BreachExchange: by author

282 messages starting Jul 12 18 and ending Jul 30 18
Date index | Thread index | Author index


Audrey McNeil

California May Lower the Standing Threshold in Data Breach Litigation Audrey McNeil (Jul 12)
Singapore's Largest Healthcare Group Hacked, 1.5 Million Patient Records Stolen Audrey McNeil (Jul 23)
Let’s face it, users should never be the last line of defense in cybersecurity Audrey McNeil (Sep 26)
Stop training your employees to fall for phishing attacks Audrey McNeil (Jul 12)
Cyber security is being tightened at Australian airports after an identity card data hack Audrey McNeil (Jul 20)
Should Your Customers Trust You with Their Data? Audrey McNeil (Jul 05)
Voters' data was left exposed online because of course it was Audrey McNeil (Jul 20)
Data Breaches Prove Costly for Major Businesses Audrey McNeil (Jul 02)
You Might Be an Inside Trader If…You Trade on Your Unconfirmed Suspicions of a Cybersecurity Event Prior to Its Public Revelation or Disclosure Audrey McNeil (Jul 02)
What is phishing and how to protect against It? by Liam Johnson Audrey McNeil (Jul 16)
GDPR – emerging risks for SMEs Audrey McNeil (Jul 13)
Prediction of (Cyber)warfare — Security Teams Under Attack! Audrey McNeil (Jul 03)
The ostrich security strategy is now very risky Audrey McNeil (Jul 06)
Innovation in healthcare: A hacker’s dream and CISO’s nightmare? Audrey McNeil (Jul 12)
Tesco Bank faces £30m FCA fine over cyber attack Audrey McNeil (Sep 26)
How to Solve the Developer vs. Cybersecurity Team Battle Audrey McNeil (Jul 11)
Hacker vs. Cybercriminals: What’s the Difference and Why It Matters Audrey McNeil (Jul 10)
Cyber Smarts: How to Avoid a Data Breach Lawsuit Audrey McNeil (Jul 18)
Motivations and malware: inside the mind of a hacker Audrey McNeil (Jul 06)
Four Ways to Improve IT Security on a Limited Budget Audrey McNeil (Jul 13)
Innovation in healthcare: A hacker’s dream and CISO’s nightmare? Audrey McNeil (Jul 13)
Less Than Half of Cyberattacks Detected via Antivirus: SANS Audrey McNeil (Jul 17)
Small business IT support: Why you need it Audrey McNeil (Jul 11)
The Plight of the Password Audrey McNeil (Jul 09)
SEC Cybersecurity Update May Lead to Increased Oversight Audrey McNeil (Jul 12)
SHEIN fashion retailer announces breach affecting 6.42 million users Audrey McNeil (Sep 26)
Why Every Business Should Have a Data Protection Officer Audrey McNeil (Jul 18)
Cybersecurity | A forward-thinking approach Audrey McNeil (Jul 19)
IMB data breach prompts 'comprehensive response' Audrey McNeil (Jul 17)
How your business can ensure HIPAA-compliant backups Audrey McNeil (Jul 05)
Network visibility and assurance for GDPR compliance Audrey McNeil (Jul 19)
Your 2018 guide to cyber insurance is here Audrey McNeil (Jul 16)
Four tips for keeping security worries away this summer Audrey McNeil (Jul 09)
GDPR sparks rise in data protection complaints Audrey McNeil (Jul 02)
The Fundamental Flaw in Security Awareness Programs Audrey McNeil (Jul 20)
Getting Started with Successful Security Breach Detection Audrey McNeil (Jul 20)
Cyber security and data privacy: what are you over-looking? Audrey McNeil (Jul 17)
The Types of Hackers & Why They Hack Audrey McNeil (Jul 16)
Software Patching Integral to PHI Data Security, HIPAA Compliance Audrey McNeil (Jul 05)
PayPal's pal Venmo spaffs your pals' payments – and yours Audrey McNeil (Jul 19)
5 Cybersecurity Tips for Small Businesses Audrey McNeil (Sep 26)
Effective Data Security Is A Team Effort Audrey McNeil (Jul 02)
How to Measure Cybersecurity Success Audrey McNeil (Jul 02)
The Biggest Risk to Your Business: Inadequate Cybersecurity Audrey McNeil (Jul 10)
The physical key to cybersecurity Audrey McNeil (Jul 06)
Fallout From HIV Data Breach Concerns Legal Experts Audrey McNeil (Jul 19)
Understanding Why Spear Phish Are Highly Effective Audrey McNeil (Jul 23)
HIPAA Enforcement: Where’s the Action? Audrey McNeil (Jul 13)
