article thumbnail

Major Hotel Group Leaks 1TB of Customer Data

Adam Levin

Using the information and accesses exposed, they could create effective phishing campaigns, or target companies with various forms of malicious software attacks: malware, spyware, ransomware, and more,” the article continued. Gekko Group is a worldwide B2B hotel booking platform that serves over 600,000 hotels worldwide.

B2B 295
article thumbnail

Re-Thinking B2B Cybersecurity in 2021

CyberSecurity Insiders

The constantly evolving state of cybercrime means that B2B companies need to keep altering their strategies to address modern threats. Phishing attacks are nothing new, but they have evolved to target a new demographic: individuals who are on alert about the pandemic. In 2021, B2B companies aren’t just setting up new websites.

B2B 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside the DemandScience by Pure Incubation Data Breach

Troy Hunt

I would like to opt-out of here to reduce the SPAM and Phishing emails. It's the old "data is the new oil" analogy that recognises how valuable our info is, and as such, there's a market for it. If, like me, you're part of the 99.5%

article thumbnail

Meet ViVian, a new ID crime chatbot that may be used for future B2B cyber applications

SC Magazine

A new AI-based chatbot tool used to help identity crime victims seek after-hours help was also designed with future B2B applications in mind, including helping employees report a cyberattack when the IT or security team is unavailable. I think I’ve been phished – what do I do? Chatbot ViVian icon (ITRC).

B2B 121
article thumbnail

Hertz data breach caused by CL0P ransomware attack on vendor

Malwarebytes

In 2024, CL0P repeated this method using a zero-day exploit against Cleo, a business-to-business (B2B) tech platform provider that specializes in managed file transfer (MFT) solutions, like Cleo Harmony, VLTrader, and LexiCom. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. Take your time.

article thumbnail

Identiverse 2025 - Where Physical and Digital Identities Converge

Thales Cloud Protection & Licensing

B2B-IAM Smackdown: Defending the Future of Partner Identity | Thales engages in a Masterclass Panel alongside IBM, Saviynt, and Ping to discuss the growing challenge of B2B IAM once nothing more than a niche problem. This dynamic panel will explore the evolving architectural approaches in complex scenarios.

B2B 71
article thumbnail

Why the Twilio Breach Cuts So Deep

WIRED Threat Level

The phishing attack on the SMS giant exposes the dangers of B2B companies to the entire tech ecosystem.

B2B 98