Identity: The New Cybersecurity BattlegroundIdentity vulnerabilities are the primary attack vector for cyber threats, necessitating modernized security strategies.
The biggest data breaches of 2025 - so far | TechCrunch2025 is poised to exceed previous years in data breaches, with significant incidents already reported affecting millions.
Bluesight's 2025 Breach Barometer Report Reveals Surge in Healthcare Data BreachesMore than 300 million patient records were breached in 2024, a 26% increase from 2023, underscoring the growing cybersecurity challenges in healthcare.
AI and CybersecurityCybercriminals utilize AI for sophisticated phishing attacks, while AI companies face insecurities that could be exploited by both attackers and competitors.
This Corporate Data Breach Lasted 3 Years and Exposed 3 Billion AccountsData breaches are increasing in frequency and scale, raising concerns for corporate security and customer trust.
FBI IC3, Verizon DBIR, Google M-Trends reports are out-here's the conclusions!Three influential cybersecurity reports released at once highlight critical insights and trends.
Identity: The New Cybersecurity BattlegroundIdentity vulnerabilities are the primary attack vector for cyber threats, necessitating modernized security strategies.
The biggest data breaches of 2025 - so far | TechCrunch2025 is poised to exceed previous years in data breaches, with significant incidents already reported affecting millions.
Bluesight's 2025 Breach Barometer Report Reveals Surge in Healthcare Data BreachesMore than 300 million patient records were breached in 2024, a 26% increase from 2023, underscoring the growing cybersecurity challenges in healthcare.
AI and CybersecurityCybercriminals utilize AI for sophisticated phishing attacks, while AI companies face insecurities that could be exploited by both attackers and competitors.
This Corporate Data Breach Lasted 3 Years and Exposed 3 Billion AccountsData breaches are increasing in frequency and scale, raising concerns for corporate security and customer trust.
FBI IC3, Verizon DBIR, Google M-Trends reports are out-here's the conclusions!Three influential cybersecurity reports released at once highlight critical insights and trends.
Criminal hacker known as ALTDOS, DESORDEN, GHOSTR and 0mid16B arrestedA notorious hacker known for multiple aliases has been arrested after a long-term cybercrime campaign targeting sensitive data for extortion.
Hacker Who Targeted NATO, US Army Arrested in SpainAn 18-year-old hacker suspected of breaching over 40 organizations has been arrested in Spain.
Where Were You When the World Shut Down? I Was on BreachForums. | HackerNoonBreachForums, a significant dark web forum, was unexpectedly shut down, impacting users reliant on its marketplace for hacked data.
Criminal hacker known as ALTDOS, DESORDEN, GHOSTR and 0mid16B arrestedA notorious hacker known for multiple aliases has been arrested after a long-term cybercrime campaign targeting sensitive data for extortion.
Hacker Who Targeted NATO, US Army Arrested in SpainAn 18-year-old hacker suspected of breaching over 40 organizations has been arrested in Spain.
Where Were You When the World Shut Down? I Was on BreachForums. | HackerNoonBreachForums, a significant dark web forum, was unexpectedly shut down, impacting users reliant on its marketplace for hacked data.
Hundreds of Dutch medical records bought for pocket change at flea marketA man discovered sensitive medical records on discarded hard drives bought at a flea market in the Netherlands.
South Africa Introduces Mandatory e-Portal Reporting for Data BreachesSouth Africa's Information Regulator has mandated organizations to report data breaches through a new online portal.
Product Walkthrough: How Satori Secures Sensitive Data From Production to AISecuring sensitive data is increasingly difficult due to rapid data growth, changing user roles, and stricter compliance requirements.
Hundreds of Dutch medical records bought for pocket change at flea marketA man discovered sensitive medical records on discarded hard drives bought at a flea market in the Netherlands.
South Africa Introduces Mandatory e-Portal Reporting for Data BreachesSouth Africa's Information Regulator has mandated organizations to report data breaches through a new online portal.
Product Walkthrough: How Satori Secures Sensitive Data From Production to AISecuring sensitive data is increasingly difficult due to rapid data growth, changing user roles, and stricter compliance requirements.
FTC orders Marriott to implement information security programMarriott must enhance its data security practices following FTC allegations of failures that led to massive data breaches affecting millions.
Why every business needs a data security strategyData breaches expose sensitive information, necessitating robust data security measures to prevent financial loss, reputational damage, and compliance violations.
FTC orders Marriott to implement information security programMarriott must enhance its data security practices following FTC allegations of failures that led to massive data breaches affecting millions.
Why every business needs a data security strategyData breaches expose sensitive information, necessitating robust data security measures to prevent financial loss, reputational damage, and compliance violations.
Privilege Under Pressure: The Shifting Data Breach Investigation LandscapeFederal courts are reducing protections for forensic reports in data breaches.Communications with forensic firms may not be protected by privilege.Careful communication strategies are essential in breach investigations.
Digital Rights and the New Administration | EFFector 37.1The EFFector newsletter updates readers on digital rights, with features like annual data breach awards and insights into privacy issues.
Marriott and Starwood hotels will have to get better at data securityMarriott and Starwood mandated to enhance digital security due to FTC findings of lax practices during significant data breaches.
UT Southwestern Medical Center has disclosed at least four breaches since July 2023. Is HHS investigating?Multiple patient data breaches increase scrutiny from HHS OCR regarding compliance with HIPAA Security Rule.
Is your phone infected with Pegasus spyware? This $1 app can checkSmartphone security threats, including Pegasus spyware, are significant concerns, with recent findings highlighting infections in user devices.iVerify offers an accessible tool for regular users to check their smartphones for vulnerabilities.
Data breaches: Preventing and respondingData breaches are escalating due to expanded attack surfaces as organizations digitize and embrace remote access.
In 2025: Identities conquer, and hopefully unite | Computer WeeklyCyber security threats are evolving rapidly due to the rise of AI, necessitating new strategies for access control and risk management.
Data breaches: Preventing and respondingData breaches are escalating due to expanded attack surfaces as organizations digitize and embrace remote access.
In 2025: Identities conquer, and hopefully unite | Computer WeeklyCyber security threats are evolving rapidly due to the rise of AI, necessitating new strategies for access control and risk management.
HHS OCR settles charges that Inmediata Health Group exposed 1.6 million patients' PHI onlineHealth care entities must proactively secure patient information to prevent unauthorized online access, as per HHS OCR announcements.
Leiden University study tracks misconfigurations at 215 companiesProper configuration of cloud storage services is crucial to prevent data breaches.Misconfigurations can expose sensitive information, affecting various sectors.Human error is often the main cause of vulnerabilities in cloud storage.
Are Long-Lived Credentials the New Achilles' Heel for Cloud Security?Enterprises in Australia and APAC must phase out long-lived credentials to mitigate significant cloud security risks, as they remain a serious threat.