Fourth Circuit Weighs in on Standing in Data Breach Litigation Audrey McNeil (Jul 03)
A Short Guide to Cyber Security for Small Businesses Audrey McNeil (Jul 20)
Six Ways To Ensure Your Data Stays Private Audrey McNeil (Jul 05)
Suffered a data breach? Here’s how you manage the fallout Audrey McNeil (Jul 09)
Know your smart devices, they can be cyber villains Audrey McNeil (Jul 10)
Five Tips for Minimizing Data Loss Risk in a Hybrid IT Environment Audrey McNeil (Jul 13)
Without Handcuffs: Creating A Culture of Compliance Audrey McNeil (Sep 26)
The cybersecurity incident response team: the new vital business team Audrey McNeil (Jul 23)
Addressing incident response with some common sense Audrey McNeil (Jul 19)
Three Emerging Technologies to Accelerate Incident Readiness Audrey McNeil (Jul 16)
Pulling Lessons From Bad Cybersecurity News Audrey McNeil (Jul 06)
We’ve had a data breach… let’s not tell anyone Audrey McNeil (Jul 17)
Cyber crime poses a massive threat to businesses, thanks to remote workers using unsecured public wifi Audrey McNeil (Jul 10)
Tips For Getting Your GDPR Compliant Solution Approved Audrey McNeil (Jul 23)
Millions of Telefonica customers’ data exposed after security breach Audrey McNeil (Jul 18)
The Path to Securing IoT Ecosystems Starts at the Network Audrey McNeil (Jul 23)
Using the Blockchain to Secure Sensitive Information Audrey McNeil (Jul 09)
Cybersecurity: It's about time Audrey McNeil (Jul 12)
Brit watchdog fines child sex abuse inquiry £200k over mass email blunder Audrey McNeil (Jul 19)
How to Avoid Self-Inflicted Cybersecurity Wounds Audrey McNeil (Jul 11)
HIPAA Changes May Be on the Way Audrey McNeil (Jul 17)
What backup security measures protect against data breaches? Audrey McNeil (Jul 02)
6 ways you are sabotaging your cyber defences Audrey McNeil (Jul 23)
Why Cybersecurity Is Critical to Healthcare Innovation Audrey McNeil (Jul 11)
California and GDPR “light”: A Match Made in Plaintiffs’ Lawyers Heaven? Audrey McNeil (Jul 17)
How Will The GDPR Survive In The Jungle of Big Data? Audrey McNeil (Jul 11)
How Worried Should a Small Business Be About Cybersecurity? Audrey McNeil (Jul 11)
In Security, What We Don't See Can Hurt Us Audrey McNeil (Jul 09)
HIPAA & Medical Data Security for Web Developers Audrey McNeil (Jul 03)
What New Entrepreneurs Should Be Doing to Prevent Cybercrime Audrey McNeil (Jul 18)
Memory Protection beyond the Endpoint Audrey McNeil (Jul 18)
Does your organisation have cyber insurance? Audrey McNeil (Jul 06)
Cyber Security Insurance: Nine Questions to Ask to Determine Your Exposure Audrey McNeil (Jul 03)
Twitter bug sent user's direct messages to third-party developers Audrey McNeil (Sep 26)
The data dichotomy: are transformation and data security incompatible? Audrey McNeil (Jul 06)
Security Think Tank: A good password policy alone is not enough Audrey McNeil (Jul 16)
Email data leaks just got riskier Audrey McNeil (Jul 10)
Hack like a CISO Audrey McNeil (Jul 20)
How to Protect Your Organization from Spear Phishing Audrey McNeil (Jul 13)
These Are The Top 3 Habits For Companies Hoping To Escape A Hack Audrey McNeil (Jul 12)
Is GDPR Good For SME Data? Audrey McNeil (Jul 05)
Insider Threat: Common Myths and Misconceptions Audrey McNeil (Jul 03)
How to Teach Your Employees About Cybersecurity Audrey McNeil (Jul 18)
Are You Failing To Learn From Cyberattack News? Audrey McNeil (Jul 10)

Destry Winant

Why Penetration Testing is Important Destry Winant (Aug 07)
Hackers Publish PoC of Zero-day Vulnerability in Windows on Twitter Destry Winant (Aug 30)
Halt the Hackers: How to Make a Website Secure Destry Winant (Aug 06)
Real Security is a Question of Business Value Destry Winant (Aug 20)
A year later, cities using Click2Gov are still getting hacked Destry Winant (Jul 27)
Cybersecurity & Business: Not Just an IT Problem Destry Winant (Jul 31)
British Airways hacked with 380, 000 sets of payment details stolen Destry Winant (Sep 10)
