In many cases, companies that paid the ransom were scammed -- the data had simply been wiped.
The exposed information also includes names, birthdates and addresses, as well as some driver's license numbers, credit card numbers and other data.
Deception technology is becoming a critical IT security defense strategy. We outline how deception tools work and the vendors to watch.
A pair of misconfigured Amazon S3 buckets belonging to third party vendors exposed two companies' highly sensitive data.
And if tech companies don't provide access, Rosenstein said, "legislation may be necessary."
Patients using the pacemakers will need to be provided with a firmware update by a medical professional.
The data was found on a misconfigured server for the Onliner spambot.
16 percent of IT security professionals say their company isn't preparing for GDPR at all, a recent survey found.
At least 1,774 of the devices were still accessible as of the end of last week.
Financial services companies are now required to have a CISO, a written cyber security policy, and a fully funded and staffed cyber security program.
For the second time in as many months, a software developer's website was compromised and used to distribute malware.
Another company attracts VC funding for AI technologies that help enterprises mount effective defenses against today's complex cybersecurity threats.
The NIAC says there's a 'narrow and fleeting window of opportunity' to organize effectively and prevent such attacks.
And while 20 percent have been hit with ransomware, just 8 percent said they paid the ransom, a recent survey found.
The hacker group is using spear phishing emails to target hotel networks.
Over 1.8 million Chicago voters' personal information was exposed online.