Breach Guide

Learn the steps to take in the event of a data breach and stay current on the cyber threat landscape with the FTC’s Data Breach Resources, FBI’s Daily Digest Library and San Diego’s Cyber Incident Response Guide.

Federal Trade Commission (FTC) Data Breach Resources

Find out the steps to take as a business or consumer if you experience a data breach.

ftc-gov

FBI Cyber Daily Digest Library

Stay current on the global threat landscape with the FBI’s daily circulation of published data breaches and articles.

  • Emuparadise gaming emulator website suffers data breach

    Source: ZDNet
    By: Charlie Osborne
    Published: June 10, 2019
    - Retro gaming website Emuparadise has been involved in a data breach leading to the exposure of 1.1 million user accounts. - The security incident took place on April 1, 2018, but has only recently emerged after information from impacted user accounts was provided to HaveIBeenPwned by dehashed.com.
  • Cathay Pacific Faulted For Data Breach, But Hackers' Objective Unclear

    Source: Forbes
    By: Will Horton
    Published: June 6, 2019
    * It is aviation's largest known data breach, with 9.4 millionCathay Pacific passengers impacted, but also puzzling, gathering only 430credit card numbers, mostly expired and none complete.
    * Cathay says it has not received any reports of data being misusedor listed on the 'dark web.'
    * Cathay was unequivocally faulted by Hong Kong's PrivacyCommissioner in a report released Thursday that identified twocontraventions of law, low regard to data privacy and taking seven monthsto disclose the 2018 breach.
  • A new cyber attack which can mimic a user's personalised keystroke

    Source: SciTech Europa
    By: FNU LNU
    Published: June 6, 2019
    * Ben-Gurion University of the Negev (BGU) cybersecurityresearchers have developed a new cyber attack which can mimic a user'spersonalised keystroke characteristics.
    * The cyber attack, called Malboard, evades several detectionproducts because they are designed to continuously verify the identity ofuser based on personalised keystroke characteristics.
  • Report: No 'Eternal Blue' Exploit Found in Baltimore City Ransomware

    Source: KrebsOnSecurity
    By: Krebs
    Published: June 3, 2019
    * For almost the past month, key computer systems serving thegovernment of Baltimore, Md. have been held hostage by a ransomware strainknown as 'Robbinhood.'
    * new analysis suggests that while Eternal Blue could have beenused to spread the infection, the Robbinhood malware itself contains notraces of it.
  • Security awareness training for executives keeps whaling at bay

    Source: SearchSecurity
    By: Alissa Irei
    Published: June 2019
    * Security awareness training for executives teaches anenterprise's biggest fish to recognize potential whaling attacks -- beforethey take the bait.
    * If Captain Ahab were a modern cybercriminal, his Moby Dick mightwell be an enterprise CEO. In a type of focused phishing attack calledwhaling, hackers target high-level end users through individually tailoredcampaigns designed to trick their marks into surrendering access,information or both.
  • CISO Stress Increasing with Cybersecurity Threats
    • Attention to cybersecurity and the ris=k it brings to companies...leads to more stress on those chief information =security officers (CISOs) who must either stop these attacks before they ha=ppen or reckon as effectively as possible with the aftermath and fallout.
    • 88 percent of CISOs consider themselves under moderate or high levels= of stress, only a slight decrease from the 91 percent of executives who re=ported similar results in 2018.
    • This level of stress is one reason why the average tenure of CIS=Os is only 26 months.

      Dice | February= 17, 2020
  • Data Breach Exposes Millions of Israeli Voters Via App
    • According to a cybersecurity exp=ert, Israeli's ruling conservative party has found a security breach in a=n app that has potentially exposed the personal non-public information of n=early 6.5 million Israeli citizens.
    • The app in question is used for managing campaigns by the L=ikud party, which is headed by Prime Minister Benjamin Netanyahu.

      CloudWedge | Fe=bruary 12, 2020

San Diego Cyber Incident Response Guide

Learn more about San Diego’s region-wide cyber incident response guide and available local, state and federal resources.

San Diego Cyber Incident Response Guide October 2017