Breaches: Page 13


  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Insurance holding company Group 1001 says operations restored after ransomware attack

    The company did not pay a ransom following a February attack that disrupted operations at several of its member companies.

    By March 7, 2023
  • Post-its on a glass wall
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    LastPass aftermath leaves long to-do list for business customers

    Organizations using the password manager are exposed after a major breach compromised credentials and, potentially, business secrets.

    By March 6, 2023
  • Aerial view of a winding mountain road.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    LastPass breach timeline: How a monthslong cyberattack unraveled

    A threat actor evaded detection for months and blended in with legitimate activity after targeting 1 of 4 engineers with access to keys to the kingdom.

    By Updated March 3, 2023
  • Computer engineer working with a computer interface in a factory.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA red team cracks a critical infrastructure provider’s defenses, a lesson in lateral access

    The voluntary assessment raises concerns as the unnamed organization with a mature security program was unable to detect simulated actors moving laterally across its systems for months.

    By March 1, 2023
  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    LastPass compromise grew worse after DevOps engineer targeted for encryption key

    A threat actor used data from multiple breaches and a vulnerability on a high-level employee’s home computer to steal customer passwords.

    By Feb. 28, 2023
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Phishing takes financial bite out of more victim organizations

    The majority of organizations, 84%, experienced at least one successful phishing attack in 2022, Proofpoint research found.

    By Feb. 28, 2023
  • GoDaddy logo depicted on the floor of the New York Stock Exchange
    Image attribution tooltip
    Spencer Platt/Getty Images via Getty Images
    Image attribution tooltip

    For GoDaddy customers, a long dwell time means all could be victims

    The web hosting provider has not shared additional details outlining the extent of the breach, but experts are highlighting the incident's multiple red flags.

    By Feb. 23, 2023
  • Gulls swarm to eat fishing waste from vessel.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Attackers reduce complexity to catch more potential victims

    Palo Alto Networks warns attackers are building economies of scale by conducting more efficient operations and complementing their skills with commercially available tools.

    By Feb. 23, 2023
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Phishing, king of compromise, remains top initial access vector

    IBM Security X-Force’s annual threat intelligence report highlights what makes phishing such a dangerous and persistent point of entry.

    By Feb. 22, 2023
  • GoDaddy banner hangs outside of the New York Stock Exchange
    Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    GoDaddy source code stolen as part of a multiyear campaign

    An investigation into the root cause of the incident is ongoing. The web hosting provider declined to say how many potential customers are impacted.

    By Feb. 17, 2023
  • The seal of the FBI
    Image attribution tooltip
    Chip Somodevilla / Staff via Getty Images
    Image attribution tooltip

    FBI contains ‘isolated’ malicious activity on network

    The agency said an investigation into the incident is ongoing. The origin and scope of the incident have yet to be confirmed.

    By Feb. 17, 2023
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies grapple with post-breach disclosure risks

    The concerns leading organizations to withhold information are aplenty, including reputational damage and financial impacts.

    By Feb. 16, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Reddit says limited amount of source code, employee data accessed in phishing attack

    Hackers stole an employee’s credentials in a sophisticated attack this week, after prompting workers to interact with a fake intranet site.

    By Feb. 10, 2023
  • Pair of hands type on keyboard while coding
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    98% of organizations worldwide connected to breached third-party vendors

    A report by SecurityScorecard shows the extent to which third- and fourth-party relationships increase the risk of cyberattacks.

    By Feb. 2, 2023
  • Connection network in dark servers data center room storage systems.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Microsoft disables phishing campaign after researchers flag OAuth app abuse

    Proofpoint researchers uncovered a malicious campaign where threat actors abused Microsoft’s “verified publisher” status and tricked executives into granting permissions.

    By Feb. 1, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    GitHub resets code signing certificates following breach

    The incident closely follows a series of indirect source code repository breaches impacting Slack and Okta.

    By Feb. 1, 2023
  • A depiction of computer hardware.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Most data breach notices lacked detail in 2022

    Organizations were not forthright with the causes or potential risks stemming from disclosed incidents.

    By Jan. 30, 2023
  • Two technologists stand in front of IT infrastructure.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Almost half of critical manufacturing organizations face significant risk of data breach

    A report presented at the World Economic Forum shows key sectors are under pressure from rising vulnerabilities and a slower rate of patching.

    By Jan. 23, 2023
  • T-Mobile storefront in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Experts question T-Mobile’s security culture as breach cycle churns

    The gap between the threat actor’s intrusion and T-Mobile’s detection underscores multiple unresolved challenges.

    By Jan. 20, 2023
  • An image of a Taco Bell store.
    Image attribution tooltip
    Courtesy of Taco Bell
    Image attribution tooltip

    Ransomware attack against Yum! Brands follows several incidents targeting restaurant industry

    Criminals see restaurants and mobile ordering apps as ripe targets for credential stuffing and financial fraud.

    By Jan. 20, 2023
  • A Mailchimp logo on a phone with a larger Mailchimp in the background.
    Image attribution tooltip

    Rafael Henrique/Zumapress/Newscom

    Image attribution tooltip

    Mailchimp hit by second cyberattack in 6 months, 133 customers impacted

    The social engineering incident is similar to an August cyberattack that targeted customers in the crypto industry.

    By Jan. 19, 2023
  • Picture of a cybersecurity lock
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber, business interruption remain top global corporate risks

    Risk management leaders remain highly concerned about the threat of malicious attacks and data breaches, according to Allianz Global.

    By Jan. 18, 2023
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CircleCI probe links malware placed on engineer’s laptop to larger breach

    An unauthorized actor, after stealing a valid SSO session, was able to exfiltrate data, including customer environment variables, tokens and keys.

    By Jan. 13, 2023
  • Connection network in dark servers data center room storage systems.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CircleCI working with AWS to identify, revoke keys impacted by security incident

    The company assured customers there is no indication that AWS accounts were accessed. CircleCI has scheduled an incident report for Jan. 17.

    By Jan. 12, 2023
  • Rendered image depicting global networks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    FCC revives push to speed up telecom incident disclosures

    Telecom operators are a primary target for threat actors. A change to breach reporting rules is long overdue, one analyst said.

    By Jan. 10, 2023