article thumbnail

Delta Electronics, a tech giants’ contractor, hit by Conti ransomware

Security Affairs

Delta Electronics, a Taiwanese contractor for multiple tech giants such as Apple, Dell, HP and Tesla, was hit by Conti ransomware. Taiwanese electronics manufacturing company Delta Electronics was hit by the Conti ransomware that took place this week. ” states the data breach notification published by the company.

article thumbnail

List of data breaches and cyber attacks in November 2021 – 223.6 million records breached

IT Governance

Data breaches. If you find yourself facing a cyber security disaster, IT Governance is here to help. Data breaches. In the meantime, you can find the full list of security incidents below, with those affecting UK organisations listed in bold. Cyber attacks. Ransomware. Financial information. In other news….

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of data breaches and cyber attacks in June 2021 – 9.8 million records breached

IT Governance

And don’t forget to subscribe to our Weekly Round-up to receive the latest industry news and advice – including our Q2 review of data breaches and cyber attacks, based on these lists, which will be published in early July. Data breaches. If you find yourself facing a cyber security disaster, IT Governance is here to help.

article thumbnail

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

We’ll have a separate post looking at the year’s data breaches and cyber attacks in more detail, but in the meantime, you can find the full list of December’s incidents below. Data breaches. That brings the total for 2020 to more than 20 billion. As usual, incidents affecting UK organisations are in bold. Cyber attacks.

article thumbnail

Mitsubishi Electric discloses data breach, media blame China-linked APT

Security Affairs

. “On June 28, last year, a suspicious behavior was detected and investigated on a terminal in our company, and as a result of unauthorized access by a third party, data was transmitted to the outside,” reads a data breach notification published by the company. SecurityAffairs – data breach, hacking).

article thumbnail

How should you investigate a data breach?

IT Governance

Digital Guardian recently asked a group of cyber security experts what the most important step is following a data breach. So how should you approach a data breach investigation? This might be, for example,the victim’s computer, a web page or a physical space in which documents were compromised. The crime scene.

article thumbnail

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. The same goes with the advent of Quantum Computing , which is supposed to bring exponential computing power that shall not only bring endless benefits but also raises question marks on the current state of cryptography that is the bedrock of all information security as we know today.