<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Data breaches are becoming expensive</title>
	<atom:link href="http://www.epanorama.net/blog/2019/07/23/data-breaches-are-becoming-expensive/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/07/23/data-breaches-are-becoming-expensive/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 23 Apr 2026 12:41:17 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/23/data-breaches-are-becoming-expensive/comment-page-1/#comment-1700549</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 05 Jan 2021 08:01:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183219#comment-1700549</guid>
		<description><![CDATA[Underreported story from last week: Ticketmaster to pay $10M for its employees logging into old accounts at their competitor to steal strategic information. Funny enough, they got busted because the employees held a division-wide meeting to brag about it.
Edit: They also paid $110M to the competitor in civil damages.
https://www.theverge.com/2020/12/30/22206955/ticketmaster-songkick-crowdsurge-hacking-deferred-prosecution-fine]]></description>
		<content:encoded><![CDATA[<p>Underreported story from last week: Ticketmaster to pay $10M for its employees logging into old accounts at their competitor to steal strategic information. Funny enough, they got busted because the employees held a division-wide meeting to brag about it.<br />
Edit: They also paid $110M to the competitor in civil damages.<br />
<a href="https://www.theverge.com/2020/12/30/22206955/ticketmaster-songkick-crowdsurge-hacking-deferred-prosecution-fine" rel="nofollow">https://www.theverge.com/2020/12/30/22206955/ticketmaster-songkick-crowdsurge-hacking-deferred-prosecution-fine</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/23/data-breaches-are-becoming-expensive/comment-page-1/#comment-1699116</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 17 Dec 2020 06:09:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183219#comment-1699116</guid>
		<description><![CDATA[SolarWinds hack has shaved 23% from software company&#039;s stock this week
https://www.cnbc.com/2020/12/16/solarwinds-hack-triggers-23percent-stock-haircut-this-week-so-far.html

The meltdown began on Dec. 13 when Reuters reported that hackers potentially linked to Russia had gained access to email systems at the U.S. Commerce and Treasury departments, and that the attackers got in by way of SolarWinds software updates.
The Homeland Security agency on Sunday instructed federal agencies that were affected to disconnect or power down certain versions of SolarWinds software in their networks, and Microsoft warned customers its antivirus tool would begin blocking malicious SolarWinds software.
Last week SolarWinds announced a new CEO, and two private-equity firms sold shares ahead of the drop.]]></description>
		<content:encoded><![CDATA[<p>SolarWinds hack has shaved 23% from software company&#8217;s stock this week<br />
<a href="https://www.cnbc.com/2020/12/16/solarwinds-hack-triggers-23percent-stock-haircut-this-week-so-far.html" rel="nofollow">https://www.cnbc.com/2020/12/16/solarwinds-hack-triggers-23percent-stock-haircut-this-week-so-far.html</a></p>
<p>The meltdown began on Dec. 13 when Reuters reported that hackers potentially linked to Russia had gained access to email systems at the U.S. Commerce and Treasury departments, and that the attackers got in by way of SolarWinds software updates.<br />
The Homeland Security agency on Sunday instructed federal agencies that were affected to disconnect or power down certain versions of SolarWinds software in their networks, and Microsoft warned customers its antivirus tool would begin blocking malicious SolarWinds software.<br />
Last week SolarWinds announced a new CEO, and two private-equity firms sold shares ahead of the drop.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/23/data-breaches-are-becoming-expensive/comment-page-1/#comment-1699115</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 17 Dec 2020 06:07:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183219#comment-1699115</guid>
		<description><![CDATA[SolarWinds’ Update Server Could Be Accessed in 2019 Using Password ‘solarwinds123′: Report
https://www.newsweek.com/solarwinds-update-server-could-accessed-2019-using-password-solarwinds123-report-1554986

SolarWinds’ update server was accessible by using the simple password “solarwinds123″ in late 2019, according to a security researcher.

News broke on Sunday that SolarWinds’ OrionIT product was hacked as far back as March, with malware added to a software update that was downloaded by thousands of clients. The cyberattack went undetected for months, compromising the computers at top federal government agencies and potentially impacting hundreds of prominent American corporations.

As the damage continues to be investigated, experts have begun pointing to concerns about potentially substandard security protocols. Security researcher Vinoth Kumar told Reuters he alerted SolarWinds last year that its update server could easily be accessed by anyone using the simple password: “solarwinds123.”

