The Register on MSN
Adidas investigates third-party data breach after criminals claim they pwned the sportswear giant
'Potential data protection incident' at an 'independent licensing partner,' we're told Adidas has confirmed it is ...
A database left accessible to anyone online contained billions of records, including sensitive personal data that criminals ...
Lifeguard reports that data brokers harvest personal information for profit, fueling identity theft and fraud. Protecting your data is crucial.
The Figure data breach allowed hackers to steal customer names, dates of birth, physical addresses, phone numbers, and email addresses.
Bad actors have used stolen genetic data to “target people of Jewish and Chinese descent,” William Tong stated.The post Close ...
After detecting a zero-day attack, the country's effective response was attributed to the tight relationship between its ...
Discover the best cybersecurity tools for small businesses in 2026. CrowdStrike, Affordable protection that stops ransomware and phishing.
Credential stuffing attacks use stolen passwords to log in at scale. Learn how they work, why they’re rising, and how to defend with stronger authentication.
Physical letter scam targets Ledger and Trezor customers with fraudulent letters containing QR codes linked to credential-stealing sites.
The OPM data breach was a massive cyberattack in 2015 where hackers stole personal information from millions of people who ...
The infamous Target data breach during the 2013 holiday shopping season, which cost the company more than $200 million in damages, has since been hailed as a landmark case in cybersecurity. Exposure ...
While overall ransomware attack numbers remained steady, higher education institutions drove a sharp rise in exposed records, fueled in part by third-party software vulnerabilities.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results