Data Breach News, Insurance News
April 24, 2025
934 views 14 secs 0

Blue Shield of California shared the private health data of 4.7 million people with Google for years

Blue Shield of California joined the ranks of entities that discovered they were unlawfully sending personal or protected health information of website visitors to advertisers via tracking pixels embedded on their sites. TechCrunch reports: Health insurance giant Blue Shield of California is notifying millions of people of a data breach. The company confirmed on Wednesday […]

Data Breach News
April 23, 2025
639 views 57 secs 0

Cyberattack Knocks Texas City’s Systems Offline

Security Week reports that The city of Abilene, Texas, has been working on restoring systems that were taken offline to contain a cyberattack: The assault started on April 18, when some of the systems in the city’s internal network were reported as unresponsive, and prompted the immediate activation of the incident response plan. To secure […]

Data Breach News, News, Vendor News, Vulnerabilities
April 19, 2025
821 views 2 mins 0

100,000 Americans Exposed As Hertz Warns Customers’ Names, Contact Details, Credit Card Information, Social Security Numbers Leaked in Vendor’s Data Breach

The Daily Hodl reports: A car rental giant says sensitive customer data has been exposed in a cybersecurity incident involving one of its vendors. In a notice posted on its website, Hertz says that its vendor, Cleo Communications US, witnessed a zero-day vulnerability exploit late last year that enabled thieves to siphon customer data. Notifications on various […]

Data Breach News
April 19, 2025
665 views 7 mins 0

The PIPC Sanctions CLASSU and KT alpha for Violations of the PIPA 

South Korea’s data protection regulator issued the following press release concerning recent enforcement actions (unofficial translation follows): – The PIPC calls for putting access control and other privacy-safeguarding measures in place in preparation for credential stuffing and other intrusion attempts The Personal Information Protection Commission (PIPC) held its eighth plenary meeting of 2025 and reached […]

Data Breach News
April 19, 2025
606 views 26 secs 0

KiloEx Hacker Returns Entire $7.5M Four Days After Exploit

CryptoNews reports: In a surprising turn of events, the hacker behind the $7.5 million exploit of decentralized exchange KiloEx has returned the entire sum just four days after the initial attack. On April 14, KiloEx suspended its perpetual futures trading platform following a severe security breach that resulted in attackers draining $7.5 million worth of cryptocurrency assets […]

Data Breach News
April 18, 2025
646 views 51 secs 0

UnitedHealth Adopts Aggressive Approach to Recover Ransomware Attack Loans

The HIPAA Journal reports: UnitedHealth Group has adopted an aggressive approach to recover outstanding balances on loans issued to healthcare providers affected by the February 2024 ransomware attack on Change Healthcare. The attack caused a prolonged outage of Change Healthcare’s systems, causing massive disruption to revenue cycles as providers were unable to submit claims. Many […]

Finance, Data Breach News
April 16, 2025
720 views 9 secs 0

Major U.S. banks pause data sharing with the OCC after a cyberattack exposed sensitive information

Fast Company reports: Several of the largest U.S. banks are reportedly pausing or reassessing how they send sensitive information to the Office of the Comptroller of the Currency (OCC) following a major cyberattack on the regulator. JPMorgan Chase and Bank of New York Mellon have halted electronic information-sharing with the OCC, Bloomberg reported. Bank of America […]

News, Commentaries and Analyses, Data Breach News, Legal News
April 16, 2025
373 views 54 secs 0

BakerHostetler launches 2025 Data Security Incident Response Report

BakerHostetler has released its 2025 Data Security Incident Response Report, which provides insight and analysis from more than 1,250 data security incidents managed by the firm this past year. Their report features a deep dive into critical components of security incidents (e.g., response timeline, average ransom payment amount, frequency of litigation) as well as an examination of […]