Information like this can live forever on the Dark Web. Manufacturing data like blueprints spec sheets, research and development files, schema, product plans and similar specific product information is a hot seller in Dark Web markets.
Hackers steal and leak Door Control USA’s proprietary information
An estimated 200,000 T-Mobile customers’ information at risk after a malicious hacking incident
It’s not all ransomware these days – good old-fashioned hacking is still a risk that every business faces. When information like this makes its way to the Dark Web, it makes hackers’ jobs easier.
An unsecured database at GetSchooled left 930,000 clients’ personal identifiable information exposed
Failing to secure a database is a rookie mistake, and especially embarrassing (and dangerous) for a charity that primarily serves minors.
Aetna attacked by phishing scam, exposes 500,000 clients’ information
Insider threats are one of the most overlooked high-damage cybersecurity threats. No one wants to believe that their employees are out to get them, but even non-malicious insiders can do massive damage fast.
VoIP theft of service: What you need to know
Theft of service is the most common type of fraud that impacts Voice over Internet Protocol (VoIP) phone systems. Let’s take a closer look at how it affects VoIP networks and how your organization can prevent or minimize the risk of this type of fraud.