article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

402,437,094 known records breached in 240 publicly disclosed incidents Welcome to this week’s global round-up of the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks.

article thumbnail

List of data breaches and cyber attacks in July 2019 – 2.2 billion records leaked

IT Governance

University of Alabama discovers 10-year-old account breach (1,400). Pennsylvania-based software firm and healthcare provider accuse each other of data theft (unknown). TX-based Wise Health reports data breach caused by phishing attack (35,899). Libraries in Onondaga Co., Data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CyberheistNews Vol 13 #25 [Fingerprints All Over] Stolen Credentials Are the No. 1 Root Cause of Data Breaches

KnowBe4

1 Root Cause of Data Breaches Verizon's DBIR always has a lot of information to unpack, so I'll continue my review by covering how stolen credentials play a role in attacks. So, what does the report say about the most common threat actions that are involved in data breaches?

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

With that an attacker couldn't necessarily intercept the data, but they could query the peloton API to get user data that they weren't supposed to. In other words, Peloton suffered from an API vulnerability that could potentially lead to a massive data breach. Okay, that's starting to get very personal.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

With that an attacker couldn't necessarily intercept the data, but they could query the peloton API to get user data that they weren't supposed to. In other words, Peloton suffered from an API vulnerability that could potentially lead to a massive data breach. Okay, that's starting to get very personal.

article thumbnail

The Hacker Mind Podcast: Going Passwordless

ForAllSecure

You might not think of it as a major aspect of security and yet, stolen credentials are really the key to data breaches today. So by that, I mean, if your developer libraries are available, it's easy to do. One of the eight required domains in the current CISSP certification process is Identity and Access Management, or IAM.