article thumbnail

Inside the DemandScience by Pure Incubation Data Breach

Troy Hunt

Additionally, the threat actor with… pic.twitter.com/tqsyb8plPG — HackManac (@H4ckManac) February 28, 2024 When Jason found his email address and other info in this corpus, he had the same question so many others do when their data turns up in a place they've never heard of before - how? And the "why" part?

article thumbnail

The State of Data Breaches

Troy Hunt

I've been harbouring some thoughts about the state of data breaches over recent months, and I feel they've finally manifested themselves into a cohesive enough story to write down. Data Breach Victims are Making it Worse I'm talking about class actions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Unattributable "Lead Hunter" Data Breach

Troy Hunt

That's me who's pwned again because my personal data has just turned up in yet another incident from a source I can't attribute. Less than 3 weeks ago I wrote about The Unattributable "db8151dd" Data Breach which, after posting that blog post and a sample of my own data, the community quickly attributed to Covve.

article thumbnail

The Data Breach "Personal Stash" Ecosystem

Troy Hunt

That's the analogy I often use to describe the data breach "personal stash" ecosystem, but with one key difference: if you trade a baseball card then you no longer have the original card, but if you trade a data breach which is merely a digital file, it replicates.

article thumbnail

When Efforts to Contain a Data Breach Backfire

Krebs on Security

That same month, they also sold data on 1.4 But this history was either overlooked or ignored by Group-IB , the Singapore-based cybersecurity firm apparently hired by Banorte to help respond to the data breach. million customers of Mexican lending platform Yotepresto.

article thumbnail

The State of Data Breaches, Part 2: The Trilogy of Players

Troy Hunt

Last week, I wrote about The State of Data Breaches and got loads of feedback. Let me explain: Hackers This is where most data breaches begin, with someone illegally accessing a protected system and snagging the data. It's awkward, talking to the first party responsible for the breach.

article thumbnail

SolarWinds and Market Incentives

Schneier on Security

The lessons are many, but I want to focus on one important one we’ve learned: the software that’s managing our critical networks isn’t secure, and that’s because the market doesn’t reward that security. The market rewards short-term profits at the expense of safety and security. SolarWinds is a perfect example.