Twitter API Flaw Exposed Users Messages to Wrong Developers For Over a Year Destry Winant (Sep 25)
Is hiring a hacker ever a good idea? Destry Winant (Sep 13)
Port of San Diego hit by ‘ransomware’ cyberattack Destry Winant (Sep 28)
Where You Store Your Data and Why it Matters Destry Winant (Aug 14)
Super-mugs: Hackers claim to have snatched 20k customer records from Brit biz Superdrug Destry Winant (Aug 22)
Could complacency be setting in when it comes to ransomware? Destry Winant (Jul 27)
Board members and cyber responsibility Destry Winant (Sep 17)
Expert Warns that Hacked Satellite Systems Could be Used to Launch Microwave-Like Attacks Destry Winant (Aug 13)
MongoDB server leaks 11 million user records from e-marketing service Destry Winant (Sep 19)
Reddit breach shows limits of SMS-based two-factor authentication Destry Winant (Aug 03)
Why do cybercriminals target vulnerabilities? Destry Winant (Sep 13)
Phishing for Trouble: One Manufacturer’s Mistakes, and How to Avoid Them Destry Winant (Sep 12)
Snapchat source Code leaked after an iOS update exposed it Destry Winant (Aug 09)
The four most popular methods hackers use to spread ransomware Destry Winant (Aug 10)
CVE? Nope. NVD? Nope. Serious must-patch type flaws skipping mainstream vuln lists – report Destry Winant (Aug 15)
Cyber-attack! Would your firm handle it better than this? Destry Winant (Aug 10)
Legacy Health email breach exposes 38, 000 patients' information Destry Winant (Aug 21)
How Are Apps Like Slack And Dropbox Vulnerable To Attack? Destry Winant (Jul 31)
Cyber security should be a Proactive affair Destry Winant (Aug 15)
417, 000 Individuals Affected by Augusta University Health Phishing Attack Destry Winant (Aug 20)
How Full Admin Rights Could Pose a Threat to Your Business Destry Winant (Aug 29)
They're not fraud victims yet, but plaintiffs quickly sue Pompano Beach company over data breach Destry Winant (Aug 07)
Hackers hit West Vancouver's server Destry Winant (Sep 05)
From Zero Day Attack to Zero Day Recovery Destry Winant (Aug 07)
Shipping Giant Cosco Hit by Ransomware Attack Destry Winant (Jul 27)
It’s Time To Protect Your Enterprise From DDoS Attacks Destry Winant (Aug 23)
Social engineering attacks: What makes you susceptible? Destry Winant (Aug 06)
Scotland's Arran Brewery Slammed by Dharma Bip Ransomware Destry Winant (Sep 24)
Hi-de-Hack! Redcoats red-faced as Butlin's holiday camp admits data breach hit 34, 000 Destry Winant (Aug 13)
Air Canada mobile app breached, data of 20, 000 customers may have been accessed Destry Winant (Aug 30)
Salesforce.com Warns Marketing Customers of Data Leakage SNAFU Destry Winant (Aug 06)
Four Ways to Mitigate Cyber Risks for ERP Applications Destry Winant (Aug 10)
Malware Hits Plants of Chip Giant TSMC Destry Winant (Aug 06)
Blue Springs Family Care hit by ransomware attack that potentially compromised data of over 44, 000 patients Destry Winant (Aug 01)
A New variant of Brrr Dharma Ransomware has been released Destry Winant (Sep 19)
What most companies forget when fighting off cyberattacks Destry Winant (Aug 21)
Weak passwords let a hacker access internal Sprint staff portal Destry Winant (Aug 28)
City of Tyler's Click2Gov payment system breached Destry Winant (Sep 11)
RBS Hits The Road In September Destry Winant (Sep 11)
The 5 types of cyber attack you're most likely to face Destry Winant (Aug 22)
Understanding the differences between IT security and cybersecurity Destry Winant (Aug 08)
Weak Security Socializes Risk Destry Winant (Aug 27)
Expectations for CISOs Have Changed Destry Winant (Sep 18)
CISO Should Stand For Chief Influence Security Officer Destry Winant (Sep 25)
Watch Out! Another Nasty Apache Struts Vulnerability Has Been Disclosed! Destry Winant (Aug 23)
Village People LLC Notifies of Security Incident Destry Winant (Sep 27)
Google fixes Chrome issue that allowed theft of WiFi logins Destry Winant (Sep 06)