“This could have been done by any attacker, easily,” Kumar told the news agency.

Kumar initially told Newsweek that the issue had been present for more than three weeks before it was fixed. After this article published, the researcher followed-up to say that he’d discovered the problem appeared to be present all the way back in June 2018.

Alleged Russian SolarWinds Hack ‘Probably an 11′ On Scale of 1 to 10, Cybersecurity Expert Warns
https://www.newsweek.com/alleged-russian-solarwinds-hack-probably-11-scale-1-10-cybersecurity-expert-warns-1554606

Acybersecurity expert warned that the alleged Russian hack of SolarWinds software, which affected top government agencies, is “probably an 11″ in terms of seriousness on a scale of one to 10.]]></description>
		<content:encoded><![CDATA[<p>SolarWinds’ Update Server Could Be Accessed in 2019 Using Password ‘solarwinds123′: Report<br />
<a href="https://www.newsweek.com/solarwinds-update-server-could-accessed-2019-using-password-solarwinds123-report-1554986" rel="nofollow">https://www.newsweek.com/solarwinds-update-server-could-accessed-2019-using-password-solarwinds123-report-1554986</a></p>
<p>SolarWinds’ update server was accessible by using the simple password “solarwinds123″ in late 2019, according to a security researcher.</p>
<p>News broke on Sunday that SolarWinds’ OrionIT product was hacked as far back as March, with malware added to a software update that was downloaded by thousands of clients. The cyberattack went undetected for months, compromising the computers at top federal government agencies and potentially impacting hundreds of prominent American corporations.</p>
<p>As the damage continues to be investigated, experts have begun pointing to concerns about potentially substandard security protocols. Security researcher Vinoth Kumar told Reuters he alerted SolarWinds last year that its update server could easily be accessed by anyone using the simple password: “solarwinds123.”</p>
<p>“This could have been done by any attacker, easily,” Kumar told the news agency.</p>
<p>Kumar initially told Newsweek that the issue had been present for more than three weeks before it was fixed. After this article published, the researcher followed-up to say that he’d discovered the problem appeared to be present all the way back in June 2018.</p>
<p>Alleged Russian SolarWinds Hack ‘Probably an 11′ On Scale of 1 to 10, Cybersecurity Expert Warns<br />
<a href="https://www.newsweek.com/alleged-russian-solarwinds-hack-probably-11-scale-1-10-cybersecurity-expert-warns-1554606" rel="nofollow">https://www.newsweek.com/alleged-russian-solarwinds-hack-probably-11-scale-1-10-cybersecurity-expert-warns-1554606</a></p>
<p>Acybersecurity expert warned that the alleged Russian hack of SolarWinds software, which affected top government agencies, is “probably an 11″ in terms of seriousness on a scale of one to 10.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/23/data-breaches-are-becoming-expensive/comment-page-1/#comment-1698983</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 14 Dec 2020 06:56:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183219#comment-1698983</guid>
		<description><![CDATA[Report: Huge Data Leak ‘Exposes’ Chinese Communist Party Members ‘Embedded’ In Western Companies And Governments
https://www.dailywire.com/news/breaking-huge-data-leak-exposes-chinese-communist-party-members-embedded-in-western-companies-and-governments

An unprecedented “major leak” of official records has uncovered a register of 1.95 million members of the Chinese Communist Party, many of whom are now living and working all over the world, including Australia, the United Kingdom, and the United States. The data lists names, party positions, date of birth, national identification number, ethnicity and — in some cases — their telephone number.

Major leak &#039;exposes&#039; members and &#039;lifts the lid&#039; on the Chinese Communist Party
https://www.skynews.com.au/details/_6215946537001

Ms Markson said the leak is a register with the details of Communist Party members, including their names, party position, birthday, national ID number and ethnicity. 

“It is believed to be the first leak of its kind in the world,” the Sky News host said. 

“What&#039;s amazing about this database is not just that it exposes people who are members of the communist party, and who are now living and working all over the world, from Australia to the US to the UK,” Ms Markson said. 

“But it&#039;s amazing because it lifts the lid on how the party operates under President and Chairman Xi Jinping”.]]></description>
		<content:encoded><![CDATA[<p>Report: Huge Data Leak ‘Exposes’ Chinese Communist Party Members ‘Embedded’ In Western Companies And Governments<br />
<a href="https://www.dailywire.com/news/breaking-huge-data-leak-exposes-chinese-communist-party-members-embedded-in-western-companies-and-governments" rel="nofollow">https://www.dailywire.com/news/breaking-huge-data-leak-exposes-chinese-communist-party-members-embedded-in-western-companies-and-governments</a></p>
<p>An unprecedented “major leak” of official records has uncovered a register of 1.95 million members of the Chinese Communist Party, many of whom are now living and working all over the world, including Australia, the United Kingdom, and the United States. The data lists names, party positions, date of birth, national identification number, ethnicity and — in some cases — their telephone number.</p>
<p>Major leak &#8216;exposes&#8217; members and &#8216;lifts the lid&#8217; on the Chinese Communist Party<br />
<a href="https://www.skynews.com.au/details/_6215946537001" rel="nofollow">https://www.skynews.com.au/details/_6215946537001</a></p>
<p>Ms Markson said the leak is a register with the details of Communist Party members, including their names, party position, birthday, national ID number and ethnicity. </p>
<p>“It is believed to be the first leak of its kind in the world,” the Sky News host said. </p>
<p>“What&#8217;s amazing about this database is not just that it exposes people who are members of the communist party, and who are now living and working all over the world, from Australia to the US to the UK,” Ms Markson said. </p>
<p>“But it&#8217;s amazing because it lifts the lid on how the party operates under President and Chairman Xi Jinping”.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/23/data-breaches-are-becoming-expensive/comment-page-1/#comment-1697153</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 08 Nov 2020 19:59:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183219#comment-1697153</guid>
		<description><![CDATA[Marriott fined £0.05 for each of the 339 million hotel guests whose data crooks were stealing for four years
UK watchdog&#039;s mooted £99m penalty comes in at just £18.4m
https://www.theregister.com/2020/10/30/marriott_starwood_hack_fine_just_18_4bn/

Your name, address, phone number, email address, passport number, date of birth, and sex are worth just £0.05 in the eyes of the UK Information Commissioner&#039;s Office, which has fined Marriott £18.4m after 339 million people&#039;s data was stolen from the hotel chain.

The fine was imposed as a regulatory punishment for the 2018 Starwood Hotels megabreach despite Marriott not accepting liability for wrongdoing]]></description>
		<content:encoded><![CDATA[<p>Marriott fined £0.05 for each of the 339 million hotel guests whose data crooks were stealing for four years<br />
UK watchdog&#8217;s mooted £99m penalty comes in at just £18.4m<br />
<a href="https://www.theregister.com/2020/10/30/marriott_starwood_hack_fine_just_18_4bn/" rel="nofollow">https://www.theregister.com/2020/10/30/marriott_starwood_hack_fine_just_18_4bn/</a></p>
<p>Your name, address, phone number, email address, passport number, date of birth, and sex are worth just £0.05 in the eyes of the UK Information Commissioner&#8217;s Office, which has fined Marriott £18.4m after 339 million people&#8217;s data was stolen from the hotel chain.</p>
<p>The fine was imposed as a regulatory punishment for the 2018 Starwood Hotels megabreach despite Marriott not accepting liability for wrongdoing</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/23/data-breaches-are-becoming-expensive/comment-page-1/#comment-1696014</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 15:39:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183219#comment-1696014</guid>
		<description><![CDATA[Morgan Stanley Fined $60 Million for Data Protection Mishaps
OCC: Investment Bank Didn&#039;t Properly Oversee Decommissioning of Data Center Equipmen
https://www.bankinfosecurity.com/morgan-stanley-fined-60-million-for-data-protection-mishaps-a-15158

The Office of the Comptroller of the Currency has fined Morgan Stanley $60 million for the investment bank&#039;s failure to properly oversee the decommissioning of several data centers, putting customer data at risk of exposure.

See Also: The Fraudster&#039;s Journey - Fraud in the IVR

When Morgan Stanley decommissioned two data centers related to the bank&#039;s wealth management business in 2016, the company did not properly oversee the third-party company responsible for ensuring that all personal data was removed, according to the OCC, which is part of the U.S. Treasury Department.]]></description>
		<content:encoded><![CDATA[<p>Morgan Stanley Fined $60 Million for Data Protection Mishaps<br />
OCC: Investment Bank Didn&#8217;t Properly Oversee Decommissioning of Data Center Equipmen<br />
<a href="https://www.bankinfosecurity.com/morgan-stanley-fined-60-million-for-data-protection-mishaps-a-15158" rel="nofollow">https://www.bankinfosecurity.com/morgan-stanley-fined-60-million-for-data-protection-mishaps-a-15158</a></p>
<p>The Office of the Comptroller of the Currency has fined Morgan Stanley $60 million for the investment bank&#8217;s failure to properly oversee the decommissioning of several data centers, putting customer data at risk of exposure.</p>
<p>See Also: The Fraudster&#8217;s Journey &#8211; Fraud in the IVR</p>
<p>When Morgan Stanley decommissioned two data centers related to the bank&#8217;s wealth management business in 2016, the company did not properly oversee the third-party company responsible for ensuring that all personal data was removed, according to the OCC, which is part of the U.S. Treasury Department.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/23/data-breaches-are-becoming-expensive/comment-page-1/#comment-1693404</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 05:37:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183219#comment-1693404</guid>
		<description><![CDATA[Nevada school district refuses to submit to ransomware blackmail,
hacker publishes student data
https://www.zdnet.com/article/nevada-school-district-refuses-to-submit-to-ransomware-blackmail-hacker-responds-by-publishing-student-data/
Thousands of students have reportedly had their private data released
online.]]></description>
		<content:encoded><![CDATA[<p>Nevada school district refuses to submit to ransomware blackmail,<br />
hacker publishes student data<br />
<a href="https://www.zdnet.com/article/nevada-school-district-refuses-to-submit-to-ransomware-blackmail-hacker-responds-by-publishing-student-data/" rel="nofollow">https://www.zdnet.com/article/nevada-school-district-refuses-to-submit-to-ransomware-blackmail-hacker-responds-by-publishing-student-data/</a><br />
Thousands of students have reportedly had their private data released<br />
online.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/23/data-breaches-are-becoming-expensive/comment-page-1/#comment-1692038</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 20 Sep 2020 19:02:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183219#comment-1692038</guid>
		<description><![CDATA[Ainutlaatuinen tietovuoto paljastaa, miten likainen raha liikkui pankkijärjestelmän läpi
https://yle.fi/uutiset/3-11554451

Pankkien papereissa on tietoja noin 1 800 miljardin euron arvoisista epäilyttävistä tilisiirroista. Niitä on tutkinut kansainvälinen toimittajaryhmä, jossa Yle on ainoana suomalaistahona mukana.]]></description>
		<content:encoded><![CDATA[<p>Ainutlaatuinen tietovuoto paljastaa, miten likainen raha liikkui pankkijärjestelmän läpi<br />
<a href="https://yle.fi/uutiset/3-11554451" rel="nofollow">https://yle.fi/uutiset/3-11554451</a></p>
<p>Pankkien papereissa on tietoja noin 1 800 miljardin euron arvoisista epäilyttävistä tilisiirroista. Niitä on tutkinut kansainvälinen toimittajaryhmä, jossa Yle on ainoana suomalaistahona mukana.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Trademark Registration</title>
		<link>https://www.epanorama.net/blog/2019/07/23/data-breaches-are-becoming-expensive/comment-page-1/#comment-1690276</link>
		<dc:creator><![CDATA[Trademark Registration]]></dc:creator>
		<pubDate>Sat, 05 Sep 2020 07:46:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183219#comment-1690276</guid>
		<description><![CDATA[Thanks for all the tips mentioned in this article! it&#039;s always good to read things you have heard before and are implementing, but from a different perspective, always pick up some extra bits of information]]></description>
		<content:encoded><![CDATA[<p>Thanks for all the tips mentioned in this article! it&#8217;s always good to read things you have heard before and are implementing, but from a different perspective, always pick up some extra bits of information</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/23/data-breaches-are-becoming-expensive/comment-page-1/#comment-1688740</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 16:25:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183219#comment-1688740</guid>
		<description><![CDATA[Canon data leaked online after company refuses to negotiate with ransomware attackers
https://www.techradar.com/news/canon-data-leaked-online-after-company-refuses-to-negotiate-with-ransomware-attackers]]></description>
		<content:encoded><![CDATA[<p>Canon data leaked online after company refuses to negotiate with ransomware attackers<br />
<a href="https://www.techradar.com/news/canon-data-leaked-online-after-company-refuses-to-negotiate-with-ransomware-attackers" rel="nofollow">https://www.techradar.com/news/canon-data-leaked-online-after-company-refuses-to-negotiate-with-ransomware-attackers</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
