LATEST POST

FEATURE

Q2 2023 Threat Landscape Report: All Roads Lead to Supply Chain Infiltrations

Commentaries and Analyses
729 views 15 secs

The significant increase in supply-chain attacks has been discussed in a Q2 report by Kroll, who also noted a significant increase in email compromises. Read more of this article Kroll.com.

FEATURE

Cyberattack on UK IT Firm Swan Retail Affects up to 300 Retailers

Cyberattack
1540 views 21 secs

A UK-based Retail Management and EPOS Solutions provider called Swan Retail was the victim of a cyberattack that has significantly disrupted about 300 retail companies. The type of attack was not disclosed. Read more of this article by DEEBA AHMED at Hackread.com.

FEATURE

For Customers in CloudNordic

Data Breach News
1919 views 15 secs

Danish hosting firm CloudNordic was hit with a ransomware attack that shut down all systems. websites, e-mail systems, customer systems, and customers’ websites. Read more of this article at CloudNordic.

FEATURE

Data Breach Notification Laws

News
6035 views 10 mins

One, in the absence of any specific law or regulation the person who was hacked is not required to notify anyone, including the people whose information was accessed, that their information was compromised.  That is why access to the below specific notification requirements is critically important. Two, if there is a requirement to notify people […]

FEATURE

Vendors to be(a)ware of: United Lex

Vendor News
10194 views 8 mins

UnitedLex performs data breach reviews for several “vertically integrated” solutions, including Charles River Associates.  In 2022 UnitedLex paid, others on their behalf paid and/or they waived claims they were to be paid a total amount of approximately $30,000,000 to settle a fraud suit.  The relevant news of the settlement, without mention of the waived claims […]

FEATURE

Etiology of a Breach

News
7912 views 7 mins

Most data breaches involve some level of victim human error, which theoretically employee training can address.  Human error can take the form of clicking on a link, where the email address of the sender is unknown to the person clicking on the link.  Malware then enters the scene.  Another common human error scenario involves phishing […]