Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Breaches

WatchGuard

Insiders cause 20% of data breaches

Apart from external attackers, organizations need to consider another type of threat when planning their cybersecurity strategy: insider threats. There are different types of insiders. On the one hand, there are people who have secret knowledge and unintentionally create risk openings within an organization; and on the other, there are others who intend to cause harm, motivated by profit, extortion, or personal grievance. This means insiders can be classified as follows.

appknox

Uber Data Breach 2022: What You Need to Know

The world of digital security has been under the spotlight for various reasons in the last year. Several high-profile incidents have directly impacted the general public, from cyber attacks to privacy scandals. Uber is the latest company to be caught up in this whirlwind after hackers managed to breach their security and steal sensitive user data from the ride-hailing service. This article provides an overview of what happened, what went wrong, and what you can do to keep your accounts safe.

manageengine

Uber data breach 2022: How the hacker annoyed his way into the network (and our learnings)

Illustration by jcomp On Sept. 15, Uber Technologies Inc. was breached by an 18-year-old. The hacker purchased an employee’s stolen credentials from the dark web and pushed a flood of multi-factor authentication (MFA) requests and fake IT messages to them in hopes of getting into their account. Irritated by the non-stop pop-ups, the employee caved in and approved the request, unwittingly setting off a cyberattack.

Arctic Wolf

What We Can Learn from the 'Prompt-bomb' Uber Hack

It was the worst-case scenario for Uber, the popular ride-sharing app, when the company suffered a major data breach in early September. While the extent of the damage, and the data potentially stolen, is still being uncovered, the attack — and the methods used to execute it — can be examined and used to teach other organizations what (and what not) to do.

Arctic Wolf

Initial Access Brokers: What They Are, How They Gain Access, and Who Uses Their Services

Imagine a burglar. They’ve spent large amounts of time researching their target — your house. They’ve perfected their infiltration techniques, found your weak points, learned your schedule, and know the best time to strike. They’ve shown up when you least expect it and jimmied open the lock on the back door. And now, rather than head inside and steal your valuables, they hold the door open for someone else.

upguard

5 Ways Tech Companies Can Prevent Data Breaches

The technology industry has unlocked innovation across all sectors as an enabler of digital transformation. Most organizations are now outsourcing critical operations to tech companies, such as cloud providers. Tech vendors are now left to manage an ever-growing volume of sensitive data, which they must secure effectively to prevent large-scale data breaches. IBM and Ponemon Institute’s 2022 Cost of a Data Breach Report found a record high average breach cost of US$4.35 million.

forgerock

The Implications of the Uber Breach

Cyberhacks are commonplace in today's world, and they can happen to any company. Today it's Uber, last week it was U-Haul and the week before it was Samsung. At the root of many of these attacks is a malicious actor masquerading as a corporate IT manager or other technical role. Using this disguise, the perpetrator knows that all they have to do is convince one employee or contractor to share their credentials to gain a foothold into the targeted company's internal network.

upguard

6 Ways Finance Companies Can Prevent Data Breaches

The financial industry is no stranger to data breaches. Financial institutions have access to millions of personally identifiable information (PII) records, which they must secure to the highest standard. The value of this data is open knowledge – hackers will actively search for existing cybersecurity weaknesses to gain unauthorized access to customers’ financial information.

tripwire

Cybersecurity Threats to the US Water Industry

In an increasingly digital world, cybersecurity is a significant – and relevant – threat to individuals and companies alike. Cybercriminals are constantly devising new ways to steal information for personal gain through exploitation or ransom demands. It’s become unfortunately commonplace to hear tales of drained checking accounts, leaked photos, and private documents being published to the masses.

keeper

What is a Security Breach?

A security breach is when an incident occurs that results in unauthorized access to sensitive data, applications, networks or devices. Typically, when a security breach happens the intruder is able to bypass security measures that were put in place to keep them out. As a result of a security breach, a company or organization’s public image suffers, which can lead to the company losing money. The company or organization could also suffer legal consequences.