Back to blog

Top 5 Cyber Breaches in August

Pathlock
September 6, 2016

Top 5 Cyber Breaches in August

There was no summer slowdown when it came to Cyber breaches in August. Here are the top 5 breaches that were reported: Eddie Bauer – Another retailer was hit when it was discovered that Eddie Bauer’s terminals were infected with point-of-sale malware between January 2 and July 17, 2016. Customer credit card details may have been stolen from its 350 stores in the US and Canada. The company announced that they will provide those customers with free identity protection services. They have also taken steps to increase security. Oracle – A breach was detected within Oracle’s retail unit that affected the company’s payment terminal systems. Malware was discovered running on systems in Oracle’s network of MICROS payment terminals. The malicious software allowed the hackers to steal Oracle’s customer’s login information. The company stated that the breach did not affect its other corporate networks, cloud services and systems. Scorpene – A massive data breach involved the theft of 22,000 pages of documents belonging to defense industry contractor DCNS. The company was scheduled to deliver six Scorpene-class submarines to the Indian navy later this year. The documents included detailed technical information on the submarines. Some of the leaked information was published in The Australian newspaper. Hutton Hotel – A luxury hotel chain in Nashville, Tennessee discovered that a data breach may have occurred over a three year period and has warned its customers. Customers’ credit and debit card payment information may have been stolen. A malicious program was installed in the hotel’s payment processing system to steal the data. Dropbox – The Dropbox breach occurred four years ago but the ramifications continue as details of 68 million users accounts were recently leaked. The information includes email addresses and encrypted passwords. From software giants to retailers, no one seems to be immune from hackers. There is a better approach to protecting your company’s most valuable assets. Start by clicking here to learn how your cyber posture compares to other leading organizations.