article thumbnail

Canadian authorities arrested alleged Snowflake hacker

Security Affairs

Canadian law enforcement agencies arrested a suspect, Alexander “Connor” Moucka (aka Judische and Waifu), who is accused of being responsible for a series of attacks relying on information stolen from the cloud data warehousing platform Snowflake earlier this year. Charges remain undisclosed.

article thumbnail

South African telecom provider Cell C disclosed a data breach following a cyberattack

Security Affairs

Cell C, one of the biggest telecom providers in South Africa confirms a data breach following a 2024 cyberattack. The company founded in 2001 offers prepaid and postpaid mobile plans, data bundles and internet services, fiber broadband, roaming and international calling, SIM-only plans and device deals. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why DSPM is Essential for Achieving Data Privacy in 2024

Security Affairs

million terabytes of data are created daily. According to other reports, most of that data is unstructured. As organizations deal with such high volumes of dark and unstructured data, most of this data contains sensitive information , making it a primary target for data breach attacks.

article thumbnail

The CISO: Guardian of Data while Navigating Risk Strategic Insights for the Boardroom and Shaping Future Business

Thales Cloud Protection & Licensing

The CISO: Guardian of Data while Navigating Risk Strategic Insights for the Boardroom and Shaping Future Business madhav Thu, 12/05/2024 - 06:03 CISOs have one of the most vital roles in organizations today. That’s because, regardless of industry or location, organizational data has become a precious asset.

CISO 62
article thumbnail

GUEST ESSAY: Recalibrating critical infrastructure security in the wake of evolving threats

The Last Watchdog

Here are three strategies they should pursue in 2024 to minimize the chance of a Unitronics-style hack. A data diode facilitates a uni-directional stream of information from one device to another, preventing bi-directional data flow. Organizations must move from a “trust but verify” mindset to a Zero Trust approach.

article thumbnail

Play ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss Federal Administration.

Security Affairs

. “On August, the Government launched an administrative investigation into the data breach. This investigation is expected to be completed by the end of March 2024.” ” “A considerable amount of analysis was required to determine how much data was leaked and the owners of the leaked data.

article thumbnail

7 Key Takeaways From IBM's Cost of a Data Breach Report 2024

Security Boulevard

Overview: IBM's Cost of a Data Breach Report 2024About the report IBM’s annual 2024 Cost of a Data Breach Report provides IT, risk management, and security leaders with timely, quantifiable evidence to guide them in their strategic decision-making. longer than data breaches without shadow data.