A Hidden Bug In The System Puts 21, 000 U.K. Students At Risk Destry Winant (Jul 24)
Risks associated with third-party access Destry Winant (Aug 06)
Emotet Malware Evolves Beyond Banking to Threat Delivery Service Destry Winant (Jul 26)
Insecure server left carmakers' trade secrets wide open Destry Winant (Jul 24)
Ontario town plans to pay ransom after computers locked down Destry Winant (Sep 13)
British Airways Breach Linked to Ticketmaster Breach Attackers Destry Winant (Sep 12)
APIs: The Trojan horses of security Destry Winant (Sep 11)
Singapore public healthcare sector limits internet use Destry Winant (Jul 24)
4 Ways To Avoid Data Breaches Through Sales And Marketing Alignment Destry Winant (Aug 21)
How To Stay Ahead of Cyber Breaches, the Boardroom’s Biggest Fear Destry Winant (Sep 21)
Proposed Settlement in Lawsuit Tied to Insider Breach Destry Winant (Jul 27)
Best Ways To Protect Your Organization & Keeping Your Employees Well-Versed in Data Security Destry Winant (Jul 26)
Why everyone’s thinking about ransomware the wrong way Destry Winant (Aug 31)
Yahoo! Data Breach Estimated to Cost Successor Company Net $47 Million Destry Winant (Sep 24)
SIX REASONS TO THINK TWICE ABOUT YOUR DATA LAKE STRATEGY Destry Winant (Jul 25)
Don't Confuse GDPR Compliance with Security Destry Winant (Jul 24)
“Typewriters are productive again”, the aftermath of Mat-Su’s Ransomware Attack Destry Winant (Aug 02)
Millions of health records exposed to public in Mexico Destry Winant (Aug 10)
Change How You Think About Risk. Your Company May Depend on It Destry Winant (Aug 22)
Hackers Spreading New Virobot Ransomware with Powerful Botnet & Keylogging Capabilities Destry Winant (Sep 25)
Urgent care provider notifies 13K to data breach Destry Winant (Aug 15)
Why a Healthy Data Diet Is the Secret to Healthy Security Destry Winant (Sep 10)
5 Steps on How to Create Your Own Cybersecurity Risk Assessment Destry Winant (Sep 17)
Peekaboo vulnerability exposes hundreds of thousands of security cameras to hacking Destry Winant (Sep 19)
5 Ways to Help Your Customers Feel Comfortable Paying Online Destry Winant (Sep 25)
Brazilian Crypto Platform Atlas Quantum Reveals Data Breach Affecting 260K Customers Destry Winant (Aug 28)
SEC fines Voya $1M for cybersecurity failures Destry Winant (Sep 28)
Should Staff Ever Use Personal Devices to Access Patient Data? Destry Winant (Aug 15)
Can cramming code with bugs make it more secure? Some think so Destry Winant (Aug 14)
The Latest Thing You Need to Worry About Cybercriminals Hacking? Your Voice. Destry Winant (Aug 17)
300, 000 Records Found at Hospital Slated for Demolition Destry Winant (Aug 09)
Top 3 issues CISOs face today Destry Winant (Sep 28)
90% of E-Commerce Global Login Traffic is from Hackers Destry Winant (Aug 24)
Hack mobile point-of-sale systems? Researchers count the ways Destry Winant (Aug 16)
NotPetya malware attack: Chaos but not cyber warfare Destry Winant (Aug 16)
Nova Scotia re-launches FOIPOP website after 152 days of being offline Destry Winant (Sep 06)
Online textbook rental and tutorial company Chegg plunges after disclosing data breach Destry Winant (Sep 27)
Bank of Spain Reveals Its Website Suffered a DoS Attack Destry Winant (Aug 29)
Virus shuts down city services Destry Winant (Sep 20)
Leaky API exposes Black Hat attendees’ personal data Destry Winant (Aug 23)
Businesses in Arkansas Hit with Ransomware Destry Winant (Sep 27)
Insult To Injury – Florida Health Care Management Firm Accidentally Gives Data To Attackers Destry Winant (Sep 05)
Amazon investigating reports of employees leaking data for bribes Destry Winant (Sep 18)
New Spectre Variant Hits the Network Destry Winant (Jul 31)
Uber reaches $148 million settlement over its 2016 data breach, which affected 57 million globally Destry Winant (Sep 27)
UK shipping giant deals with data breach by the book, recovers stolen data Destry Winant (Aug 02)
