Commentaries and Analyses, Data Breach News
September 03, 2024
56 views 14 secs 0

The high cost of cybersecurity breaches on corporate reputation

Even when customers do not leave following a data breach, they may still lose confidence. A new survey confirms the reputation hit corporations fear suffering. FinTech Global reports: A recent study highlighted by ISACA points to a staggering 78% of industry professionals ranking the reputational impact as the paramount concern following cyberattacks. Given the digital […]

Commentaries and Analyses, New Threats, Vulnerabilities
September 02, 2024
52 views 56 secs 0

Microsoft says North Korean hackers stole crypto through Chromium

A vulnerability on multiple web browsers was exploited by the Citrine Sleet threat actor to steal crypto from its victims, according to Microsoft. A Microsoft report claims a North Korean threat actor has been exploiting a flaw on Chromium to steal cryptocurrency. The company’s security blog attributed the exploitation of this bug “with medium confidence” […]

Commentaries and Analyses, Miscellaneous News, Workplace
August 27, 2024
65 views 13 secs 0

Microsoft security tools questioned for treating employees as threats

Can you effectively monitor employee activity to prevent and root out insider threats, or are you turning your workplace into a hostile surveillance environment? The Register reports that a report by Cracked Labs examines how workplace surveillance turns workers into suspects: Software designed to address legitimate business concerns about cyber security and compliance treats employees […]

Legal News, Commentaries and Analyses
August 20, 2024
64 views 43 secs 0

Federal Court Rejects Motion to Dismiss Wiretap Claims Using HIPAA to Support Crime-Tort Exception Allegations

If you feel like you need an explanation of the headline, you are not alone. But BCLP explains the concept and court decisions: It has now become commonplace for Plaintiffs’ attorneys to bring claims alleging that routine marketing techniques, including the deployment of behavioral advertising cookies and pixels, constitute wiretaps in violation of state and […]

Commentaries and Analyses, Data Breach News, News
August 16, 2024
58 views 45 secs 0

Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments – Researchers

Researchers at Palo Alto Network have reported a serious risk to organizations using cloud services that may result in an organization’s files being deleted and held for ransom. The risk is not due to any vulnerability with the cloud services themselves. The risk is due to the victim organizations misconfiguring their settings and inadvertently exposing […]

Data Breach News, Commentaries and Analyses, News
July 16, 2024
76 views 3 mins 0

AT&T Allegedly Pays Ransom After Snowflake Account Breach

“What will it take for victims of ransomware, extortion and other types of cybercrime to stop directly funding their attackers?” That’s the great question posed by BankInfoSecurity after WIRED reported AT&T paid hackers $370,000 to delete the data they had stolen. BankinfoSecurity reports: How many of the approximately 165 victims of the campaign targeting Snowflake […]