Description On August 10, 2025, the ransomware group, Interlock, posted 43 gigabytes of data they claim to have exfiltrated from systems within the St. Paul Minnesota network. Interlock has been very active in the past year and is known to use advanced phishing, malware and credential exploitation methods. Some of the posted data (more...) The post Major U.S. City Calls in National Guard to Help Combat Ransomware Attack appeared first on HALOCK.| HALOCK
How Do HALOCK’s QSAs and PCI DSS Services Help? PCI DSS 4.0.1 is in full effect, with new requirements surrounding authentication, logging and monitoring, targeted risk analyses (TRA), and continuous monitoring. If your organization previously submitted a Self-Assessment Questionnaire (SAQ), PCI DSS 4.0.1 has brought added complexity. Self-assessment can work. But| HALOCK
Over the past decades we have witnessed so many businesses transition from traditional business channels to an online presence. Recently, we have seen this transformation accelerate for the gaming and gambling industry with the popularity of online sports betting. Gambling enthusiasts are no longer traveling to the casino to place a friendly bet as (more...) The post How the Online Gaming and Gambling Industry Can Reduce the Odds of Cyberattacks appeared first on HALOCK.| HALOCK
Description DaVita, a United States and international operator of a large chain of outpatient dialysis clinics, distributed breach notification letters on August 5, 2025. The letter was sent to patients to inform them of a security event that was first detected on March 24, 2025, when an unauthorized individual gained access to some (more...) The post Information of More than 900,000 Dialysis Patients Exposed in Ransomware Attack appeared first on HALOCK.| HALOCK
Few words strike fear within IT departments like ransomware. The thought of a successful ransomware attack is enough to keep CIOs and cybersecurity leaders up at night. To address these fears, cybersecurity product vendors spend a lot of time touting their tools as the latest weapon against ransomware. Despite all the attention and| HALOCK
How do today's hacks measure up to the biggest hacks of all time? Depends on if you use fiat or BTC. Here's a look back...| Casa Blog
Description Global fast food giant McDonald's uses a third-party chatbot called Olivia to interview job applicants on its website. The chatbot, provided by an outside company called Paradox, has conducted interviews for 90 percent of McDonald's franchises. The AI bot collects information from the applicant including names, locations, email addresses, phone numbers, shift (more...) The post Misconfiguration of an AI Chatbot Exposes Data of 64 million Applicants appeared first on HALOCK.| HALOCK
Anyone that underestimates the magnitude of the online credential compromise must consider the recent discovery of 16 billion exposed login credentials. Yes, that is ’billion’ with a ‘b’. The large find is made up of at least 30 massive datasets with each one containing anywhere from tens of millions to over 3.5 billion records. The| HALOCK
The Internet of Things (IoT) is enabling a wave of innovation and operational intelligence across industries. In manufacturing, connected sensors enable predictive maintenance and process optimization. In healthcare, smart devices support real-time patient monitoring and personalized care. In rail transportation, automated systems enhance safety| HALOCK
Description The New York Attorney filed a lawsuit against multiple insurance companies that allegedly failed to protect the personal information of New York drivers from being compromised in cyberattacks. The timeline of the events involving the breach incidents is as follows: August 2020 - The first attack against the National General insurance company October 2020| HALOCK
As organizations continue to shift toward cloud-first, hybrid work environments, the limitations of traditional perimeter-based security have become more apparent. The convergence of Zero Trust Architecture (ZTA) and Secure Access Service Edge (SASE) is no longer just a theoretical security model - it’s| HALOCK