article thumbnail

Weekly Update 216

Troy Hunt

Alrighty, quickie intro before I rush off to hit the tennis court, catch up with old friends, onto the wake park before BBQ and, of course, ??.

Mining 135
article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yesterday, I wrote the first part of this 5-part series on fixing data breaches and I focused on education. The next few parts of this series all focus on cures - how do we fix data breaches once bad code has already been written or bad server configurations deployed? Best of all, it's about prevention rather than cure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks social-engineered GoDaddy staff to take over crypto-biz domains

Security Affairs

In due course, the malicious actor was able to partially compromise our infrastructure, and gain access to document storage.” ” Cyber criminals also targeted crypto-mining firm NiceHash with the same technique and successfully carried out a DNS hijacking attack.

article thumbnail

Fixing Data Breaches Part 4: Bug Bounties

Troy Hunt

Over the course of this week, I've been writing about "Fixing Data Breaches" which focuses on actionable steps that can be taken to reduce the prevalence and the impact of these incidents. Let's move on and talk about why this makes a lot of sense when it comes to fixing data breaches. across the internet.

article thumbnail

Acuity Who? Attempts and Failures to Attribute 437GB of Breached Data

Troy Hunt

Allegedly, Acuity had a data breach. That's the context that accompanied a massive trove of data that was sent to me 2 years ago now. One of the first things I do after receiving a data breach is to literally just Google it: acuity data breach. And the column names line up!

Insurance 121
article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks: in the spotlight Hathaway breached, 41.5 Data breached: 41,500,000 records. They accessed 41.5

article thumbnail

SHARED INTEL: A foolproof consumer’s guide to creating and managing bulletproof passwords

The Last Watchdog

You see, these days, many data breaches could be traced back to people using the same password across multiple accounts. Most people say “what if the password manager gets hacked” while this might be a valid concern, it’s not a concern of mine. You can use the same method, of course, for the smaller parts of the password.

Passwords 133