The UK financial regulator found that cyber insurance firms "mostly" weathered the stress test, in the sense that only a small number reported concluding the scenario with an amount of funds on hand that would put them beneath national solvency capital requirements.
Ransomware attack’s main impact to derivative trading thus far has been long delays in processing for financial firms in Europe and the United States, but operations for other ION clients have also been strongly impacted.
GoodRX admits no wrongdoing in the settlement, claiming that the health data it shared could not identify an individual user's health condition. The company was found to be sharing data with 20 marketing firms.
The Google Fi service was caught up in the T-Mobile data breach of late 2022 that saw an attacker gain access to 37 million records of customer data. Google’s breach is somewhat more concerning, as the company reports that SIM card serial numbers were stolen.
Ticketmaster executives have been brought in front of a Senate Judiciary Committee and claims now that a bot army were both purchasing tickets and attempting to breach the servers simultaneously.
Privacy lawsuit alleges that by embedding the Meta pixel on pages hosting its videos, Chick-fil-A violated the 1988 Video Privacy Protection Act (VPPA) which applies only to data collection of personally identifiable information when viewing videos.
The Hive ransomware threat appears to be very much in retreat as the US Department of Justice recently announced the seizure of the group's decryption keys and infrastructure, including its public-facing website, by law enforcement operations.
The WhatsApp GDPR violations pertain to Article 12 and 13(1)(c) requirements that platform users be clearly informed of the legal basis under which their personal information is being collected.
Hackers exfiltrated not just internal game cheats, but the source code that underpins this system for certain Riot Games titles, including League of Legends. This creates the possibility of new game cheats and exploits being developed.
GoTo says that the stolen information varies by product, but encryption keys that were also taken in the hack will grant access to "a portion" of the encrypted backups that were stolen.