Remove Financial Services Remove Government Remove Manufacturing Remove Personal data
article thumbnail

Catches of the Month: Phishing Scams for October 2023

IT Governance

EvilProxy phishing campaign targets Microsoft 365 accounts via indeed.com A phishing campaign identified by Menlo Security has been targeting senior executives in various industries – most notably banking and financial services, property management and real estate, and manufacturing – since July. Can you spot a phishing scam?

Phishing 103
article thumbnail

Multinational ICICI Bank leaks passports and credit card numbers

Security Affairs

In 2022, the ICICI Bank’s resources were named a “critical information infrastructure” by the Indian government – any harm to it can impact national security. However, despite the critical status of bank infrastructure on the national level, the security of crucial data was not ensured. million files belonging to ICICI Bank.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

In January 2024, it identified more potential victims, and has now written to inform them that their personal data may have been compromised in the incident. Data breached: 2,632,275 people’s data. 204 of them are known to have had data exfiltrated, exposed or otherwise breached.

article thumbnail

The Economy of Things: the next value lever for telcos

IBM Big Data Hub

Telcos can also play the role of data providers as well as data marketplace and brokerage operators within the ecosystem. Vertical data platforms owned and operated by telcos and targeting a specific industry such as automotive, agriculture or financial services already exist today.

IoT 51
article thumbnail

Network Encryption Keeps Our Data in Motion Secure for Business Services

Thales Cloud Protection & Licensing

As global data is predicted to grow by more than 100% from 2022 to 2026, making it a top target for cybercriminals, businesses must prioritize cybersecurity solutions that offer protection without affecting network performance or management. These solutions encrypt data as it moves across networks for maximum security and performance.

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 December 2023

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Compromised information includes patients’ personal data, health and medical records, financial data, internal emails and software source code.

article thumbnail

EU’s possible Data Act: What can we anticipate from the Inception Impact Assessment and the Consultation?

Data Protection Report

The Commission is assessing the application of the Trade Secrets Directive in the context of the data economy, including a study focusing on four key sectors (automotive, health, energy and financial services) with a view to providing clarifying guidance at a later date. B2B data sharing: Ensuring fairness and competitiveness.

B2B 144