BloodyStealer Steals Gamers’ Account Data to Sell on Dark Web Forums
Kaspersky researchers have discovered an advanced Trojan, called the BloodyStealer, sold on darknet forums and used to harvest gamers’ accounts across widely used gaming...
Personal Data of 106 Mn Visitors to Thailand Left Exposed Online
Thailand is one of the popular tourist destinations with a large number of visitors from across the world. While the country is looking forward...
Attackers Found Leveraging Telegram App to Share Stolen Data
In addition to attacking techniques, cybercriminals often rely on various mediums to deploy/spread their malware or Trojans across targeted networks. Several threat actor groups...
61 Mn Fitness Tracking Records Leaked via Unsecured GetHealth Database
The rise of IoT devices in the health care sector led to various potential cyber risks. The usage of wearable devices like fitness bands...
Data Security: More Than Just Confidential Computing
Sharing sensitive data for processing among ecosystem partners is a challenge. We continue to see enterprises grapple with security concerns associated with moving workloads...
Ireland Data Regulator Fines WhatsApp $266 Mn Over GDPR Violations
Days after suffering a malware attack, WhatsApp now faced a massive penalty from Ireland's Data Privacy Commissioner (DPC) with a €225 million ($266 million)...
How to Protect Your Credit Card Data Online
Sensitive financial data remains a primary target for cybercriminals. Adversaries often target sensitive financial data such as credit/debit card numbers, CVV, and other bank...
Cyber Incident and Data Breach Management Workflow
These days, it's not a matter of if, but when an organization experiences some kind of data breach. Incidents are increasing in number and...
Privacy Concerns Rise as Businesses Report Increased Personal Data Collection: KPMG
A new KPMG survey reveals a deep disconnect between corporate data practices and the general population’s expectations around transparency and data privacy. As companies...
“Privacy Enhancing Technologies can allow organizations to pursue data sharing while remaining compliant”
If we were to participate in a Socrates seminar and deliberate on the importance of securing data, in unison, the response would be: Encryption,...