Fashion brand SHEIN fined $1.9m for lying about data breach
Is “pay a small fine and keep on trading” a sufficient penalty for letting a breach happen, impeding an investigation, and hiding the truth?
Cyber News, Cyber Threat TrendsIs “pay a small fine and keep on trading” a sufficient penalty for letting a breach happen, impeding an investigation, and hiding the truth?
Cyber News, Cyber Threat TrendsThe campaign had several features differentiating it from other ransomware tracked by Microsoft
Cyber News, Cyber Threat TrendsWhich? said it has reported the fake URLs to the National Cyber Security Centre
Cyber News, Cyber Threat TrendsSuspected members of a European car-theft ring have been arrested: The criminals targeted vehicles with keyless entry and start systems, exploiting the technology to get into the car and drive away. As a result of a coordinated action carried out on 10 October in the three countries involved, 31 suspects were arrested. A total of […]
Cyber News, Cyber Threat TrendsThe collection became increasingly clear through the tools used by both threat actors
Cyber News, Cyber Threat TrendsThe parent company of women’s fashion site Shein has been fined $1.9 million after being accused of lying about the extent of data breach, and notifying “only a fraction” of affected customers. Read more in my article on the Hot for Security blog.
Cyber News, Cyber Threat TrendsHybrid cloud has become a popular computing model in recent times. Find out all you need to know, including its features, pros and cons. The post What is hybrid cloud? appeared first on TechRepublic.
Cyber News, Cyber Threat TrendsGraham Cluley Security News is sponsored this week by the folks at Kolide. Thanks to the great team there for their support! In 2021, our company went through the SOC 2 Type 1 audit, and we found out just how challenging it can be to prove compliance to a third-party auditor. We also learned firsthand […]
Cyber News, Cyber Threat TrendsACM.83 Leveraging Resource Policies vs IAM Policies to prevent unintended access to secrets in Cloud Environments This is a continuation of my series of posts on Automating Cybersecurity Metrics. Note that I started working on this diagram but I amend it in a later post for greater accuracy and alignment with our policy objectives. In […]
Cyber News, Cyber Threat Trends