Breach Guide

Learn the steps to take in the event of a data breach and stay current on the cyber threat landscape with the FTC’s Data Breach Resources, FBI’s Daily Digest Library and San Diego’s Cyber Incident Response Guide.

Federal Trade Commission (FTC) Data Breach Resources

Find out the steps to take as a business or consumer if you experience a data breach.

ftc-gov

FBI Cyber Daily Digest Library

Stay current on the global threat landscape with the FBI’s daily circulation of published data breaches and articles.

  • Some Deutsche Bank Employees Kept Email Access After Being Fired

    Source: Bloomberg
    By: Steven Arons
    Published: July 29, 2019

    * German lender reviewed most communication, found no wrongdoing * Incident underscores long-running issues with internal systems

  • Exclusive: Hack Breaks Your Visa Card's Contactless Limit For Big Frauds

    Source: Forbes
    By: Thomas Brewster
    Published: July 29, 2019

    * Think that £30 limit on contactless payments is going to protect you from big thefts? Think again. * Security researchers have found a way to bypass that limit on Visa cards. Their hack, which isn't limited to U.K. cards, could let opportunistic crooks drain accounts with a single tap, and they claim they don't even need to steal the credit card... * and little on Visa's side is being done to address this fresh fraud threat.

  • From the Canadian Centre for Cyber Security

  • LOUISIANA DECLARES STATE OF EMERGENCY AFTER CYBERATTACK

    Source: TechGenix
    By: Derek Kortepeter
    Published: July 29, 2019

    * Louisiana has officially declared a state of emergency following a cybersecurity incident. * The cyberattack is specifically a massive attack on school systems and has so far affected Sabine, Morehouse, and Ouachita schools in northern Louisiana.

  • MILLIONS GAMBLING WITH PERSONAL DATA' BY ACCESSING FAKE WIFI HOTSPOTS, POLL SUGGESTS

    Source: The Independent
    By: Rob Knight
    Published: July 28, 2019

    * Millions of people are gambling with their personal data by blindly accessing fake wifi hotspots, according to a poll. * One in five have taken =93significant risks=94 by failing to check if public wifi connections are legitimate · instead using hotspots which are free, seem to be credible and offer fast speeds.

  • Ransomware attack leaves Johannesburg residents without electricity

    Source: HelpNetSecurity
    By: Zeljka Zorz
    Published: July 26, 2019

    * A ransomware attack aimed at City Power, the electricity provider for Johannesburg (aka Joburg), South Africa, has resulted in some residents temporarily without power.
    * While the provider's operational technology (OT) network hasn't been hit, the IT disruption prevented customers from buying electricity through its pre-paid vending system.

  • Cyber attacks: Protecting universities and solving cyber security issues

    Source: Open Access Government
    By: FNU LNU
    Published: July 25, 2019

    * Oxford, Warwick, and Greenwich Universities are among many of the higher education institutes to have fallen victim to attacks in recent years, with hackers attempting to steal research data and documents.
    * Our universities and institutes of higher learning have become prime targets for bad actors looking to exfiltrate the vast amounts of sensitive data and valuable research information they hold.

  • Sprint Data Breach Exposes Customers to Unknown Attackers; Will This Impact the T-Mobile Merger?

    Source: CPO Magazine
    By: Scott Ikeda
    Published: July 25, 2019

    * Some Sprint customers received an unpleasant surprise in the mail last week as the company sent out notification of a data breach to an undisclosed amount of network users.
    * Hackers gained access to customer's online logins and had the ability to see all of the data visible in those accounts.

  • Thwart the pressing threat of RDP password attacks

    Source: HelpNetSecurity
    By: Zeljka Zorz
    Published: July 23, 2019

    * How long does it takes for Internet-facing, RDP-enabled computers to come under attack? In some cases, a few minutes. In most, less than 24 hours.
    * "In recent years, criminals deploying targeted ransomware like BitPaymer, Ryuk, Matrix, and SamSam have almost completely abandoned other methods of network ingress in favor of using RDP," say Sophos researchers Matt Boddy, Ben Jones, and Mark Stockley.

  • Lancaster University students' data stolen in cyber-attack

    Source: The Guardian
    By: FNU LNU
    Published: July 23, 2019

    * Student data has been stolen in a "sophisticated and malicious" cyber-attack on a university.
    * Records and ID documents of some Lancaster University students were accessed in the phishing attack and fraudulent invoices were sent to undergraduate applicants, a spokesman for the university said.


San Diego Cyber Incident Response Guide

Learn more about San Diego’s region-wide cyber incident response guide and available local, state and federal resources.

San Diego Cyber Incident Response Guide October 2017