What Does “Reasonable” Data Security Mean, Exactly? Destry Winant (Jul 24)
Eastern Maine Community College Data Breach Exposed 42000 Records Destry Winant (Aug 21)
Disrupting the Economics of Cybercrime Destry Winant (Aug 23)
The Foundation of Cyber-Attacks: Credential Harvesting Destry Winant (Jul 26)
How to Go From No Incident Response Program to SOAR Destry Winant (Aug 20)
Targeted Attacks or Untargeted Attacks – Which is Most Common? Destry Winant (Sep 17)
Adams County data breach exposed personal information of up to 250, 000 people Destry Winant (Aug 13)
Exploited server in SingHealth cyber attack did not get security update for 14 months, COI finds Destry Winant (Sep 28)
Law firm launches £500 million group action over British Airways hack Destry Winant (Sep 11)
Destroyed Computer Hampers Lawsuit in Premera Breach Destry Winant (Sep 05)
India's Cosmos Bank loses $13.5 mln in cyber attack Destry Winant (Aug 17)
DDoS attack from Anonymous Catalonia cripples Bank of Spain website Destry Winant (Sep 04)
How COSCO responded to a cyberattack on its systems Destry Winant (Aug 01)
Security priorities are shifting in response to increased cybersecurity complexity Destry Winant (Sep 24)
U.S. charges North Korean hacker over Sony, WannaCry incidents Destry Winant (Sep 10)
10 Common File Transfer Risks and How to Avoid Them Destry Winant (Jul 31)
Colorado Timberline Shuts Down Destry Winant (Sep 17)
Don’t Forget Victimology as a Cybersecurity Strategy Destry Winant (Aug 08)
Opinion Hackers reaping greater rewards with hybrid cyber attacks Destry Winant (Sep 10)
Three Ways of Looking at Security Operations Destry Winant (Aug 31)
Critical Apache Struts flaw just waiting to be exploited; PoC reported in the wild Destry Winant (Aug 28)
Yale University discloses old school data breach Destry Winant (Aug 02)
NCIX servers sold on Craigslist with 15 years of user data Destry Winant (Sep 24)
TEENAGE HACKER HOPING TO WORK FOR APPLE BROKE INTO THE COMPANY'S SECURE NETWORK Destry Winant (Aug 20)
Can't read my, can't read my... broker face: Premium Credit back online a week after cyber attack Destry Winant (Sep 27)
These Are The Five Most Dangerous Email Attachments Destry Winant (Aug 07)
3 characters from Jurassic Park that could’ve benefited from an IT disaster recovery plan Destry Winant (Aug 29)
Blue Cross blames vendor for breach of customer information in R.I. Destry Winant (Sep 14)
3 months after GDPR data breach complaints already more than doubled Destry Winant (Aug 29)
Mirai authors avoid the jail by helping US authorities in other investigations Destry Winant (Sep 20)
And now professional golf is being ransomed for bitcoin Destry Winant (Aug 09)
UMass Memorial health care entities to pay $230,000 over data breaches — 15,000 patients exposed Destry Winant (Sep 21)
Attackers could ‘faxploit’ all-in-one printer to penetrate network and steal data Destry Winant (Aug 14)
Iranian Hackers Target Universities in Global Cyberattack Campaign Destry Winant (Aug 28)
How One Company’s Cybersecurity Problem Becomes Another's Fraud Problem Destry Winant (Aug 31)
IT Postmortems: How to continuously improve by learning from failure and success Destry Winant (Aug 24)
Tick-tock, tick-tock. Oh, that's just the sound of compromised logins waiting to ruin your day Destry Winant (Sep 21)
2.6 billion records exposed in 2, 300 disclosed breaches so far this year Destry Winant (Aug 16)
8 types of malware and how to recognize them Destry Winant (Jul 25)
Sias says 2013 data breach hit 70,000 members Destry Winant (Jul 26)
No, The Mafia Doesn't Own Cybercrime: Study Destry Winant (Aug 09)
Parental control spyware app Family Orbit hacked, pictures of hundreds of monitored children were exposed Destry Winant (Sep 05)
New Variant of Dharma Ransomware Discovered Destry Winant (Aug 13)
Is Your Company Ready For A Bug Bounty Program? Destry Winant (Sep 06)
