data breach
![rope](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110951/rope-400x200.jpeg)
The state of security? No one cares about a breach
In an election year, everyone asks the question about whether or not you are better off than you were four years ago. There are many ways to answer such a question, and …
![Dota 2](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111103/dota2-400x200.jpg)
Dota 2 Dev forum breached, nearly 2 million users affected
A hacker has breached the official Dota 2 Dev forum and made off with the entire forum database, which contains email addresses, usernames, IP addresses, and salted password …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
Oracle-owned MICROS PoS systems vendor breached
MICROS, the point-of-sale payment systems vendor owned by Oracle, has suffered a data breach, and there are indicators that point to the infamous Carbanak (aka Anunak) …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
Cybersecurity concern continues to rise
A new Black Hat report reveals some critical concerns about the information security industry and emerging cyber risks faced by today’s enterprises. In 2015, Black Hat …
![DataDog](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111551/datadog-400x200.jpg)
System monitoring company Datadog suffers breach
The team behind Datadog, a widely used SaaS-based monitoring and analytics platform for IT infrastructure, operations and development teams, has announced on Friday that they …
![London](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195027/london-400x200.jpg)
UK: Cybercrime now bigger threat than traditional crime
The accelerating pace of technology and criminal cyber capability currently outpaces the UK’s collective response to cybercrime, calling for stronger collaborative working …
![pulse](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111805/pulse-400x200.jpg)
Why are hackers increasingly targeting the healthcare industry?
Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the …
![GitHub](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112128/github-400x200.jpg)
GitHub accounts compromised in wake of reused password attack
Three days ago, an unknown attacker has been spotted trying to break into a large number of GitHub accounts and has managed to access some of them, Shawn Davenport, Vice …
![Report: The changing face of hacking](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195811/face_of_hacking-400x200.png)
Hacker Guccifer 2.0 claims DNC hack, leaks documents to prove it
An individual that goes by the handle “Guccifer 2.0” has claimed responsibility for the US Democratic National Committee (DNC) hack, and has released documents …
![dollar](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112427/dollar-400x200.jpg)
The average cost of a data breach is now $4 million
The average data breach cost has grown to $4 million, representing a 29 percent increase since 2013, according to the Ponemon Institute. Cybersecurity incidents continue to …
![Fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195511/fire-match-400x200.jpg)
A third of organizations experienced a data breach in the past 12 months
Despite the increasing number of data breaches and more than 3.9 billion data records worldwide being lost or stolen since 2013, organizations continue to believe perimeter …
![VK](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112109/vk-400x200.jpg)
100 milion VK accounts put up for sale
Another “historic” mega breach has been revealed as someone who goes by the alias “Tessa88@exploit.im” has begun selling info tied to 100 milion VK …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD