Breaches: Page 9


  • GoDaddy logo depicted on the floor of the New York Stock Exchange
    Image attribution tooltip
    Spencer Platt/Getty Images via Getty Images
    Image attribution tooltip

    For GoDaddy customers, a long dwell time means all could be victims

    The web hosting provider has not shared additional details outlining the extent of the breach, but experts are highlighting the incident's multiple red flags.

    By Feb. 23, 2023
  • Gulls swarm to eat fishing waste from vessel.
    Image attribution tooltip
    Matt Cardy / Stringer via Getty Images
    Image attribution tooltip

    Attackers reduce complexity to catch more potential victims

    Palo Alto Networks warns attackers are building economies of scale by conducting more efficient operations and complementing their skills with commercially available tools.

    By Feb. 23, 2023
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    Phishing, king of compromise, remains top initial access vector

    IBM Security X-Force’s annual threat intelligence report highlights what makes phishing such a dangerous and persistent point of entry.

    By Feb. 22, 2023
  • GoDaddy banner hangs outside of the New York Stock Exchange
    Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    GoDaddy source code stolen as part of a multiyear campaign

    An investigation into the root cause of the incident is ongoing. The web hosting provider declined to say how many potential customers are impacted.

    By Feb. 17, 2023
  • The seal of the FBI
    Image attribution tooltip
    Chip Somodevilla / Staff via Getty Images
    Image attribution tooltip

    FBI contains ‘isolated’ malicious activity on network

    The agency said an investigation into the incident is ongoing. The origin and scope of the incident have yet to be confirmed.

    By Feb. 17, 2023
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Companies grapple with post-breach disclosure risks

    The concerns leading organizations to withhold information are aplenty, including reputational damage and financial impacts.

    By Feb. 16, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    Reddit says limited amount of source code, employee data accessed in phishing attack

    Hackers stole an employee’s credentials in a sophisticated attack this week, after prompting workers to interact with a fake intranet site.

    By Feb. 10, 2023
  • Pair of hands type on keyboard while coding
    Image attribution tooltip
    scyther5 via Getty Images
    Image attribution tooltip

    98% of organizations worldwide connected to breached third-party vendors

    A report by SecurityScorecard shows the extent to which third- and fourth-party relationships increase the risk of cyberattacks.

    By Feb. 2, 2023
  • Connection network in dark servers data center room storage systems.
    Image attribution tooltip
    sdecoret via Getty Images
    Image attribution tooltip

    Microsoft disables phishing campaign after researchers flag OAuth app abuse

    Proofpoint researchers uncovered a malicious campaign where threat actors abused Microsoft’s “verified publisher” status and tricked executives into granting permissions.

    By Feb. 1, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Suebsiri via Getty Images
    Image attribution tooltip

    GitHub resets code signing certificates following breach

    The incident closely follows a series of indirect source code repository breaches impacting Slack and Okta.

    By Feb. 1, 2023
  • A depiction of computer hardware.
    Image attribution tooltip
    solarseven via Getty Images
    Image attribution tooltip

    Most data breach notices lacked detail in 2022

    Organizations were not forthright with the causes or potential risks stemming from disclosed incidents.

    By Jan. 30, 2023
  • Two technologists stand in front of IT infrastructure.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Almost half of critical manufacturing organizations face significant risk of data breach

    A report presented at the World Economic Forum shows key sectors are under pressure from rising vulnerabilities and a slower rate of patching.

    By Jan. 23, 2023
  • T-Mobile storefront in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Experts question T-Mobile’s security culture as breach cycle churns

    The gap between the threat actor’s intrusion and T-Mobile’s detection underscores multiple unresolved challenges.

    By Jan. 20, 2023
  • An image of a Taco Bell store.
    Image attribution tooltip
    Courtesy of Taco Bell
    Image attribution tooltip

    Ransomware attack against Yum! Brands follows several incidents targeting restaurant industry

    Criminals see restaurants and mobile ordering apps as ripe targets for credential stuffing and financial fraud.

    By Jan. 20, 2023
  • A Mailchimp logo on a phone with a larger Mailchimp in the background.
    Image attribution tooltip

    Rafael Henrique/Zumapress/Newscom

    Image attribution tooltip

    Mailchimp hit by second cyberattack in 6 months, 133 customers impacted

    The social engineering incident is similar to an August cyberattack that targeted customers in the crypto industry.

    By Jan. 19, 2023
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Cyber, business interruption remain top global corporate risks

    Risk management leaders remain highly concerned about the threat of malicious attacks and data breaches, according to Allianz Global.

    By Jan. 18, 2023
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    CircleCI probe links malware placed on engineer’s laptop to larger breach

    An unauthorized actor, after stealing a valid SSO session, was able to exfiltrate data, including customer environment variables, tokens and keys.

    By Jan. 13, 2023
  • Connection network in dark servers data center room storage systems.
    Image attribution tooltip
    sdecoret via Getty Images
    Image attribution tooltip

    CircleCI working with AWS to identify, revoke keys impacted by security incident

    The company assured customers there is no indication that AWS accounts were accessed. CircleCI has scheduled an incident report for Jan. 17.

    By Jan. 12, 2023
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    FCC revives push to speed up telecom incident disclosures

    Telecom operators are a primary target for threat actors. A change to breach reporting rules is long overdue, one analyst said.

    By Jan. 10, 2023
  • A Five Guys restaurant is pictured in London, England on May 7, 2020. The company confirmed a data breach last September in a series of consumer notification letters issued Dec. 29, 2022.
    Image attribution tooltip
    Alex Davidson via Getty Images
    Image attribution tooltip

    Five Guys says breach may have compromised applicant data

    The fast food chain said in letters to consumers that it first became aware of the breach in September 2022.

    By Ryan Golden • Jan. 10, 2023
  • AI
    Image attribution tooltip
    2d illustrations and photos via Getty Images
    Image attribution tooltip

    CircleCI incident raises further concerns about security of software development

    Customers expressed frustration after an apparent breach with few details forced engineers to rotate secrets stored on the CI/CD platform. 

    By Jan. 9, 2023
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    What’s at stake for 33M compromised LastPass users?

    Cybersecurity professionals criticized the password manager's response to an incident that escalated to alarming levels. “This is about as bad as it gets,” one researcher said.

    By Jan. 6, 2023
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    6 security experts on what cyberthreats they expect in 2023

    Organizations will keep a close eye on geopolitical tension and supply chain attacks. But at the core, the biggest threats are built on mistakes.

    By Naomi Eide , , Jan. 6, 2023
  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    What we know about the LastPass breach (so far)

    The blast radius from a breach at LastPass grew from bad to worse during a four-month period. Most of the data held by the password manager is now compromised.

    By Jan. 5, 2023
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Slack employee tokens stolen, GitHub repository breached

    The firm said the threat actor downloaded private code repositories, but none had customer data or the company’s code base.   

    By Jan. 5, 2023