article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 April 2024

IT Governance

Honor, Huawei, iFlytek, OPPO, Samsung Electronics, Tencent, Vivo and Xiaomi Technology. Keyboard app vulnerabilities reveal keystrokes to network eavesdroppers Security researchers have identified critical security vulnerabilities in Cloud-based pinyin keyboard apps from Baidu, Inc., Data breached: <1 billion people’s data.

article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 January 2024

IT Governance

Source (New) Retail USA Yes 2,588,849 Keenan & Associates Source 1 ; source 2 (Update) Insurance USA Yes 1,509,616 AGC Group Source (New) Manufacturing Japan Yes 1.5 TB Four Hands Source (New) Manufacturing USA Yes 1.5 TB Four Hands Source (New) Manufacturing USA Yes 1.5

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

TB LDLC Source (New) Retail France Yes 1,500,000 APROA Source (New) Professional services Argentina Yes 1,197,562 Petrus Resources Ltd. Source (New) Engineering Japan Yes >5 TB Array Networks Source (New) Cyber security USA Yes 2.5

article thumbnail

Steelcase office furniture giant hit by Ryuk ransomware attack

Security Affairs

Steelcase is a US-based furniture company that produces office furniture, architectural and technology products for office environments and the education, health care and retail industries. It is the largest office furniture manufacturer in the world. Steelcase has 13,000 employees and $3.7 billion in 2020.

article thumbnail

List of data breaches and cyber attacks in June 2021 – 9.8 million records breached

IT Governance

discloses ransomware incident (unknown). discloses ransomware incident (unknown). discloses ransomware incident (unknown).

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Additionally, many auto manufacturers now have the ability to remotely update software to fix vulnerabilities or even upgrade functionality. They have design constraints.

IoT 78
article thumbnail

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

aw (unknown). Ransomware.