This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Vietnam-linked APT group APT32 , also known as OceanLotus and APT-C-00, carried out cyber espionage campaigns against Chinese entities to gather intelligence on the COVID-19 crisis. Now the Facebook security team has revealed the real identity of APT32 , linking the group to an IT company in Vietnam named CyberOne Group. .
Cybercrime gang tracked as TA505 has been active since 2014 and focusing on Retail and Banking industries. The group that is known for the distribution of the Dridex Trojan and the Locky ransomware , has released other pieces of malware including the tRat backdoor and the AndroMut downloader. .
This was confirmed about a fortnight later, in early November, when the ALPHV/BlackCat ransomware group took responsibility for the attack , claiming to have encrypted Henry Schein’s files and exfiltrated 35 TB of data. Data breached: over 300 million records. The company’s description of the incident suggested ransomware.
Financial information. Malicious insiders and miscellaneous incidents. In other news…. Cyber attacks. Ransomware. million) Phil i ppines COVID-19 track and trace app leaks citizens’ data (unknown) Contractor mistakenly removed data from Hong Kong’s Queen Mary Hospital (442) Cloud Clusters Inc.
suffers second ransomware attack in months Having been struck by a ransomware attack in October by the BlackSuit group , which led to operations and appointments being postponed, Akumin Inc. has suffered a second attack, this time by the BianLian ransomware group. Source (New) Retail USA Yes 2,469 Three GreatStar Industrial Co.
GB City of Clemson, South Carolina Source New Public USA Yes 21,056 DGX-Dependable Hawaiian Express Source New Professional services USA Yes 20 GB Verdimed Source New Agricultural Spain Yes 19 GB Watchmax Source New Retail UK Yes 15,000 Del-Tron Precision Source New Manufacturing India Yes 8.9 GB Signature Performance, Inc.
Presented by Amy Konary, Zuora Global VP, Subscribed Strategy Group. This transformation from ownership to usership started in software but can be applied to almost every industry, from entertainment and retail to agriculture, energy, construction, trade, and transport. Usership vs. Ownership .
Source New Retail USA Yes 12 Family and Children’s Services of Lanark, Leeds and Grenville Source New Public Canada Yes 4 100 Romanian hospitals using the Hipocrate Information System Source 1 ; source 2 New Healthcare USA Yes Unknown Prudential Financial Source New Finance USA Yes Unknown Securence (a subsidiary of U.S.
Publicly disclosed data breaches and cyber attacks: in the spotlight Criminal hackers threaten to leak World-Check screening database A criminal group known as GhostR claims to have stolen 5.3 million records from World-Check, a screening database used to screen potential customers for links to illegal activity and government sanctions.
million patients’ data via unsecured database According to DataBreaches.net, EyeCare Services Partners – a group of eye care providers based in Dallas, Texas – left 50 TB of data exposed via an unsecured blob. Data breached: at least 456,000 records. EyeCare Services Partners exposes more 3.5 The biggest database in the blob contained 3.1
Dori Media Group allegedly had more than 100 TB of data exfiltrated The MalekTeam Group claims to have destroyed more than 100 TB of data from Dori Media Group, an international group of media companies in Israel, Switzerland, Argentina, Spain and Singapore. The group is threatening to leak the exfiltrated data.
It specializes in poultry production, animal feed, and related agricultural operations. The company supplies chicken products to retail, wholesale, and fast-food markets in South Africa and neighboring countries. The Group acted swiftly, implementing all disaster recovery protocols and preparedness plans.
2,350,236 individuals’ health data compromised in American Vision Partners breach Medical Management Resource Group, L.L.C. GB Tiete Automobile Source (New) Retail Brazil Yes 68.5 GB Tiete Automobile Source (New) Retail Brazil Yes 68.5 GB Tiete Automobile Source (New) Retail Brazil Yes 68.5 Lin International Group Ltd.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content