pii

How Your Digital Footprint Fuels Cyberattacks — and What to Do About It
Hackers are exploiting the digital breadcrumbs — your personally identifiable information (PII) — that you leave behind daily to launch their cyber attacks ...
Security Boulevard
The Data Privacy Revolution
David Michael Berry | | anti-fraud, Breach, Cyber Security, Cybersecurity, Data Privacy, David Michael Berry, pii, Ransomware, security, technology
In an era where data breaches, ransomware, and other cyber threats are becoming increasingly sophisticated, traditional methods of protecting data, PII, and other sensitive details are proving inadequate. Decades ago, neither HTTP ...

Emerald Divide Uses GenAI to Exploit Social, Political Divisions in Israel Using Disinformation
Nathan Eddy | | Advanced persistent threat, deepfakes, disinformation, dox, Emerald Divide, Hamas, israel, Palestine, pii, Politics
Bad actors are always ready to exploit political strife to their own ends. Right now, they’re doing so with the conflict in the Middle East. A holistic defense against influence networks requires ...
Security Boulevard

Airsoft Data Breach Exposes Data of 75,000 Players
Nathan Eddy | | Airsoft, Attack Surface, Data breach, email, gaming, MFA, passwords, pii, social engineering, user data
Failure to configure authentication allowed malicious actors to exploit Airsoftc3.com's database, exposing the sensitive data of a vast number of the gaming site's users ...
Security Boulevard

UnitedHealth: Ransomware Attackers Stole Huge Amount of Data
The health insurance giant also admitted that it paid a ransom to the threat group as its CEO prepares to testify before Congress May 1 ...
Security Boulevard
Linux Backdoor Infection Scare, Massive Social Security Number Heist
Tom Eston | | backdoor, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, government, Government Contractor, Hacking, Information Security, Infosec, Linux, open source, pii, Podcast, Podcasts, Privacy, security, sensitive data, Social Security Numbers, technology, Weekly Edition, XZ Utils
In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained ...

DoD Email Breach: Pentagon Tells Victims 12 Months Late
Richi Jennings | | Anurag Sen, azure, Azure cloud, Azure Government Cloud, Compliance Automation Platform for FedRAMP, data privacy PII, defense department, Department of Defense, devops in government, DevSecOps in Government, digital government, DoD, email, Federal Government, Federal Government Bids, FedRAMP, fedramp accreditation;, fedramp ato, fedramp certification, fedramp compliance, government, Microsoft Azure, Microsoft Azure Security, Microsoft Exchange, Microsoft Exchange Server, pentagon, pii, PII Leakage, SB Blogwatch, U.S. Department of Defense, United States Department of Defense, US DOD, USDoD, USSOCOM
3TB Email FAIL: Personal info of tens of thousands leaks. Microsoft cloud email server was missing a password ...
Security Boulevard

23andMe: It’s YOUR Fault We Lost Your Data
Richi Jennings | | 23andMe, Compromised Credential, compromised credentials, compromised credentials monitoring, Credential Compromise, credential replay attacks, credential reuse, credential stuffing, credential stuffing attack, Credential Stuffing Attacks, DEVOPS, DevSecOps, DNA, GDPR, iam, password reuse, pii, PII Leakage, SB Blogwatch
Am I my brother's keeper? DNA testing firm doubles down on blaming victims and sics lawyer on them ...
Security Boulevard

Mr. Cooper Hackers Stole ~15 Million Users’ Data
Richi Jennings | | breach disclosure, Centex, Jay Bray, mortgage, Mr. Cooper, Nationstar, pii, PII Leakage, PII Protection, SB Blogwatch
Another day, another huge leak: In October, they called it an “outage;” last month, it became a “cybersecurity incident;” now it’s a full-on PII leak ...
Security Boulevard
Preventing PII Leakage through Text Generation AI Systems
Do an online search for ways to bypass text generation AI security filters, and you will find page after page of real examples and recommendations on how one can trick them into ...