CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Stolen Data
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Stolen Data

Auctioneer with a hammer and dollar note icons showing REvil ransomware’s stolen data auction on dark web setting precarious precedent amid pandemic
Cyber SecurityNews

REvil Ransomware’s Stolen Data Auction Sets Precarious Precedent Amid Pandemic

June 17, 2020
Cyber criminals behind REvil ransomware are auctioning off stolen data to the highest bidder, hinting at changing tactics and possibly the economic impact of COVID-19 on cybersecurity. Read More

Latest

Visual of smart digital city showing Big Tech's privacy push

“Better, but Still Not Good” – Making Sense of Big Tech’s Privacy Push

Power lines in the spring in a green wheat field showing SolarWinds backdoor in electric utilities

Utility Regulator Says SolarWinds Backdoor Was Downloaded by 1/4 of Electric Utilities on the North American Power Grid

Telegram messenger app on the screen of a smartphone showing phishing attacks using Telegram bots

Phishing Attacks Actively Using Alternative Exfiltration Methods Including Google Forms and Telegram Bots

Lots of gift cards on table showing sale on dark web

Hacker Sold 895,000 Gift Cards Worth $38 Million and 330,000 Payment Cards on a Russian Dark Web Forum

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results