<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 4/11/23

SHARE

Breaches

Yum Brands Discloses Data Breach Following Ransomware Attack

KFC, Pizza Hut, and Taco Bell parent company Yum Brands has confirmed that personally identifiable information (PII) was compromised in a January 2023 ransomware attack. Initially disclosed on January 18, the cyberattack resulted in Yum taking systems offline to contain the incident and closing roughly 300 restaurants in the UK for one day. At the time, the company said that only corporate data was stolen during the attack, but a filing with the Maine Attorney General's Office reveals that PII was compromised as well. READ MORE...


The Discord servers at the center of a massive US intelligence leak

The intelligence files related to the Ukraine war that appeared online aren't the first sensitive military documents shared on video game forums. Over the past few days, U.S. investigators and digital security researchers alike have probed what would seem to be the most unlikely of places to determine the origin of a major leak of classified intelligence documents: video game-focused chat servers. READ MORE...

Hacking

Apps for Sale: Cybercriminals Sell Android Hacks for Up to $20K a Pop

Cybercriminals are finding ways around the official Google Play app store's security, developing tools for trojanizing existing Android applications and selling their malicious wares for up to $20,000 a piece on cybercrime markets. In an April 10 blog post, researchers from Kaspersky published the results of a broad study of nine of the most popular Dark Web forums READ MORE...

Trends

Why it's time to move towards a passwordless future

Adversaries don't need to use sophisticated methods to gain access to enterprise systems or to deploy ransomware - they can just buy or steal credentials and log in. By burdening users with the near-impossible task of maintaining "secure passwords," businesses ultimately give people a huge and unfair level of responsibility for security. As a result, many organizations are relying on what amounts to a roll of the dice to protect themselves and their customers from attackers. READ MORE...

Malware

High-Stakes Ransomware Response: Know What Cards You Hold

When ransomware strikes, how much should you gamble on your resources and opponents' intentions? Here's how to deal yourself a rational, informed way to weigh your options after an attack. When it comes to the ransomware game, it's worth comparing it to another high-stakes activity, poker. It's important for organizations to understand what they're gambling with when they decide whether or not to "negotiate with terrorists." READ MORE...

Information Security

Rethinking Cybersecurity's Structure & the Role of the Modern CISO

A CISO with a focused role will be better prepared to thrive in an organization and accelerate adoption and understanding of cybersecurity. Effective cybersecurity operations are as unique as the business models and technology choices of the companies they protect. Their creation and management are constantly complicated by a lack of common terminology and set of expectations, due mainly to the chaotic path our industry has taken since its relatively recent birth. READ MORE...

On This Date

  • ...in 1921, the first radio sports broadcast airs, giving listeners the blow-by-blow commentary for a 10-round-boxing match in Pittsburgh.
  • ...in 1961, folk singer Bob Dylan performs in New York City for the first time, opening for John Lee Hooker.
  • ...in 1968, President Johnson signs the 1968 Civil Rights Act, providing for equal housing opportunities regardless of race, religion, or national origin.
  • ...in 1970, Apollo 13 is launched. Two days later, an equipment malfunction forces the crew to make emergency repairs and ultimately scrubs their planned Moon landing.