cyberattack
![mr. Cooper](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/19105220/mrcooper-1400-400x200.jpg)
Mr. Cooper breach exposes sensitive info of over 14 million customers
Mortgage company Mr. Cooper has confirmed that personal information of over 14.6 million customers has been exposed in its October 2023 data breach. The breach “On …
![MongoDB](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/18103148/mongodb-1400-400x200.jpg)
MongoDB corporate systems breached, customer data exposed
Database management company MongoDB has suffered a breach: attackers have gained access to some of its corporate systems and customer data and metadata. The MongoDB breach …
![energy](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100505/energy-400x200.jpg)
Danish energy sector hit by a wave of coordinated cyberattacks
The Danish energy sector has suffered what is believed to be the most extensive cyberattack in Danish history, according to SektorCERT. Danish energy sector under attack …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/31120744/healthcare-pills-attack-400x200.jpg)
Cyberattacks on healthcare organizations affect patient care
88% of organizations experienced an average of 40 attacks in the past 12 months, according to a survey conducted by the Proofpoint and Ponemon Institute. Supply chain attacks: …
![executives](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/06113627/executives-400x200.jpg)
CISOs and board members are finding a common language
86% of CISOs believe generative AI will alleviate skills gaps and talent shortages on the security team, filling labor-intensive and time-consuming security functions and …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110724/iot-400x200.jpg)
Inadequate IoT protection can be a costly mistake
97% of organizations are struggling to secure their IoT and connected products to some degree, according to Keyfactor. The research survey also found that 98% of organizations …
![digital identity](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20132922/digital_identity4-400x200.jpg)
Selective disclosure in the identity wallet: How users share the data that is really needed
Name, date of birth, address, email address, passwords, tax records, or payroll – all this sensitive user data is stored by companies in huge databases to identify individuals …
![connected](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/29155248/connected-home-400x200.jpg)
Are executives adequately guarding their gadgets?
Today, individual citizens, rather than businesses or governmental bodies, are the main entry points for cyberattacks. However, security solutions haven’t evolved …
![ransomware attack](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/24145026/ransomware-attack-400x200.jpg)
Cloud hosting firms hit by devastating ransomware attack
Danish cloud hosting firms CloudNordic and Azero – both owned by Certiqa Holding – have suffered a ransomware attack that resulted in most customer data being …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/25133912/ai-security-400x200.jpg)
Keystroke sounds can betray passwords
Researchers from several UK universities have proven that the recorded sounds of laptop keystrokes can be used to obtain sensitive user data such as passwords with a high …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094415/money-1-400x200.jpg)
Budget constraints threaten cybersecurity in government bodies
Government organizations are attractive targets for threat actors whose motivations may be geopolitical, financial, or disruption, according to BlackBerry. Because threat …
![Omar Sangurima](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/21134021/omar_sangurima-2-memorial_sloan_kettering_cancer_center_careers-400x200.jpg)
The direct impact of cyberattacks on patient safety and care delivery
As the healthcare industry continues its rapid transformation through the adoption of digital technologies, it is also confronted with an ever-expanding range of cybersecurity …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders