were hit with a class action lawsuit in which the plaintiff claimed Sephora improperly shared consumer data with The Retail Equation without consumers’ knowledge or consent. Code § 1798.150). Privacy Litigation , N.D.

Retail 144
article thumbnail

UK communications regulator Ofcom hacked with a MOVEit file transfer zero-day

Security Affairs

UK communications regulator Ofcom suffered a data breach after a Clop ransomware attack exploiting the MOVEit file transfer zero-day. UK’s communications regulator Ofcom disclosed a data breach after a Clop ransomware attack.

article thumbnail

News alert: SSH announces another US financial institution selects PrivX as its PAM solution

The Last Watchdog

Zero Trust Suite combines SSH’s proven-in-use communications security products into a modern passwordless, keyless, and borderless solution and further fortifying solutions with quantum-safe cryptography. We help our customers secure their business in the age of hybrid cloud and distributed IT and OT infrastructures.

IT 100
article thumbnail

GUEST ESSAY: Here’s why penetration testing has become a ‘must-have’ security practice

The Last Watchdog

Now, let me give you a few reasons, why pen testing has emerged as a “must-have” security practice. For example, your website security may prove strong, applications not so much. A pen test can inform and help clarify security policies and strategies. These can be applications, IoT, Networks, API etc.

Security 233
article thumbnail

GDPR – the facts and what it means for the retail sector

IT Governance

There has been a growing emphasis on taking a systematic approach to managing data, which can help organisations make decisions on the basis of accurate, meaningful data, as well as for improving how they personalise communications to customers (and potential customers). You must ensure appropriate security, integrity and confidentiality.

Retail 64