• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Cyber Threat Defense

Cyber Security News

Data Breach

Facebook – “Malicious Actors” Discover Identities on Two Billion Users

April 7, 2018 By News Team Leave a Comment

On Wednesday, Facebook said that “malicious actors” had taken advantage of search tools on its platform, allowing them to discover the identities of most of its 2 billion users, and collect information about them. The abuse of Facebook’s search … [Read more...] about Facebook – “Malicious Actors” Discover Identities on Two Billion Users

Filed Under: Data Breach, Data Theft Tagged With: Australia, Cambridge Analytica, dark web, data breach, Europe, Facebook, Facebook public profile, Facebook search, hackers, India, malicious actors, President Trump, regulation, U.S.

Panera Bread Online System Exposes Millions of Clients

April 7, 2018 By News Team Leave a Comment

Panera Bread, the U.S. chain of bakery-café fast casual restaurants, sits on Forbes’ list of the most trustworthy large caps in America, but its recent handling of a months-long customer data leak is calling its trustworthiness into … [Read more...] about Panera Bread Online System Exposes Millions of Clients

Filed Under: Data Breach Tagged With: Brian Krebs, data breach, Dylan Houlihan, Forbes, Hold Security, KrebsonSecurity, Panera

Primary Sidebar

Recent Articles

  • How Profits Inspires Virus Developers
  • What’s Propelling A10 Networks Inc (NYSE: ATEN) After Higher Shorts Reported?
  • FacexWorm Targets Facebook Messenger
  • Cisco Systems Webex Flaws Allows Remote Users To Execute Code
  • Europe sees Radical Drop in DDoS Attacks Since Seizure of Webstresser Site

Categories

  • Application Security
  • Bitcoin
  • Bot Defense
  • Browser Security
  • Business Models
  • Critical infrastructure
  • Cryptocurrencies
  • Cryptojacking
  • Cryptomining
  • Cybercrime
  • cybersecurity
  • Data Breach
  • Data Theft
  • DDoS
  • Endpoint Security
  • Espionage
  • Feature
  • Firewall
  • Fraud
  • Government
  • Hacking
  • Hacking Tools
  • IoT
  • Layer7
  • Leaks
  • Malware
  • Mining
  • Mobile security
  • Point of Sale Devices
  • Quantum Encryption
  • Quantum Security
  • Ransomware
  • Routing
  • Uncategorized
  • Vault7
  • Vault8
  • Vulnerabilities
  • Wikileaks

Secondary Sidebar

Cyber Threat Defense.net | Copyright © 2019 All product names, logos, and brands are property of their respective owners. All company, product and service names used on site are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.