article thumbnail

Thousands of Humana customers have their medical data leaked online by threat actors

Security Affairs

Experts found a DB containing sensitive health insurance data belonging to customers of US insurance giant Humana. An SQL database containing what appears to be highly sensitive health insurance data of more than 6,000 patients has been leaked on a popular hacker forum.

Insurance 114
article thumbnail

Security Blueprints of Many Companies Leaked in Hack of Swedish Firm Gunnebo

Krebs on Security

But the password to the Gunnebo RDP account — “password01” — suggests the security of its IT systems may have been lacking in other areas as well. In the video, the REvil representative stated that the most desirable targets for the group were agriculture companies, manufacturers, insurance firms, and law firms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Catches of the Month: Phishing Scams for April 2023

IT Governance

The revenue comes through advertising, with YouTube inserting commercials in their videos. The message contains the subject line “Changes in YouTube rules and policies | Check the description”, and includes a video that has been shared with the user. Anyone who opens the attachment will discover two files: a.png image and a shortcut (.lnk).

Phishing 114
article thumbnail

List of Data Breaches and Cyber Attacks in October 2022 – 9.9 Million Records Breached

IT Governance

Mexico confirms hack of military records (unknown) Randolph-area school district disables its own website following transphobic hack (unknown) Australia’s Telstra hit by data breach, two weeks after attack on Optus (unknown) Patient details compromised in cyber attack on health provider Pinnacle (unknown) CHI Health faces ‘IT security incident’ impacting (..)

article thumbnail

11 cyber security predictions for 2020

IT Governance

Cyber insurance has in some regions encouraged victims to pay as it is cheaper than remediation in some cases. With better audio and video simulations, phishing will move on from email and text to things like Facebook videos. Weak passwords will continue to be exploited as attackers monetise credentials.

article thumbnail

CyberheistNews Vol 12 #49 [Keep An Eye Out] Beware of New Holiday Gift Card Scams

KnowBe4

Roger covers these three scams in a short [VIDEO] and in detail on the KnowBe4 blog: You Need to Pay a Bill Using Gift Cards. Blog post with 2:13 [VIDEO] and links you can share with your users and family: [link]. You can upload your own training video and SCORM modules into your account for home workers. Did You Know?

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

Impersonation of key senior personnel to remit fraudulent payment instructions via telephone and video. standard login passwords). hardware tokens and one-time passwords). Note, however, that a dual-password model constitutes only one factor (i.e., what a person has (e.g., who a person is (e.g., biometrics).