Major data breach at Zomato
A major security breach of restaurant search website Zomato exposed personal information on 17 million users' to include emails, names and passwords were stolen by hackers.
A major security breach of restaurant search website Zomato exposed personal information on 17 million users' to include emails, names and passwords were stolen by hackers.
Over the weekend, the WannaCry ransomware variant cyber attack appears to be spreading across the globe as the number of victims have now surpassed 200,000 in over 150 countries.
A global cyber attack using WannaCrypt ransomware worm hit 74 countries, infecting hospitals, businesses, universities and other organizations.
Verizon has released the tenth edition of its Data Breach Investigations Report (DBIR) for 2017. The 2017 DBIR report includes the latest data on real-world data breaches and security incidents investigated by Verizon or by one their data contributors (such as security vendors and law enforcement agencies). This year’s report also includes data specific to key industries and who targets such verticals and why.
As worldwide cyber threats keep growing, cyber criminals are constantly adapting their methods to attack organizations and evade detection. Standing on our own against such malicious attackers, most organizations don't have a chance without effective threat communication between the public and private sectors.
The owner of restaurant chain Shoney's, Best American Hospitality Corp. (BAHC), confirmed a data breach of customer data at dozens of Shoney's restaurants. The company published a press release that listed the affected restaurant locations and said…
In a recent cyber threat report, McAfee provided some good intelligence on how cybercriminals use Mirai attacks to infect poorly configured Internet of Things (IoT) devices and turn them into bots used for large scale network attacks.
The Verizon security team recently announced the first Data Breach Digest, a series of 18 cybercrime cases the team investigated. The Verizon team starts with a sneak peek of one of the case studies that describes how a university was attacked by an IoT botnet consisting of over 5,000 infected hosts. The study concludes with 12 good lessons learned from the attack.
A new malware campaign was responsible for sending 23 million emails containing Locky ransomware in just 24 hours earlier this week.
To help organizations prepare for Internet of Things (IoT) threats, we outline some key security recommendations for IoT authorization, authentication and access control.