Remove contact-us
article thumbnail

Arrests and Indictments in LockBit Crackdown

Data Breach Today

US, UK and European Authorities Seize Decryption Keys and Will Contact Victims An international law enforcement operation that infiltrated ransomware-as-a-service operation LockBit has resulted in arrests, indictments and the seizure of encryption keys that can be used to help victims recover their data.

article thumbnail

MongoDB investigates a cyberattack, customer data exposed

Security Affairs

MongoDB on Saturday announced it is investigating a cyberattack that exposed customer account metadata and contact information. MongoDB is a US company that developed the popular open-source NoSQL database management system. ” The US firm urges customers to be vigilant for social engineering and phishing attacks.

Metadata 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LockBit ransomware gang claims to have breached accountancy firm Xeinadin

Security Affairs

The gang threatens to publish the data if the company does not contact them within the deadline of 25 December 2023. “We suggest Xeinadin management to contact us and correct their mistakes, preventing a huge leak of customer data. ” reads the message published by the ransomware group on its Tor leak site.

article thumbnail

Contact-Tracing App Privacy: Apple, Google Refuse to Budge

Data Breach Today

Germany Changes Tack to Decentralized Model; Some US States Seek More Control Apple and Google have promised to help facilitate contact-tracing apps, but they've rejected calls to give users' location data to governments, as the U.K., France and some U.S. states are demanding.

Privacy 297
article thumbnail

New Study: 2018 State of Embedded Analytics Report

Why do some embedded analytics projects succeed while others fail? We surveyed 500+ application teams embedding analytics to find out which analytics features actually move the needle. Read the 6th annual State of Embedded Analytics Report to discover new best practices. Brought to you by Logi Analytics.

article thumbnail

Secret White House Warrantless Surveillance Program

Schneier on Security

Using a technique known as chain analysis, the program targets not only those in direct phone contact with a criminal suspect but anyone with whom those individuals have been in contact as well.

Mining 109
article thumbnail

Treasury Markets Disrupted by ICBC Ransomware Attack

Dark Reading

The US Treasury states that it is in contact with financial regulators as it monitors the breach.

Marketing 104