Millions affected by breaches affecting 23andMe, medical transcription service
When you see a news story about a data breach, you shouldn’t always expect it to disappear after the initial report. Occasionally, follow up stories may appear stating that the number of data breach victims was higher than expected, or that the entity in question experienced another cyberattack after the ... Read More
Decoding Digital Threats: How Bad Actors Leverage Data Brokers to Access Your Personal Information
A question that frequently crosses our minds in this digitally-driven world is: “How do cybercriminals get hold of our personal information?” Your digital life intertwines with countless platforms, each housing fragments of your data, which when pieced together, form a comprehensive digital profile. One breach, and this profile can end ... Read More
How Social Engineering Attacks Target CEOs
Social engineering is a type of cybersecurity attack that aims to manipulate victims into sharing personal information, revealing account login, or exposing sensitive information that compromises their personal and/or company’s security, privacy, and finances. While 2022 estimates are still being accounted for, it has been assessed that 6.9 billion was ... Read More
American Bar Association, Shields Health Care Group experience data breaches
Whenever a data breach takes place involving an entity you are involved with, you should know all the details, particularly involving what data points were compromised in the incident. Depending on the data that was exposed, your next course of action will vary. Perhaps it will be as simple as ... Read More
Open-source media player software application Kodi, Webster Bank, disclose data breaches
It shouldn’t be a surprise to know that entities in every state experience data breaches. It also shouldn’t be a surprise to know that some states experience more data breaches than others. Network Assured released a report detailing the 10 states that reported the most data breaches in 2022. Some ... Read More
AI Impersonation and Vishing: An Overview and Preventative Measures
AI impersonation technology is a new and concerning cyber threat that uses machine learning algorithms to impersonate people online. Hackers can use this technology to create convincing fake personas that they can use to trick their targets into divulging sensitive information. This technique, when combined with vishing, a type of ... Read More
Ferrari discloses data breach; Apple releases security updates to patch vulnerabilities
No one wants to receive a data breach notification letter. It’s a document that informs you that your information is at risk, and will likely require you to take action to protect yourself from cyber scams and other headaches. But receiving a timely data breach notification letter is better than ... Read More
5 Ways Executive Threat Protection Supports Corporate Cybersecurity
With an estimated $188.36 billion invested in information security and risk-management cybersecurity in 2023, corporations understand the essential nature of cybersecurity in protecting their human, capital, and data assets. However, even with these significant protections, there continue to be reports of successful attacks disrupting large scale corporations’ operations. How can ... Read More
FBI issues warning over crypto schemes; Mental health app data breach affects more than three million
Each year, plenty of reports emerge detailing the frequency and severity of cyberattacks, but perhaps few are as important as the FBI’s Internet Crime Complaint Center’s annual report. The IC3’s 2022 report includes plenty of interesting cyberattack statistics. Phishing remains the most commonly reported cyberattack and California residents lost more ... Read More
NortonLifeLock issues warning over data breach; Malicious Google search ads trigger malware downloads
The new year is already underway, and with it comes a flurry of predictions about what cybersecurity threats may emerge in 2023. Even though the bustle of the holiday season is over, that does not mean it’s time to become complacent with maintaining proper cyber hygiene, as malicious actors launch ... Read More