An activist investor urged identity verification and e-signature provider OneSpan to cut costs, return more money to shareholders and find a buyer for the company. "We strongly believe there are numerous strategic and financial parties interested in acquiring OneSpan," Legion Partners said Monday.
A Georgia healthcare system is notifying over 180,000 individuals of a data compromise involving a hack first detected a year ago, in which attackers accessed and copied a range of patient information. The incident spotlights growing breach response and notification challenges some entities face.
The fallout from the Clop cybercrime group's mass theft of data from MOVEit servers continues to increase. Colorado's state healthcare agency alone is now notifying 4 million affected individuals. The latest tally of victims has reached 670 organizations and 46 million individuals.
Secureworks has executed its second round of layoffs since February, axing 15% of its workforce as the company pursues high-growth products and improved operating margins. The company will reduce its 2,149-person staff by roughly 322 positions as it seeks break-even adjusted EBITDA by January 2024.
Protect AI bought one of the world's largest certified naming authorities to create a bug bounty platform focused exclusively on AI and ML open-source software. The acquisition will allow customers to discover exploits in the AI or ML supply chain weeks before they're publicly revealed.
Public companies disclosing a cyber incident under the new U.S. reporting requirements should focus on the business impact and stay away from the technical pieces, said Venable's Grant Schneider. The disclosure should examine how the incident will affect revenue, profitability and public perception.
In the latest weekly update, ISMG editors discuss the White House's debut of a $20 million contest to exterminate bugs with AI, a New York man admitting to being behind the Bitfinex hack, and a new malware campaign that is targeting newbie cybercriminals in order to steal sensitive information.
In an after-action report on how the Lapsus$ crime group hacked "dozens of well-defended companies with low-complexity attacks," the U.S. Cyber Safety Review Board urges organizations to implement more robust two-factor authentication systems, plus regulations to combat SIM swapping.
A nonprofit firm that administers government dental programs in Canada paid a "substantial" ransom for a decryptor key and the destruction of data stolen in a recent ransomware attack. But the company is now notifying nearly 1.5 million individuals that the hack compromised their data.
At least 637 organizations have now confirmed that they were affected by the zero-day attack on MOVEit file-sharing servers that began in late May, collectively affecting 41 million individuals, report cybersecurity researchers who've been tracking the impact of Clop's data-theft campaign.
This week, Wall Street fined firms for using WhatsApp, NK hackers breached a Russian missile maker, Ivanti backtracked, ransomware attacks cost manufacturers $46B, a cyberattack shut down Gemini North Observatory, ad fraud targeted Android users and healthcare workers' personal info was breached.
One day after personal information for all 10,000 police officers and staff in Northern Ireland was accidentally exposed online, putting their safety at risk, the nation's police service said it's probing a laptop theft last month that may have exposed 200 employees' details.
The Asia-Pacific and Japan region experienced a staggering surge in ransomware victims in just one year, and the LockBit ransomware group was the dominant force behind these attacks. The adoption of zero-day and one-day vulnerabilities resulted in a 204% surge in ransomware victims in the region.
Tampa General Hospital is facing at least three proposed federal class action lawsuits filed in recent days following the nonprofit Florida healthcare provider's disclosure late last month of a data theft incident that affected 1.3 million patients and employees.
Police officers in Northern Ireland are sounding alarms over their personal safety after a data breach revealed the surnames and locations where they serve for nearly 10,000 police officers and staff. Experts warn this could lead to "their death or injury" at the hands of criminals or terrorists.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.