Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Phishing and Pretexting Dominate Social Engineering-Related Data Breaches

New data shows that despite the massive evolution of the cybercrime economy, threat actors are sticking with the basics in social engineering attacks, with a goal at stealing data. I probably could have called this purely based on all the articles I’ve written (and all the articles I’ve read that never made it here). But when it comes to protecting your organization from social engineering, stick to the basics.

Dell Data Breach: Hackers Expose Personal Info of 49M Customers for Sale

Dell Data Breach: What You Need to Know? Dell Technologies recently announced a data breach affecting a company portal, which compromised certain customer information linked to purchases. The breach exposed customer names, physical addresses, and detailed order information, such as service tags, item descriptions, order dates, and warranty details. Fortunately, Dell has assured that no financial data, email addresses, phone numbers, or other highly sensitive information were accessed during the incident.

What Does Incognito Mean, How Does It Work, and Is It Really Safe?

How do you browse the Internet? Using a primary browser, you can turn on “incognito mode,” which increases your privacy on singular devices but is also less concealing than other privacy tools like virtual private networks (VPNs). The functionality of these modes differs between browsers. While the mode offers reliable personal security, it also lacks cybersecurity defenses and is often used by those with misconceptions about how the tool works. So, what is incognito mode?

What Is a Pig Butchering Scam: How to Protect Your Financial Future

How far are you willing to go to obtain love? Online threats surround us every time we get on the Internet—all of them are out for more than a lasting emotional connection. Romance scams are the most insidious of online threats, not because they wreck the emotional and financial statuses of their victims but because they are incredibly well-thought-out.

Has your personal data been breached on the dark web?

The dark web can feel like a mysterious underworld, a hidden corner of the internet where there are no rules. It’s a place where stolen data gets traded, and cybercriminals plot their next attacks. Just because it’s dark, that doesn’t mean you have to be blind to the threats lurking there. That’s where ManageEngine Log360 comes in with a powerful new integration for Constella Intelligence.

Top 10 Best-Known Cybersecurity Incidents and What to Learn from Them

Negligent or malicious behavior by those who have legitimate access to your systems can be more devastating to your company than the efforts of outside attackers. The 2023 Cost of Insider Risk Global Report by the Ponemon Institute shows that cybersecurity incidents caused by insiders through negligence, credential theft, and malicious intent had an average cost per incident of $505,113, $679,621, and $701,500, respectively.

HSBC and Barclays Face Data Breach, Confidential Information Leaked

In April 2024, a significant breach rattled the financial sector as HSBC and Barclays, two prominent banking institutions, fell victim to a data breach. The breach occurred within the infrastructure of a direct contractor working for both banks, sending shockwaves through the industry and raising concerns about the security of sensitive financial data.

Ascension Healthcare Compromise

On May 8, 2024, Ascension Healthcare notified business partners of suspicious activity detected within their systems. They have launched investigations and are actively working on remediation efforts. Consequently, some systems will experience interruptions during this process, such as clinical operations. Ascension is currently working with Mandiant to investigate the compromise and whether sensitive data was affected, if at all.

Verizon Data Breach Investigations Report 2024 Review

As with every year, the Verizon DBIR is released, with data involving more than 10,000 breaches that have been dissected and used to create the report’s baseline. Cyberint’s Research team inspected the document to understand where the cyber security realm is heading, the important trends in data breaches and incidents, and what we need to look for moving forward in 2024.

Common Scams on Facebook Marketplace by Fake Buyers

Facebook (FB) is the most popular social platform worldwide, hosting 2.9 billion monthly active users. The draw to FB comes from its social connectivity, allowing friends and family to stay connected, updated, and in each other’s lives, no matter where they are. Facebook’s success is also due, in part, to its platform services. The Facebook Marketplace is among the most used, with nearly 16% of active users (491 million people) using the platform to review the available items.