#data-breaches

[ follow ]
#cybersecurity
Privacy technologies
fromTechCrunch
5 months ago

Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunch

Stalkerware companies are continuously facing data breaches, revealing sensitive information of millions of victims.
Privacy professionals
fromDatabreaches
4 months ago

Attorney General James Sues National General and Allstate Insurance for Failing to Protect New Yorkers' Personal Information

New York AG sues National General and Allstate for data breaches exposing personal information of over 165,000 New Yorkers.
Privacy technologies
fromTechCrunch
4 months ago

Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunch

The stalkerware industry faces significant cybersecurity issues, with multiple breaches leading to massive data exposures.
Stalkerware apps expose sensitive user data, posing severe privacy risks for victims.
Growth hacking
fromThe Hacker News
4 months ago

How New AI Agents Will Transform Credential Stuffing Attacks

Credential stuffing attacks soared in 2024, driven by infostealer infections and a rise in stolen credentials, complicating online security significantly.
Privacy technologies
fromTechCrunch
5 months ago

Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunch

Stalkerware companies are continuously facing data breaches, revealing sensitive information of millions of victims.
Privacy professionals
fromDatabreaches
4 months ago

Attorney General James Sues National General and Allstate Insurance for Failing to Protect New Yorkers' Personal Information

New York AG sues National General and Allstate for data breaches exposing personal information of over 165,000 New Yorkers.
Privacy technologies
fromTechCrunch
4 months ago

Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunch

The stalkerware industry faces significant cybersecurity issues, with multiple breaches leading to massive data exposures.
Stalkerware apps expose sensitive user data, posing severe privacy risks for victims.
Growth hacking
fromThe Hacker News
4 months ago

How New AI Agents Will Transform Credential Stuffing Attacks

Credential stuffing attacks soared in 2024, driven by infostealer infections and a rise in stolen credentials, complicating online security significantly.
#hacking
Information security
fromDatabreaches
4 months ago

Criminal hacker known as ALTDOS, DESORDEN, GHOSTR and 0mid16B arrested

A notorious hacker known for multiple aliases has been arrested after a long-term cybercrime campaign targeting sensitive data for extortion.
fromHackernoon
1 year ago
Privacy professionals

Where Were You When the World Shut Down? I Was on BreachForums. | HackerNoon

fromThe Verge
1 day ago
US politics

This 'violently racist' hacker claims to be the source of the New York Times' Mamdani scoop

Information security
fromDatabreaches
4 months ago

Criminal hacker known as ALTDOS, DESORDEN, GHOSTR and 0mid16B arrested

A notorious hacker known for multiple aliases has been arrested after a long-term cybercrime campaign targeting sensitive data for extortion.
fromHackernoon
1 year ago
Privacy professionals

Where Were You When the World Shut Down? I Was on BreachForums. | HackerNoon

fromThe Verge
1 day ago
US politics

This 'violently racist' hacker claims to be the source of the New York Times' Mamdani scoop

#data-security
Information security
fromSecuritymagazine
3 months ago

Why every business needs a data security strategy

Data breaches expose sensitive information, necessitating robust data security measures to prevent financial loss, reputational damage, and compliance violations.
Information security
fromSecuritymagazine
3 months ago

Why every business needs a data security strategy

Data breaches expose sensitive information, necessitating robust data security measures to prevent financial loss, reputational damage, and compliance violations.
#cyber-security
#ai-security
fromHackernoon
1 year ago
Tech industry

The TechBeat: IPinfo Launches IPinfo PLUS: High-Resolution IP Privacy Data For Greater Certainty (7/7/2025) | HackerNoon

fromHackernoon
1 year ago
Tech industry

The TechBeat: Closing the Feedback Loop: Building AI That Learns from Its Users (7/3/2025) | HackerNoon

fromHackernoon
1 year ago
Tech industry

The TechBeat: IPinfo Launches IPinfo PLUS: High-Resolution IP Privacy Data For Greater Certainty (7/7/2025) | HackerNoon

fromHackernoon
1 year ago
Tech industry

The TechBeat: Closing the Feedback Loop: Building AI That Learns from Its Users (7/3/2025) | HackerNoon

fromTechzine Global
3 weeks ago

Microsoft and Google fail to protect patient data

The report shows that both Google Workspace and Microsoft 365, despite employing encryption, often compromise security due to outdated TLS versions and plain text configurations.
Privacy professionals
fromTechzine Global
3 weeks ago

Bluetooth leaks enable eavesdropping via headphones

The vulnerabilities allow malicious parties to eavesdrop via Bluetooth or steal sensitive data such as contact lists and call history.
Privacy professionals
Information security
fromThe Hacker News
2 months ago

Third Parties and Machine Credentials: The Silent Drivers Behind 2025's Worst Breaches

Third-party exposure and machine credential abuse significantly contributed to data breaches, necessitating comprehensive identity governance for both human and machine identities.
#data-protection
EU data protection
fromDatabreaches
5 months ago

Hundreds of Dutch medical records bought for pocket change at flea market

A man discovered sensitive medical records on discarded hard drives bought at a flea market in the Netherlands.
EU data protection
fromDatabreaches
5 months ago

Hundreds of Dutch medical records bought for pocket change at flea market

A man discovered sensitive medical records on discarded hard drives bought at a flea market in the Netherlands.
Privacy professionals
fromDatabreaches
5 months ago

Privilege Under Pressure: The Shifting Data Breach Investigation Landscape

Federal courts are reducing protections for forensic reports in data breaches.
Communications with forensic firms may not be protected by privilege.
Careful communication strategies are essential in breach investigations.
[ Load more ]