data breach
Australia government looses visa holders sensitive details in cyber attack
A cyber attack targeting the database of technology service provider ZicroDATA has reportedly resulted in the leak of sensitive information pertaining to Australian visa holders. The compromised data includes full names from visa applications, phone numbers, dates of birth, driving license details, passport numbers, and aspects of medical history. As of now, there is no […]
Cyber Attack leads to 1.4GB NSA data breach
The National Security Agency (NSA) of the United States, responsible for overseeing national security and defense matters, has recently made headlines due to a reported cyber attack resulting in a significant data breach. Approximately 1.4GB of data, including classified information purportedly sourced from defense databases, has been compromised and is now available for sale on […]
Twitter Data breach and 10 billion password leak details
Researchers from a security firm( name withheld) have uncovered a significant data breach involving Twitter user data, revealing a leaked dataset of approximately 9.86GB. This trove includes over 200 million user records linked to account profiles, names, email addresses, and in some cases, contact numbers. The leaked information has surfaced on a data leak forum, […]
Breaking Down the WebTPA Data Breach: Expert Analysis and Perspectives
The recent WebTPA data breach has impacted approximately 2.4 million individuals, with unauthorized access to a network server leading to potential exposure of personal information. The breach, detected on December 28, 2023, is believed to have occurred between April 18 and April 23, 2023. Compromised data may include names, contact information, dates of birth and […]
UK Military data breach and LockBit admin identified
In recent days, the digital media has been abuzz with speculation regarding a potential breach of Britain’s defense database. Today, the Ministry of Defense, UK, officially confirmed that its servers experienced unauthorized access, resulting in the exposure of personal and financial information belonging to military personnel and certain political figures, particularly those within ministerial roles. […]
Taj Hotel Data Breach details
Taj Hotels, a subsidiary of Indian Hotels Company Ltd (IHCL), recently fell victim to a cyber-attack that resulted in the compromise of personal details belonging to more than 1.5 million customers. The leaked information encompasses a range of sensitive data, including addresses, membership IDs, mobile numbers, and other Personal Identifiable Information (PII) spanning the period […]
Top Cloud Misconfigurations Leading to Cloud Data Breaches
As organizations increasingly migrate their operations to the cloud, the security of their cloud infrastructure becomes a paramount concern. While cloud services offer numerous benefits, mis-configurations in cloud environments can inadvertently expose sensitive data and lead to catastrophic breaches. In this article, we’ll explore some of the top cloud mis-configurations that pose significant security risks […]
Information Security News headlines trending on Google
First is regarding a ‘Rapid Security Update’ that is being issued by Apple Inc to all iOS devices and applies to iPads and macOS. The technology giant confirmed that the update is a necessity and can be automatically updated as well, if the settings are tweaked. It disallows hackers from taking control of the device […]
UK Data Regulator publishes information of firms hit by data breaches
Next time when you are hit by a cyber attack, you better be aware that the UK’s Information Commissioner’s office (ICO) will soon make the information public by posting it on its website. Yes, this is what the ICO has decided as it believes that naming and shaming will make company heads take measures to […]
Overcoming security alert fatigue
Alert fatigue represents more than a mere inconvenience for Security Operations Centre (SOC) teams; it poses a tangible threat to enterprise security. When analysts confront a deluge of thousands of alerts daily, each necessitating triage, investigation, and correlation, valuable time is easily squandered on false positives, potentially overlooking genuine indicators of an enterprise-wide data breach. […]