article thumbnail

Weekly podcast: Australian Cabinet Files, Matt Hancock MP’s app and Monero mining

IT Governance

Data breaches don’t just occur when cyber criminals hack your systems, and it’s as well to remember that sensitive information in all forms – including hard copy records – should be afforded appropriate protection. The app then still […] accesses the photo library whether the user denies access or not.”. What’s that?

Mining 66
article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks: in the spotlight Hathaway breached, 41.5 Data breached: 41,500,000 records. They accessed 41.5

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 228

Security Affairs

Malware Analysis Sandboxes could expose sensitive data of your organization. A backdoor mechanism found in tens of Ruby libraries. Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency. Mastercard data breach affected Priceless Specials loyalty program. million Bitcoin illegally earned.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. that the crooks were only able to mine a paltry $24 – which Coinhive refused to pay out anyway. Hello and welcome to the final IT Governance podcast of 2018.

article thumbnail

List of Data Breaches and Cyber Attacks in September 2022 – 35.6 Million Records Breached

IT Governance

Welcome to our September 2022 list of data breaches and cyber attacks. That’s because we’re looking for ways to improve the way we deliver this data. Our blog has become the go-to source for monthly data breach statistics, and we’ve been producing this series for over seven years. Data breaches.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

With that an attacker couldn't necessarily intercept the data, but they could query the peloton API to get user data that they weren't supposed to. In other words, Peloton suffered from an API vulnerability that could potentially lead to a massive data breach. Kent: I started calling friends of mine. He told me.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

With that an attacker couldn't necessarily intercept the data, but they could query the peloton API to get user data that they weren't supposed to. In other words, Peloton suffered from an API vulnerability that could potentially lead to a massive data breach. Kent: I started calling friends of mine. He told me.