Medibank
![Medibank](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/07125457/medibank-logo-400x200.jpg)
Medibank breach: Security failures revealed (lack of MFA among them)
The 2022 Medibank data breach / extortion attack perpetrated by the REvil ransomware group started by the attackers leveraging login credentials stolen from a private computer …
![Medibank](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/07125457/medibank-logo-400x200.jpg)
All of Medibank’s stolen data leaked, Australia increases maximum penalties for data breaches
Australian health insurance provider Medibank has confirmed that another batch of the customer data stolen in the recent breach has been leaked. “We are conducting …
![Medibank](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/07125457/medibank-logo-400x200.jpg)
Medibank won’t pay the ransom for data stolen in breach
Australian health insurance provider Medibank has announced it won’t be paying the ransom to the criminal(s) who stole data of 9.7 million of its current and former …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Medibank data breach: More customers affected, attacker got in via stolen credentials
Australian private health insurance provider Medibank has revealed that the hack and data breach it discovered over two weeks ago has affected more customers than initially …
![Facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104156/facepalm-files-400x200.jpg)
Medibank hack turned into a data breach: The attackers are demanding money
Medibank, Australia’s largest private health insurance provider, has confirmed that last week’s “cyber incident” has resulted in a data breach. …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege