The Data Breach Blog

Vermont Fish & Wildlife Department reports customer data compromised

The Vermont Fish & Wildlife Department reported that customer data may have been compromised on two separate occasions.

Acer ecommerce customer information compromised

An unauthorized individual gained access to certain Acer Service Corporation ecommerce customer's payment information.

Multi-Color employee data compromised

Multi-Color, a label solutions firm, reported that a break-in at a third party affiliate resulted in the compromise of employee personally identifiable information.

Data of 40,000 Stamford Podiatry Group patients compromised

Connecticut-based Stamford Podiatry Group is notifying its patients that medical and personal information was compromised in a recent security incident.

The Southeast Eye Institute patient information compromised

The Southeast Eye Institute, P.A. reported a possible data breach after an unauthorized individual gained access to patient data via a third-party affiliate.

The Threat Hunter Blog

The Threat Hunter Blog Reports of the deaths of Angler EK and Necurs Botnet may be premature

Reports of the deaths of Angler EK and Necurs Botnet may be premature

There have been quite a few reports by researchers over the past week or so that the Necurs botnet and the Angler exploit kit are dead and buried. But don't hold your breath and don't get rid of your Angler signatures just yet.

The Threat Hunter Blog Constructive Disclosure

Constructive Disclosure

This is going to be a bit different from my usual blog postings but I think the time is good for this discussion for several reasons. First, the notion of constructive and responsible disclosure of bugs is a clear issue for threat hunters.

The Threat Hunter Blog Petya and Mischa - the Ransomware Twins (sort of)

Petya and Mischa - the Ransomware Twins (sort of)

These two malwares have been much in the news over the past week or so.

The Threat Hunter Blog Next up. A look at Locky Ransomware

Next up. A look at Locky Ransomware

We've been examining some of the newer - or, at least, most currently prevalent - strains of ransomware. This time we look at Locky.

The Threat Hunter Blog On to TeslaCrypt

On to TeslaCrypt

As I pointed out last time I had the benefit of working with two malware samples, one from our friends at PhishMe and one from the quarantine at Logix Federal Credit Union. We'll start with the one from Logix.

About Dr. Stephenson

Dr. Peter Stephenson is SC Magazine's Technology Editor, a cyber criminologist, digital investigator and digital forensic scientist at The Center for Digital Forensic Studies, is a writer, researcher and lecturer on cyber threat analysis, cyber criminology and cyber jurisprudence. He has lectured extensively and has written, edited or contributed to 20 books and several hundred articles in major national and international trade, technical and scientific publications. 

He is the editor of the Peter Stephenson Series on Cyber Crime Investigation (Auerbach). Dr. Stephenson began his career in information security in 1964 as a Navy crypto technician.


Sign up to our newsletters