Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Mastercard data breach affected Priceless Specials loyalty program

Mastercard disclosed a data breach that impacted customer data from the company’s Priceless Specials loyalty program. The American multinational financial services corporation notified the data breach to the German and Belgian Data…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on Mastercard data breach affected Priceless Specials loyalty program

Evidence in Marriott’s subsidiary Starwood hack points out to China intel

According to a report published by the Reuters, the massive Marriott data breach was carried out by Chinese state-sponsored hackers. According to the Reuters, people investigating the Marriot data breach believe that it…

Posted in Uncategorized | Tagged , , , , , , , | Comments Off on Evidence in Marriott’s subsidiary Starwood hack points out to China intel

Moscow’s New Cable Car closed due to a ransomware infection

Two days after Moscow opened a new cable car system hackers infected its computer systems with ransomware. The cable car system is long over 700 meters and spans across the Moscow…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on Moscow’s New Cable Car closed due to a ransomware infection

Hackers target Drupal servers chaining several flaws, including Drupalgeddon2 and DirtyCOW

Hackers targeted Drupal web servers chaining some known vulnerabilities, including Drupalgeddon2 and DirtyCOW issues. Security experts at Imperva reported an attack against Drupal Web servers running on Linux-based systems. Hackers exploited the Drupalgeddon2 flaw…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on Hackers target Drupal servers chaining several flaws, including Drupalgeddon2 and DirtyCOW

How to Improve Security and Efficiency for Your File Transfers

Security continues to be top of mind for those in the business of keeping their company’s data out of the wrong hands. To learn where organizations are in their security…

Posted in Featured | Tagged , , , , , , | Comments Off on How to Improve Security and Efficiency for Your File Transfers

USB drives are primary vector for destructive threats to industrial facilities

USB removable storage devices are the main vector for malware attacks against industrial facilities, states Honeywell report. According to a report published on by Honeywell, malware-based attacks against industrial facilities mostly leverage…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on USB drives are primary vector for destructive threats to industrial facilities

Cyber attack exposes sensitive data about a nuclear power plant in France

A cyber attack on a French firm Ingerop allowed attackers to access confidential documents related to nuclear power plant plans in France. The hacker stole more than 65 gigabytes of…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Cyber attack exposes sensitive data about a nuclear power plant in France

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X