Data of 130 Million Chinese Hotel Chain Guests Sold on Dark Web Forum Destry Winant (Aug 30)
Employee Causes Five Years of Data Breach Litigation Destry Winant (Jul 25)
MagentoCore Card Skimmer Found on Mass Numbers of E-Commerce Sites Destry Winant (Sep 04)
Hackers stole customer credit cards in Newegg data breach Destry Winant (Sep 20)
Companies “over-reporting” data breaches as ICO takes 500 calls per week Destry Winant (Sep 14)
AdGuard resets all user passwords after credential stuffing attack Destry Winant (Sep 21)
Hey, you know what a popular medical record system doesn't need? 23 security vulnerabilities Destry Winant (Aug 09)
IT Professionals in Today’s Challenging World of Corporate IT Infrastructure Destry Winant (Aug 27)
Chili’s and Macy’s Teach Very Different Lessons about Breach Response Destry Winant (Jul 27)
A False Sense of Security Destry Winant (Aug 27)
99% of Texas Voter Records Exposed Destry Winant (Aug 27)
You Didn’t Think the Sony Saga Was Over, Did You? Destry Winant (Sep 18)
Every Week Is Shark Week in Cyberspace Destry Winant (Aug 01)
ABBYY woes: Doc-reading software firm leaves thousands of scans blowing in wind Destry Winant (Aug 30)
Data breach notifications may facilitate identity theft Destry Winant (Aug 23)
Equifax fined by ICO over data breach that hit Britons Destry Winant (Sep 20)
Natural disasters bring cyberthreats small and large Destry Winant (Sep 17)
Allentown computer virus fix to cost extra $220, 000 Destry Winant (Aug 03)
Telstra customer stumbles across contact details of 66, 000 fellow customers Destry Winant (Jul 31)
Your Biggest Cybersecurity Threat is Poor Communication Destry Winant (Aug 31)
Top 5 IT tips for remote and mobile teams Destry Winant (Sep 12)
Independence Blue Cross discloses data breach by employee Destry Winant (Sep 19)
Who’s Really Responsible For Third-Party Vendor Breaches? Destry Winant (Aug 22)
Whisky business: Uni of Edinburgh servers Irn-Scru'd by cyber-attack Destry Winant (Sep 13)
TSMC says variant of WannaCry virus brought down its plants Destry Winant (Aug 07)
Vodafone Tells Hacked Customers with "1234" Password to Pay Back Money Destry Winant (Sep 06)
Data Breach? Don’t Panic—Just Remember These 4 Tips Destry Winant (Aug 01)
Our Reports Clickbait? No. Click Here To Find Out Why… Destry Winant (Aug 28)
Bristol Airport hit by Windows ransomware Destry Winant (Sep 18)
Data Breach Notification Laws: Is it Time for a Uniform Standard? Destry Winant (Sep 12)
Do you need a vulnerability disclosure program? The feds say yes Destry Winant (Aug 08)
Spyware Company Leaves ‘Terabytes’ of Selfies, Text Messages, and Location Data Exposed Online Destry Winant (Aug 24)
5 Things Your Average Employee Doesn't Know About IT Destry Winant (Aug 10)
Darden reports possible data breach at Cheddar's Scratch Kitchen Destry Winant (Aug 24)
Attackers Made 9, 000 Unauthorized Database Queries in Equifax Hack: Report Destry Winant (Sep 11)
Critical vulnerability in Oracle Database, patch without delay! Destry Winant (Aug 14)

Inga Goddijn

1.4 million online fashion shoppers exposed after data breach at UK ecommerce provider Inga Goddijn (Jul 30)
Apache Struts Distraction Continues While Over 600 Additional Vulnerabilities Have Been Released Inga Goddijn (Aug 30)
Veeam server lapse leaks over 440 million email addresses Inga Goddijn (Sep 14)
Beef Up Your Cybersecurity, No Second Thoughts Please! Inga Goddijn (Sep 04)
Government transparency site revealed Social Security numbers, other personal info Inga Goddijn (Sep 04)
California Consumer Privacy Act: What you need to know to be compliant Inga Goddijn (Jul 30)
Huge Cryptomining Attack on ISP-Grade Routers Spreads Globally Inga Goddijn (Aug 03)
Jersey Mike's Warns Customers Of External Data Breach Inga Goddijn (Aug 02)
How rogue data puts organisations at risk of GDPR noncompliance Inga Goddijn (Jul 30)
Idaho Prison Officials: Inmates Hacked System to Get Credits Inga Goddijn (Jul 30)