Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Breaches

Marriott Starwood Hotels Breach: Details on 500 Million Guests Compromised

Global hotel chain Marriott has revealed that it suffered a significant data breach with the data of 500 million customers possibly compromised by attackers. Marriott received an alert on September 8 from a security tool regarding an unauthorized attempt to access the Starwood guest reservation database. Upon inspection, the company discovered that there had been unauthorized access to the Starwood network since 2014.

How to Create Incident Response Plan Steps for Data Breaches

An estimated 34 percent of companies have experienced data breaches in the last 12 months. With those odds, every organization should be prioritizing cyber security and cyber attack management. Take the time now to put together a data breach incident response plan utilizing these steps, so if your organization is affected, you’ll be able to respond as quickly and effectively as possible. Here are some key steps the plan you create should include.

Vendor Risk: The Impact Of Data Breaches By Your Third-Party Vendors

UpGuard’s researchers regularly uncover and report on corporate data breaches. We often find that the breach is not directly caused by the company, but by one of their third-party vendors. This series of posts is about a less-understood aspect of vendor risk, data breaches by third-party vendors. We will run you through many types of data breaches, how they relate to your third-party vendors, and ultimately what you can do to prevent them from hurting your business.

Number of Stolen Credentials Skyrockets 141% in North America

The latest research from Blueliv has found that the number of compromised credentials detected in North American botnets grew 141% from the last quarter. The spike between the March to May and June to August quarters came alongside declines in other regions analyzed. Russia and Europe saw a 22% decrease and Asia saw a 36% decrease.

5 Steps to Maximize Your Financial Data Protection

A series of high-profile data breaches in 2017 made it clear that it's becoming more difficult to protect your and your customer's sensitive information from nefarious agents. As businesses expand, they develop and implement security policies that help protect their sensitive information from outsiders.

Google Shutting Down Google+ Platform Following Privacy Vulnerability

Google is shutting down its Google+ social network following the disclosure of a software glitch within Google+ that resulted in the exposure of personal-profile data belonging to hundreds of thousands of Google+ users. The glitch was live for close to three years, but Google elected to not make the breach public out of fear of regulation.

Facebook Urged to Provide Breach Details to UK Regulators Swiftly

European regulators are awaiting details from Facebook regarding last week’s data breach involving an estimated 50 million Facebook users. Last week, Facebook notified the public that three vulnerabilities found within its video uploader tool allowed hackers to exploit access tokens belonging to 50 million user accounts.

Data Exposure Types: System Information

There are many different kinds of sensitive data that can be exposed, each with its own particular exploits and consequences. This article will focus on what we have categorized as “systems information,” data that describes digital operations, such as systems inventory, configuration details, data center and cloud design, performance metrics and analyses, application code, and IT business data, such as equipment spend, vendor discount, and budgeting.

Why Do Cloud Leaks Matter?

Previously we introduced the concept of cloud leaks, and then examined how they happen. Now we’ll take a look at why they matter. To understand the consequences of cloud leaks for the organizations involved, we should first take a close look at exactly what it is that’s being leaked. Then we can examine some of the traditional ways information has been exploited, as well as some new and future threats such data exposures pose.