The Breach News

Webinar: Understanding Zero-Standing Privileges

Webinar on Zero-Standing Privileges: An Essential Cybersecurity Strategy In an increasingly hostile digital landscape, organizations are continually looking for methods to enhance their cybersecurity posture. A recent webinar titled "Zero-Standing Privileges Explained" provided crucial insights into how this approach can bolster defenses against potential cyber threats. The session highlighted the…

Read MoreWebinar: Understanding Zero-Standing Privileges

Oracle discreetly informs customers that the breach occurred in a ‘legacy’ system.

Oracle, a leading enterprise computing company, has recently come under scrutiny amid reports of a potential breach involving customer records on its cloud computing platform. While the company has publicly dismissed claims of being a victim of a breach, sources indicate that Oracle has privately informed its clients that hackers…

Read MoreOracle discreetly informs customers that the breach occurred in a ‘legacy’ system.

The Overlooked Challenge of Non-Human Identity: It’s Time to Revamp Your Security Strategy

Recent years have seen organizations prioritize the security of human identities, yet a significant vulnerability has quietly emerged in digital infrastructures. Current estimates indicate that for every human identity within enterprises, there are roughly 50 machine identities operating largely unnoticed. These non-human identities (NHIs)—which include API keys, service accounts, certificates,…

Read MoreThe Overlooked Challenge of Non-Human Identity: It’s Time to Revamp Your Security Strategy

Live Webinar | Streamlining Non-Human Identity and Cryptographic Challenges: Achieving Visibility, Compliance, and Control

Navigating the Challenges of Cryptographic Management in Cybersecurity In an era where strong cryptography and seamless machine-to-machine communication are essential to robust cybersecurity, organizations are increasingly finding themselves challenged by the complexities of managing these critical assets. Common issues include unmonitored certificate expirations, neglected key tracking, and the frantic nature…

Read MoreLive Webinar | Streamlining Non-Human Identity and Cryptographic Challenges: Achieving Visibility, Compliance, and Control

When to Expect Your T-Mobile Data Breach Settlement Payment

It has been several years since T-Mobile customers filed claims as part of a class-action settlement regarding the telecommunications company’s 2021 data breach. This month, eligible individuals are expected to begin receiving their compensation. The lawsuit arose from a significant cyber incident in which the personal information— including names, addresses,…

Read MoreWhen to Expect Your T-Mobile Data Breach Settlement Payment

Live Webinar | Scaling Threat Detection and Securing Our Cloud: Insights from Google’s Approach

Upcoming Live Webinar: Scaling Threat Detection and Securing the Cloud at Google In a rapidly evolving cybersecurity landscape, threat detection remains a pivotal concern for organizations around the globe. To address the challenges associated with securing cloud infrastructure, Google will host a live webinar titled, "How Google Does It: Making…

Read MoreLive Webinar | Scaling Threat Detection and Securing Our Cloud: Insights from Google’s Approach

Data Breach at Port of Seattle in August Affected 90,000 Individuals

Port of Seattle Reports Data Breach Affecting 90,000 Individuals Following Ransomware Attack In August 2024, the Port of Seattle, which also oversees operations at Seattle-Tacoma International Airport, fell victim to a significant cyberattack that resulted in the exposure of personal data belonging to approximately 90,000 individuals. This incident, which has…

Read MoreData Breach at Port of Seattle in August Affected 90,000 Individuals