HackDig : Dig high-quality web security articles for hackers

Account Hijacking Site OGUsers Hacked, Again

For at least the third time in its existence, OGUsers — a forum overrun with people looking to buy, sell and trade access to compromised social media accounts — has been hacked. An offer by the apparent hackers of OGUsers, offering to remove account information from the eventual database leak in exchange for payment. Roughly a week ago, the OGUse
Publish At:2020-12-02 12:48 | Read:149 | Comments:0 | Tags:Data Breaches Ne'er-Do-Well News Disco Payments Discoli ogus

Security Blueprints of Many Companies Leaked in Hack of Swedish Firm Gunnebo

In March 2020, KrebsOnSecurity alerted Swedish security giant Gunnebo Group that hackers had broken into its network and sold the access to a criminal group which specializes in deploying ransomware. In August, Gunnebo said it had successfully thwarted a ransomware attack, but this week it emerged that the intruders stole and published online tens of thousan
Publish At:2020-10-28 14:17 | Read:197 | Comments:0 | Tags:Data Breaches Ransomware Dagens Nyheter Gunnebo Group breach

Breach at Dickey’s BBQ Smokes 3M Cards

One of the digital underground’s most popular stores for peddling stolen credit card information began selling a batch of more than three million new card records this week. KrebsOnSecurity has learned the data was stolen in a lengthy data breach at more than 100 Dickey’s Barbeque Restaurant locations around the country. An ad on the popular card
Publish At:2020-10-15 18:11 | Read:312 | Comments:0 | Tags:Data Breaches Latest Warnings Dickey's Barbeque breach Eli D

Using the Cost of a Data Breach to Maximize Your ROI on Your Security Tools

The 2020 Cost of Data Breach report from IBM and the Ponemon is out. It provides a detailed analysis of causes, costs and controls that appeared in their sampling of data breaches. The report is full of data, and the website allows you to interact with its information so that you can do your own analysis and/or dig into aspects relevant to you and your indus
Publish At:2020-09-15 01:50 | Read:451 | Comments:0 | Tags:IT Security and Data Protection Cost of Data Breach Study Da

Hacked Data Broker Accounts Fueled Phony COVID Loans, Unemployment Claims

A group of thieves thought to be responsible for collecting millions in fraudulent small business loans and unemployment insurance benefits from COVID-19 economic relief efforts gathered personal data on people and businesses they were impersonating by leveraging several compromised accounts at a little-known U.S. consumer data broker, KrebsOnSecurity has le
Publish At:2020-08-06 19:42 | Read:484 | Comments:0 | Tags:Data Breaches The Coming Storm COVID-19 Derek Dubner Economi

Robocall Legal Advocate Leaks Customer Data

A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers. The Blacklist Alliance provides techno
Publish At:2020-08-03 18:21 | Read:374 | Comments:0 | Tags:A Little Sunshine Data Breaches Call Protect Jolly Roger Tel

Here’s Why Credit Card Fraud is Still a Thing

Most of the civilized world years ago shifted to requiring computer chips in payment cards that make it far more expensive and difficult for thieves to clone and use them for fraud. One notable exception is the United States, which is still lurching toward this goal. Here’s a look at the havoc that lag has wrought, as seen through the purchasing patter
Publish At:2020-07-29 18:40 | Read:490 | Comments:0 | Tags:A Little Sunshine Data Breaches briansclub hack Damon McCoy

NY Charges First American Financial for Massive Data Leak

In May 2019, KrebsOnSecurity broke the news that the website of mortgage title insurance giant First American Financial Corp. had exposed approximately 885 million records related to mortgage deals going back to 2003. On Wednesday, regulators in New York announced that First American was the target of their first ever cybersecurity enforcement action in conn
Publish At:2020-07-23 15:57 | Read:464 | Comments:0 | Tags:Data Breaches The Coming Storm First American Financial Corp

What Are Insider Threats and How Can You Mitigate Them?

What is an insider threat? Insider threats are users with legitimate access to company assets who use that access, whether maliciously or unintentionally, to cause harm to the business. Insider threats aren’t necessarily current employees, they can also be former employees, contractors or partners who have access to an organization’s systems or d
Publish At:2020-07-17 14:07 | Read:592 | Comments:0 | Tags:CISO Endpoint Identity & Access Access Management Cost of a

6 Cloud Security Threats Healthcare Companies May Face – With Solutions

For healthcare organizations that handle a lot of patient data, including very sensitive information, cloud computing is a revolution to data storage. Cloud computing in healthcare lowers data storage costs (compared to the old paper-storage era), enables easy retrieval of patient data and also improves the privacy of patient information. This has inevitably
Publish At:2020-07-15 01:07 | Read:534 | Comments:0 | Tags:Featured Articles Healthcare Cloud Cyberattacks Data Breache

COVID-19 ‘Breach Bubble’ Waiting to Pop?

The COVID-19 pandemic has made it harder for banks to trace the source of payment card data stolen from smaller, hacked online merchants. On the plus side, months of quarantine have massively decreased demand for account information that thieves buy and use to create physical counterfeit credit cards. But fraud experts say recent developments suggest both tr
Publish At:2020-06-30 12:01 | Read:587 | Comments:0 | Tags:Data Breaches The Coming Storm Andrew Barratt Chicken Expres

‘BlueLeaks’ Exposes Files from Hundreds of Police Departments

Hundreds of thousands of potentially sensitive files from police departments across the United States were leaked online last week. The collection, dubbed “BlueLeaks” and made searchable online, stems from a security breach at a Texas web design and hosting company that maintains a number of state law enforcement data-sharing portals. The collect
Publish At:2020-06-22 03:10 | Read:866 | Comments:0 | Tags:Data Breaches The Coming Storm BlueLeaks Distributed Denial

FEMA IT Specialist Charged in ID Theft, Tax Refund Fraud Conspiracy

An information technology specialist at the Federal Emergency Management Agency (FEMA) was arrested this week on suspicion of hacking into the human resource databases of University of Pittsburgh Medical Center (UPMC) in 2014, stealing personal data on more than 65,000 UPMC employees, and selling the data on the dark web. On June 16, authorities in Michigan
Publish At:2020-06-18 22:02 | Read:601 | Comments:0 | Tags:Data Breaches Other Tax Refund Fraud AlphaBay DearthStar Evo

When Security Takes a Backseat to Productivity

“We must care as much about securing our systems as we care about running them if we are to make the necessary revolutionary change.” -CIA’s Wikileaks Task Force. So ends a key section of a report the U.S. Central Intelligence Agency produced in the wake of a mammoth data breach in 2016 that led to Wikileaks publishing thousands of classif
Publish At:2020-06-17 22:52 | Read:557 | Comments:0 | Tags:A Little Sunshine Data Breaches Sen. Ron Wyden U.S. Central

The Latest Mobile Security Threats and How to Prevent Them

For many of us, the last few months have drastically increased our reliance on mobile capabilities. Through the increased use of corporate mobile apps, virtual private networks (VPNs), hot spots and more, mobile communications are more ubiquitous than ever. Because of this enhanced, unprecedented and sudden dependence on mobile capabilities, mobile security
Publish At:2020-06-15 10:53 | Read:736 | Comments:0 | Tags:Mobile Security Bring-Your-Own-Device (BYOD) Data Data Breac