data breach
17 million Zomato accounts for sale following breach
Popular restaurant search and discovery service Zomato has suffered a breach, and the attackers made off with 17 million user records. What data was compromised? These records …
![Panic](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104316/panic-400x200.jpg)
HandBrake malware attack led to theft of Panic apps’ source code
Oregon-based software company Panic Inc. has announced that some of the source code for their offerings has been stolen, and they are being blackmailed by the attackers. Panic …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
3 in 5 companies expect to be breached in 2017
New research found that of the 50 percent who reported being breached in 2016, the average material impact to the business was $4 million. Vanson Bourne interviewed 600 senior …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112303/users-1-400x200.jpg)
1.9 million Bell Canada customer account details stolen, leaked
Anonymous hackers have stolen and leaked 1.9 million email addresses and some 1,700 names and active phone numbers of Bell Canada customers. The company has not shared where …
![DocuSign](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104347/docusign-400x200.jpg)
DocuSign breached, stolen info used for targeted phishing campaign
Phishing emails impersonating electronic signature technology provider DocuSign are not an unusual sight, but the latest campaign has the added advantage of specifically …
![stock price](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104355/stock_price-400x200.jpeg)
After a data breach is disclosed, stock prices fall an average of 5%
Data security breaches can negatively impact an entire organization – including sales, marketing and IT – and have a significant negative impact on company …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105739/alert-400x200.jpg)
SharePoint houses sensitive data, but organizations are not keeping it safe
A new report from The Ponemon Institute is focused on how organizations are keeping sensitive or confidential data safe in collaboration and file sharing environments such as …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105519/healthcare-400x200.jpg)
Healthcare breaches: Is your data at rest or at risk?
In 2016 healthcare breaches hit an all-time high (328), surpassing the previous record set in 2015 (268), according to Bitglass. Number of breaches Records of approximately …
![lips](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104756/lips-400x200.jpg)
Battling cyber security’s human condition
There is no silver bullet when it comes to cyber security. Organizations with multi-million dollar IT budgets still make headlines for being successfully breached, and even …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113106/data-traveling-400x200.jpg)
Retina-X admits they have suffered a data breach
Retina-X Studios, the makers of several consumer-grade monitoring products, have finally announced that they have suffered a data breach. Retina-X and FlexiSpy, another …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105859/world-1-400x200.jpg)
200 million financial services records breached in 2016, 900% increase from 2015
The financial services industry was attacked more than any other industry in 2016 – 65 percent more than the average organization across all industries, according to the IBM …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104509/architecture-400x200.jpeg)
Cybercrime can come in any shape or size, and not always the form you’d expect
Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD