data breach
Exposing the Cybercrime as a Business model
Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends from 2015. Experts gathered real-world data from hundreds of breach …
Hacking Team hacker explains how he did it
Some nine moths ago, a hacker that calls himself Phineas Fisher managed to breach the systems and networks of Hacking Team, the (in)famous Italian company that provides …
Why few US consumers penalize hacked companies?
About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of …
6,013 breaches reported in the US since 2005
In 2005, the Identity Theft Resource Center (ITRC) began monitoring and tallying the ever-growing number of US security breaches. Since then, the organization has seen a 397 …
Panama Papers: A data security disaster
The Panama Papers security breach is a juicy, made-for-the-Internet scandal. It has all the elements – secret off-shore accounts; involvement by international politicians, …
Cybercriminals are adopting corporate best practices
Cybercriminals are adopting corporate best practices and establishing professional businesses in order to increase the efficiency of their attacks against enterprises and …
Are your vendors leaving you vulnerable?
Third-party vendors can be a significant security risk if their access to IT systems are not managed and monitored correctly, according to Bomgar. The new study explores the …
Industry reactions to the Mossack Fonseca data breach
The Panama Papers, a collection of 11.5 million files leaked from Panama-based law firm Mossack Fonseca, are now online. The documents show in detail just how exactly the …
The power to immediately counter data theft with Matchlight from Terbium Labs
In June 2015, Terbium Labs launched Matchlight, a first-of-its-kind data intelligence system used to find stolen enterprise data on the dark web within minutes of it …
Sophisticated threats dictate future response strategies
Trend Micro released its annual security roundup report which dissects the most significant security incidents from 2015. The research confirms attackers are now bolder, …
Sea pirates and cyber attacks: Information security breaches in the maritime industry
The Maritime Trade Information Sharing Center, Gulf of Guinea (MTISC-GoG) has denied that it has suffered a data breach that could result in sea pirates knowing details about …
Terbium Labs closes $6.4m in funding for stolen data discovery on Dark Web
Terbium Labs announced at RSA Conference that it has raised $6.4 million in Series A financing led by .406 Ventures, bringing the total raised to $9.7 million. Terbium Labs …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades