Chat and collaboration software tools such as Slack are critical for software development teams. But a data breach experienced by Utah-based software developer WildWorks illustrates why developers should think twice before sharing sensitive database keys over chat.
Hacking incidents - including ransomware attacks - continue to be the most common type of health data breaches added to the federal tally this year. And the ongoing COVID-19 crisis will put healthcare organizations at heightened risk for such incidents in the months to come, some experts predict.
Inadequate database and privileged account monitoring, incomplete multifactor authentication and insufficient use of encryption: Britain's privacy regulator has cited a raft of failures that contributed to the four-year breach of the Starwood guest reservation system discovered by Marriott in 2018.
California voters passed Proposition 24, the California Privacy Rights Act, on Nov. 3, which expands upon the recently activated California Consumer Privacy Act specifically when it comes to enforcement and how businesses handle personal data.
CISA and Oracle are urging users to apply an emergency patch for a vulnerability in the software giant's WebLogic Server product. This "severe" bug is already under active exploitation and could allow an attacker to run malicious code, security experts say.
Large, recently levied privacy fines against the likes of British Airways, H&M and Marriott show regulators continuing to bring the EU's General Data Protection Regulation to bear after businesses get breached. But in the case of Marriott and BA, were the final fines steep enough?
In a notification letter filed to the Montana Department of Justice, precious metal trader JM Bullion has revealed that an unknown amount of customer information has been compromised in a data breach. The security incident took place over a five-month period earlier this year.
Microsoft plans to patch on Nov. 10 a zero-day kernel vulnerability found by Google's Project Zero bug-hunting team. Google released the details of the flaw after a week because attackers are using it in the wild.
Hackers are threatening patients of a Finnish mental health provider with the public release of their sensitive data exposed in a 2018 data breach if they do not pay a ransom. The case highlights how data breaches can open the door to additional cybercrimes over an extended period.
In 2020, trust is crucial. A huge amount of work goes into building a brand and maintaining loyalty, but when data breaches happen, trust evaporates quickly. Eighty-one percent of consumers have said they would stop doing business with brands online after a breach.
This Report is the essential guide for CISOs and...
Breaches are all too common today as determined cyber criminals have become better organized and more targeted in their attacks. In many cases, a C-level executive loses their job as a result. That doesn't have to be you or your organization.
The right security testing solution is key to keeping you safe. From...
In today's IT environment, one of the biggest risks to a corporation's valuation is a security breach. Security Vendors make wide claims about the effectiveness of their products - making it almost impossible to identify the right vendor for your security needs.
From scanners and traditional pen tests to bug bounty...
Dr. Reddy's Laboratories, a multinational pharmaceutical company based in India that's testing a COVID-19 vaccine, says it isolated its data center services Thursday following what it calls a "detected cyberattack."
The time is running out, and there are two questions you need to answer:
What's the impact of security breaches on your organization?
What security measures should you choose to improve product security?
Luckily, this whitepaper helps you answer both of them.
Download this Whitepaper to discover how you can...
A recent hacking incident had an unusual twist: The hacker who broke into the network of a Pennsylvania-based nonprofit entity apparently decided against injecting malware or proceeding with other malicious activities after discovering the organization serves individuals with intellectual disabilities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.