Remove category cyber-insurance
article thumbnail

List of Data Breaches and Cyber Attacks in October 2022 – 9.9 Million Records Breached

IT Governance

Welcome to our October 2022 review of data breaches and cyber attacks. As always, you can find the full list of data breaches and cyber attacks below, divided into their respective categories. Cyber attacks.

article thumbnail

List of Data Breaches and Cyber Attacks in November 2022 – 32 Million Records Breached

IT Governance

Welcome to our November 2022 review of data breaches and cyber attacks. The second was a cyber attack on the Russian scooter-sharing service Whoosh, which was discovered after customers’ data was put up for sale on the dark web. Cyber attacks. Cyber attacks. Personal Paraguay telecom victim of cyber attack (unknown).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of Data Breaches and Cyber Attacks in August 2022 – 97 Million Records Breached

IT Governance

In a month that saw the former US president accused of misappropriating classified government documents, there were also a spate of malicious insiders compromising their employer’s systems. You can find the full list of incidents below, broken into their respective categories. Cyber attacks. Cyber attacks. Ransomware.

article thumbnail

The Week in Cyber Security and Data Privacy: 20 – 26 November 2023

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. This week, we’re taking a slightly different approach with the ‘publicly disclosed data breaches and cyber attacks’ category, presenting the most interesting data points in a table format.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

Risk 147
article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

Often, a scammer will simply target the people in a company and fool them into giving up their personal details, account passwords, and other sensitive information and gain access that way. To talk about which targets scammers pick, we’ll be looking at two categories: individuals and businesses. of cyber attacks IBM handled.

article thumbnail

US Senators introduce IoT cybersecurity bill

Data Protection Report

On August 1, 2017, US Senators unveiled a bipartisan bill to mandate baseline cybersecurity requirements for internet connected devices purchased by the federal government. Refrain from using hard-coded credentials or passwords. Use software and components that can be updated and patched.

IoT 40