Cybersecurity / Data breaches

Weekly Cybersecurity / Data breaches Insights

Stay ahead with our expertly curated weekly insights on the latest trends, developments, and news in Cybersecurity - Data breaches.

Recent Articles

Sort Options:

With Retail Cyberattacks on the Rise, Customers Find Orders Blocked and Shelves Empty

With Retail Cyberattacks on the Rise, Customers Find Orders Blocked and Shelves Empty

Retail cyberattacks are increasingly disrupting sales and leaving customers facing blocked orders and empty shelves. The publication highlights the risks of personal data exposure, which can lead to future phishing and fraud attempts.


What are some common types of cyberattacks affecting retailers?
Common types of cyberattacks affecting retailers include supply chain attacks, data breaches, and phishing. These attacks can disrupt sales, lead to blocked orders, and result in empty shelves due to operational disruptions[1][5].
Sources: [1], [2]
How do retail cyberattacks impact customers beyond immediate disruptions?
Retail cyberattacks can expose personal data, which may lead to future phishing and fraud attempts. This can erode customer trust and increase the risk of identity theft and financial fraud[3][5].
Sources: [1], [2]

12 June, 2025
SecurityWeek

Having Clarity On Cyber Risk Is Power

Having Clarity On Cyber Risk Is Power

A recent report highlights that most data breaches arise from unknown vulnerabilities within companies. This underscores the critical need for enhanced cybersecurity measures to identify and address hidden risks, ensuring better protection against potential threats.


What does it mean when data breaches arise from 'unknown vulnerabilities' within companies?
Unknown vulnerabilities refer to security weaknesses in a company's systems or processes that have not yet been identified or addressed by the organization. These hidden gaps can be exploited by attackers to gain unauthorized access, leading to data breaches. Because these vulnerabilities are not known, companies cannot protect against them until they are discovered and mitigated, which highlights the importance of proactive cybersecurity measures such as continuous monitoring and vulnerability assessments.
Sources: [1]
Why is having clarity on cyber risk considered a form of power for organizations?
Having clarity on cyber risk means that an organization understands its specific vulnerabilities, threat landscape, and potential impacts of cyberattacks. This knowledge empowers companies to prioritize security efforts, allocate resources effectively, and implement targeted defenses to prevent breaches. Clear insight into cyber risks reduces uncertainty and enables faster, more informed decision-making, ultimately enhancing the organization's resilience against cyber threats.
Sources: [1]

23 May, 2025
Forbes - Innovation

Learning How to Hack: Why Offensive Security Training Benefits Your Entire Security Team

Learning How to Hack: Why Offensive Security Training Benefits Your Entire Security Team

Verizon's 2025 Data Breach Investigations Report reveals a concerning 18% year-over-year increase in confirmed cyberattacks, particularly against critical infrastructure and cloud enterprises, with initial access through exploited vulnerabilities surging by 34%. Cybersecurity remains a pressing concern for organizations.


What is offensive security training and why is it important for all members of a security team?
Offensive security training involves learning how attackers think and operate by practicing ethical hacking, penetration testing, and other offensive techniques. This training is important for all security team members because it provides critical insights into attacker methods, enabling the entire team to strengthen the organization's security posture. It moves beyond just red teams and penetration testers, helping non-offensive roles better understand threats and respond more effectively to evolving cyberattacks.
Sources: [1]
How does offensive security training help organizations respond to the rising number of cyberattacks?
Offensive security training helps organizations proactively identify vulnerabilities before attackers exploit them by simulating real-world attacks. It improves incident response by enabling security teams to develop more effective detection, response, and recovery strategies. Additionally, it raises security awareness among employees and supports regulatory compliance efforts, making the organization more agile and resilient against the increasing volume and sophistication of cyber threats.
Sources: [1], [2]

14 May, 2025
The Hacker News

A third of enterprises have been breached despite increased cybersecurity investment

A third of enterprises have been breached despite increased cybersecurity investment

Despite increased cybersecurity spending, 67% of organizations faced data breaches in the past two years, with significant impacts on data integrity and financial loss. Confidence in government support remains low, highlighting the urgent need for improved security validation strategies.


Why do data breaches continue to occur despite increased cybersecurity spending?
Data breaches persist even with higher cybersecurity investments because many breaches are caused by human error, sophisticated cyberattacks such as zero-day exploits, and supply chain vulnerabilities. Additionally, the complexity and evolving nature of cyber threats make it difficult for organizations to fully prevent breaches despite spending more on security measures.
Sources: [1], [2]
What are the financial impacts of data breaches on organizations?
The average cost of a data breach reached a record high of approximately $4.88 million in 2024, reflecting significant financial losses for affected organizations. These costs include remediation, legal fees, regulatory fines, and reputational damage, which can severely impact business operations and profitability.
Sources: [1], [2]

13 May, 2025
TechRadar

Third Parties and Machine Credentials: The Silent Drivers Behind 2025's Worst Breaches

Third Parties and Machine Credentials: The Silent Drivers Behind 2025's Worst Breaches

The Verizon 2025 Data Breach Investigations Report highlights a significant rise in breaches due to third-party exposure and machine credential abuse, emphasizing the need for enhanced security measures against these growing threats in cybersecurity.


Why are machine credentials increasingly targeted in cyberattacks?
Machine credentials, which authenticate non-human entities like servers and APIs, are often less protected than human accounts and provide persistent access to critical systems. Attackers exploit these credentials to bypass authentication controls, move laterally across networks, and maintain long-term access without detection.
Sources: [1]
How do third-party vulnerabilities contribute to major breaches?
Third-party vendors often have access to organizational systems but may lack robust security measures. Compromised third-party credentials or misconfigured access permissions allow attackers to infiltrate primary targets through supply chain weaknesses, as highlighted by the Verizon 2025 report's focus on escalating breaches tied to these exposures.
Sources: [1]

06 May, 2025
The Hacker News

Cyberattacks surged in 2025, with third party attacks seeing a huge rise

Cyberattacks surged in 2025, with third party attacks seeing a huge rise

Verizon's 2025 Data Breach Investigations Report reveals that third-party incidents in cyberattacks have surged, now accounting for 30% of breaches. Cybercriminals exploit vulnerable partners to gain access, highlighting the urgent need for enhanced cybersecurity measures.


What is the significance of third-party involvement in cyberattacks, as highlighted in the 2025 Data Breach Investigations Report?
Third-party involvement in cyberattacks has doubled to 30% of breaches, indicating that cybercriminals are increasingly exploiting vulnerabilities in partners and suppliers to gain access to target organizations. This trend underscores the need for businesses to enhance their cybersecurity measures by closely monitoring and securing their supply chains.
Sources: [1]
How do third-party attacks typically occur, and what can organizations do to mitigate these risks?
Third-party attacks often occur when cybercriminals exploit vulnerabilities in a partner or supplier's systems to gain unauthorized access to a target organization. To mitigate these risks, organizations should implement robust access controls, conduct regular security audits of their partners, and adopt a zero-trust framework to limit potential damage from compromised third-party connections.
Sources: [1]

24 April, 2025
TechRadar

Data breach class action costs mount up

Data breach class action costs mount up

Organizations engaged with the US market disbursed over $150 million in class action settlements within six months. Experts emphasize the need for enhanced cybersecurity measures, improved incident response, and stronger compliance to mitigate risks and protect stakeholders.


What factors determine the per-member payout in data breach class action settlements?
Per-member payouts depend on class size and settlement terms, ranging from $0.50 to $12.65 per claimant. Smaller class sizes typically yield higher individual payouts, while attorney fees (often ~30% of settlements) and security improvement costs reduce available funds.
Sources: [1]
What non-monetary obligations do companies face in data breach settlements?
Settlements often require companies to implement enhanced cybersecurity measures, such as real-time monitoring systems and multi-year security audits, alongside identity protection services for affected individuals.
Sources: [1], [2]

24 April, 2025
ComputerWeekly.com

An unhandled error has occurred. Reload 🗙