article thumbnail

Law enforcement seized WeLeakInfo.com for selling access to data from data breaches

Security Affairs

The FBI has seized the WeLeakInfo.com websites for selling subscriptions to data that were exposed in data breaches. WeLeakInfo.com is a data breach notification service that allows its customers to verify if their credentials been compromised in data breaches. Pierluigi Paganini.

article thumbnail

Weekly podcast: Australian Cabinet Files, Matt Hancock MP’s app and Monero mining

IT Governance

This week, we discuss the Australian government’s loss of thousands of classified documents, DCMS Secretary of State Matt Hancock’s buggy new app and the growing trend of cybercriminals using cryptocurrency miners. Hello and welcome to the IT Governance podcast for Friday, 2 February 2018. Here are this week’s stories.

Mining 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 450 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA and ENISA enhance their Cooperation CISA adds Qlik bugs to exploited vulnerabilities catalog Report: 2.6 CISA and ENISA enhance their Cooperation CISA adds Qlik bugs to exploited vulnerabilities catalog Report: 2.6

article thumbnail

Security Affairs newsletter Round 401 by Pierluigi Paganini

Security Affairs

rail and locomotive company Wabtec hit with Lockbit ransomware Synology fixes multiple critical vulnerabilities in its routers Canadian Copper Mountain Mining Corporation (CMMC) shut down the mill after a ransomware attack BitRAT campaign relies on stolen sensitive bank data as a lure Does Volvo Cars suffer a new data breach?

article thumbnail

Using Data De-Identification to Protect Companies

Data Matters

Many companies hope to benefit from amassing large amounts of data by mining it for market insights, creating internal business models, and supporting strategic, data-driven decisions. Done properly, data de-identification can minimize risks to privacy interests—e.g., litigation discovery obligations.

Mining 74
article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks: in the spotlight Hathaway breached, 41.5 Data breached: 41,500,000 records. They accessed 41.5

article thumbnail

Fixing Data Breaches Part 4: Bug Bounties

Troy Hunt

Over the course of this week, I've been writing about "Fixing Data Breaches" which focuses on actionable steps that can be taken to reduce the prevalence and the impact of these incidents. Let's move on and talk about why this makes a lot of sense when it comes to fixing data breaches. across the internet.