As the series of data breach incidents persist in the cybersecurity industry, database security has been recognized more. Even as of now, sensitive user data are still available all over the web. It seems like that the Firebase administrators are failing to abide by the protocols despite warnings and notifications to secure vital databases with passwords. Firebase...Continue Reading
Reports have emerged recently about a B2B fintech solutions firm, Pine Labs, suspected exposure to cyber hacking, which has been said to compromise over 500,000 confidential records, including the firm’s employee data, financial statements, client contracts, and many other internal sensitive documentations. Pine Labs, however, denies the alleged claims. As stated by cybercrime...Continue Reading
One of the major telecommunications companies, T-Mobile, has recently acknowledged that they have been attacked by cyber hackers and have compromised the private information of over 40 million current, former, and prospective customers in the US. This includes names, birthdays, social security numbers, security pins, ID information, and more sensitive customer details. The rise of the issue to...Continue Reading
One of the largest fuel pipelines in the US, Colonial Pipeline, has been having a mitigation activity wherein they send alerts and notifications to users affected by a data breach issue coming from a ransomware attack called DarkSide last May. According to Colonial Pipeline themselves, they have recently known about the DarkSide attack and learned that the threat actors could steal...Continue Reading
It is a usual scenario where our passwords are required to be changed at times of data breach. Still, the truth is that cybercriminals take advantage of this situation by harvesting all the vulnerable target information before victims actually become aware of what’s happening. Learn more about how the data breaching process happens here. Passwords have undeniably become the source of protection and authentication for...Continue Reading
Cybercriminals are highly motivated in targeting database that contains a large amount of personal data. A company database is a gold mine that allows attackers to make a huge profit and is sometimes used for operative and personal data hostage. Hacker successfully stole a total of 8.3 million of DailyQuiz user accounts. DailyQuiz is...Continue Reading
Clop ransomware group attacked Accellion, one of the companies that offer File Transfer Appliance. Typically, transferring files happens via email. However, emails have limitations, particularly when it comes to large attachments and sensitive data. Some companies are now using File Transfer Appliance (FTA) installed on a private cloud, on-premises, or hosted to securely manage and...Continue Reading
A company’s sensitive information is stored on either local machine, cloud servers, and enterprise databases. A data breach can be defined as viewing an individual’s personal medical file without authorization or sharing a sensitive document without permission. When a company accidentally exposes data, it might be due to unintentional disclosure of data inside the job...Continue Reading
Every day, companies faced security challenges in maintaining their data secured from cyber-attacks. A data breach results from successful cyber-attacks that permit cyber criminals to access a company’s sensitive data. The exploitation of the data can happen anytime to any organization. However, cyber-attack is not the only cause of why data breaches are happening worldwide....Continue Reading
During our threat intelligence hunt, we stumble upon different contents, especially those of the Dark Web. There are numerous surprises because no one can really tell which of the breaches are critical and impacting until you know what is inside. One perfect example is a data breach broker within a notorious forum posted his collection...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.