Remove topics
article thumbnail

American fast-fashion firm Hot Topic hit by credential stuffing attacks

Security Affairs

Hot Topic suffered credential stuffing attacks that exposed customers’ personal information and partial payment data. Hot Topic, Inc. The attackers detected suspicious login activity to certain Hot Topic Rewards accounts. Hot Topic was not the source of the account credentials used in these attacks.”

article thumbnail

Retail chain Hot Topic hit by new credential stuffing attacks

Bleeping Computer

American retailer Hot Topic disclosed that two waves of credential stuffing attacks in November exposed affected customers' personal information and partial payment data. [.]

Retail 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Anton on Security

Popular Episodes by Topic This is simply a post that categorizes our podcast episodes by topic and then by download/listen count. Popular Episodes by Topic was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.

article thumbnail

8 Essential Security Awareness Training Topics

Security Boulevard

In this blog, you’ll discover crucial topics to include in your company’s training content and broader security training program. These topics will help you guide […] The post 8 Essential Security Awareness Training Topics appeared first on Code42.

article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

He will also dive into topic definitions, governance structures, and framework components for success. This exclusive webinar with William Hord, Senior VP of Risk & Professional Services, will explore the answers to these questions and other foundational elements you need to start or validate your ERM program. Register today!

article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

This article aims to provide a comprehensive list of cybersecurity research topics suitable for beginners, helping them delve into the fundamentals of this rapidly evolving field. Explore topics like key management, secure communication protocols, and encryption in different contexts.

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

Whether you’re passionate about securing networks, protecting data, or investigating cyber threats, choosing the right research topic is crucial for a successful and impactful Master’s journey. IoT Security: Examine the vulnerabilities and challenges associated with securing the Internet of Things (IoT) devices and networks.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

This IDC report addresses several key topics: Risks involved with using open-source software (OSS) How to manage these risks, including OSS license compliance Business benefits to the organization beyond risk mitigation Software supply chain best practices Key trends in industry and government regulation

article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

With 20% of Americans owning cryptocurrencies, speaking "fluent crypto" in the financial sector ensures you are prepared to discuss growth and risk management strategies when the topic arises.