Data Breaches
Latest about Data Breaches

T-Mobile breach leaves customers vulnerable to phishing
By Ross Kelly published
News T-Mobile confirmed that while customer information was exposed, no financial data or company systems were compromised

FCC plans strict overhaul of 15-year-old US data breach regulations
By Rory Bathgate published
News Telcos could no longer be able to use negligence as a defence for data breaches as the FCC also seeks to hasten public notification of breaches

IRS mistakenly publishes 112,000 taxpayer records for the second time
By Zach Marzouk published
News A contractor is thought to be responsible for the error, with the agency reportedly reviewing its relationship with Accenture

Uber says compromised third-party to blame for data breach
By Ross Kelly published
News Vulnerable third-party vendor Teqtivity sparks second major incident for Uber in the space of three months

Telstra blames IT blunder for leak of 130,000 customer records
By Zach Marzouk published
News Australia’s biggest telco said that the error was due to a mismanagement of databases and not a cyber attack

How to react to a data breach
By Davey Winder last updated
In-depth Every business should have a data breach response plan, but when building one it can be difficult to know where to start

Dropbox confirms hackers stole 130 code repositories in GitHub phishing campaign
By Zach Marzouk published
News The attackers carried out a phishing attack and gained employee login credentials to CircleCI, which they then used to access GitHub

Australia's Department of Defence becomes latest victim of regional ransomware attacks
By Rory Bathgate published
News Military information was not stolen in the breach, which may affect the records of 40,000 defence personnel
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.