article thumbnail

South African telecom provider Cell C disclosed a data breach following a cyberattack

Security Affairs

. “Cell C is aware that data compromised in the recent cybersecurity incident has been unlawfully disclosed by RansomHouse, the threat actor claiming responsibility.” “This follows a previously reported incident involving unauthorised access to unstructured data in some parts of our IT environment.”

article thumbnail

Canadian authorities arrested alleged Snowflake hacker

Security Affairs

Canadian authorities arrested a suspect linked to multiple hacks following a breach of cloud data platform Snowflake earlier this year. “Canadian authorities have arrested a man suspected of being behind a string of hacks involving as many as 165 customers of Snowflake Inc., Charges remain undisclosed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why DSPM is Essential for Achieving Data Privacy in 2024

Security Affairs

million terabytes of data are created daily. According to other reports, most of that data is unstructured. As organizations deal with such high volumes of dark and unstructured data, most of this data contains sensitive information , making it a primary target for data breach attacks.

article thumbnail

Researcher’s audacious hack demonstrates new type of supply-chain attack

Malwarebytes

Instead of responding with an A record, the attacker’s name server will respond with a CNAME, MX or TXT record, which allows a large amount of unstructured data to be sent between attacker and victim. The post Researcher’s audacious hack demonstrates new type of supply-chain attack appeared first on Malwarebytes Labs.

Hacking 139
article thumbnail

Artificial intelligence (AI) as an Enabler for Enhanced Data Security

Security Affairs

AI-driven systems overcome these limitations by using advanced machine learning models and context-aware algorithms to recognize complex data types, providing a more reliable and dynamic classification framework. This is particularly useful for unstructured data (as found in most document stores, email and messaging systems, etc.)

article thumbnail

GUEST ESSAY: Recalibrating critical infrastructure security in the wake of evolving threats

The Last Watchdog

The recent Unitronics hack , in which attackers took control over a Pennsylvania water authority and other entities, is a good example. Related: France hit by major DDoS attack The Unitronics hack was particularly effective given the nature of the target. in different industries, including energy, manufacturing, and healthcare.

article thumbnail

MediSecure data breach impacted 12.9 million individuals

Security Affairs

“The impacted server analysed by McGrathNicol Advisory consisted of an extremely large volume of semi-structured and unstructured data stored across a variety of data sets.” Pierluigi Paganini Follow me on Twitter: @securityaffairs and Facebook and Mastodon ( SecurityAffairs – hacking, MediSecure)