The Dangerous Consequences of Data Megathefts: Dutch Suspect Locked Up

A Dutch suspect was recently locked up by authorities in connection with a series of alleged personal data meagthefts. The case highlights the dangers posed to businesses and people's personal information when criminals target data. The suspect, who was arrested on 20 January, was charged with involvement in the theft of over 60 million pieces of data. It is alleged that he had connections to a criminal network, specifically one focusing on stealing data and selling it for criminal activities such as fraud and identity theft. According to investigators, the data was likely to have been obtained through hacking efforts. The arrest highlights the potential of data theft, cybercrime and data breaches to affect businesses and individuals. Companies need to make sure they have cyber security measures in place to protect their data. This includes deploying the right tools and systems, especially if they handle personal data. Sophos Naked Security, a company specializing in cyber security, released a blog on the importance of data protection. According to the blog, “Data theft is a real and present risk, and getting it wrong can have disastrous consequences.” The best way to protect data is to employ an effective cyber security strategy. Companies should ensure they are aware of the latest security threats and employ the most up-to-date cyber security measures available. This includes securing data with encryption, training staff on security protocols, and understanding the laws and regulations around data protection. The arrest of the Dutch suspect is a reminder of the dangerous situation created by data thieves. Protecting personal and corporate data is crucial, and companies need to ensure that they have the appropriate measures in place to keep their data safe. Sophos Naked Security provides advice and guidance to businesses on how to best secure their data, as well as insights into the latest threats posed by cyber criminals.

This Cyber News was published on nakedsecurity.sophos.com. Publication date: Fri, 27 Jan 2023 17:59:02 +0000


Cyber News related to The Dangerous Consequences of Data Megathefts: Dutch Suspect Locked Up

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 year ago Aws.amazon.com
The Dangerous Consequences of Data Megathefts: Dutch Suspect Locked Up - A Dutch suspect was recently locked up by authorities in connection with a series of alleged personal data meagthefts. The case highlights the dangers posed to businesses and people's personal information when criminals target data. ...
2 years ago Nakedsecurity.sophos.com
Dutch Engineer Used Water Pump to Get Billion-Dollar Stuxnet Malware Into Iranian Nuclear Facility: Report - A Dutch engineer recruited by the country's intelligence services used a water pump to deploy the now-infamous Stuxnet malware in an Iranian nuclear facility, according to a two-year investigation conducted by Dutch newspaper De Volkskrant. Stuxnet, ...
2 years ago Securityweek.com
Dutch hacker jailed for extortion, selling stolen data on RaidForums - A former Dutch cybersecurity professional was sentenced to four years in prison after being found guilty of hacking and blackmailing more than a dozen companies in the Netherlands and worldwide. The suspect, a 21-year-old man from Zandvoort named ...
2 years ago Bleepingcomputer.com
Moldova arrests suspect in ransomware attacks targeting Dutch firms | The Record from Recorded Future News - Moldovan police seized over 84,000 euros ($93,000) in cash, an electronic wallet, two laptops, a mobile phone, a tablet, six bank cards, and various data storage devices, officials said in a statement on Monday. Moldovan police escort a suspect ...
8 months ago Therecord.media
Dutch police breached by a state actor - “The police have been informed by the intelligence services that it is very likely a ‘state actor’, in other words: another country or perpetrators on behalf of another country.” reads the update on the data breach published ...
1 year ago Securityaffairs.com
Maine Mass Shooting Disinformation Floods Social Media as Suspect Remains at Large - Following a mass shooting at a bowling alley and restaurant in Lewiston, Maine, yesterday evening that left at least 18 people dead, state police urgently warned residents to "Stay inside your home with the doors locked" as they mounted a manhunt for ...
2 years ago Wired.com
Moldova arrests suspect linked to DoppelPaymer ransomware attacks - Besides using stolen files as leverage to force victims into paying ransoms as they did in NWO's case, DoppelPaymer ransomware operators threatened to wipe decryption keys if victims contracted professional negotiators to obtain a better price for ...
8 months ago Bleepingcomputer.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
1 year ago Feeds.dzone.com
Hacker arrested for selling bank accounts of US, Canadian users - Ukraine's cyber police arrested a 31-year-old for running a cybercrime operation that gained access to bank accounts of American and Canadian users and sold it on the dark web. The suspect distributed trojanized software as free resources using ...
1 year ago Bleepingcomputer.com
Russian Hackers Attempting to Sabotage The Digital Control System of a Dutch Public Service - This cyber sabotage attempt appears to be part of an intensifying campaign of Russian hybrid warfare targeting the Netherlands, which has also included interference in European elections and mapping of vital North Sea infrastructure including ...
8 months ago Cybersecuritynews.com
Dutch police say they took down 127 servers used by sanctioned hosting service | The Record from Recorded Future News - “The Cybercrime Team Amsterdam will, in consultation with the Public Prosecution Service, further investigate the data found on the seized servers,” Dutch police said. Police in the Netherlands say they seized 127 servers this week that were used ...
11 months ago Therecord.media
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
1 year ago Venturebeat.com
US, Israel Used Dutch Spy to Launch Stuxnet Malware Against Iran - After a two-year investigation into the details surrounding the Stuxnet virus, unleashed in 2008 against the Iranian nuclear program, journalists with Dutch newspaper Volkskrant have released a report saying the malware cost $1 billion to develop. ...
2 years ago Darkreading.com
Dutch, European Hospitals 'Hit by Pro-Russian Hackers' - Dutch cyber authorities said Wednesday that several hospital websites in the Netherlands and Europe were likely targeted by a pro-Kremlin hacking group because of their countries' support for Ukraine. The UMCG hospital in the northern Dutch city of ...
2 years ago Securityweek.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
2 years ago Helpnetsecurity.com
FSB arrests Russian hackers working for Ukrainian cyber forces - The Russian Federal Security Service arrested two individuals believed to have helped Ukrainian forces carry out cyberattacks to disrupt Russian critical infrastructure targets. Both suspects were taken into custody one same day in two different ...
2 years ago Bleepingcomputer.com
When a Data Mesh Doesn't Make Sense - The data mesh is a thoughtful decentralized approach that facilitates the creation of domain-driven, self-service data products. Data mesh-including data mesh governance-requires the right mix of process, tooling, and internal resources to be ...
1 year ago Feeds.dzone.com
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
2 years ago Tripwire.com
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
2 years ago Securityboulevard.com
Android 14's user-profile data bug seems indistinguishable from ransomware - Roid 14 has a nasty storage bug that seems to be affecting users of the "Multiple profiles" feature. The bug is about as bad as you can get, with users having "Unusable" devices due to getting locked out of device storage. A few users are likening ...
2 years ago Arstechnica.com
Hungarian police arrest suspect in cyberattacks on independent media | The Record from Recorded Future News - IPI’s website was knocked offline for three days last September following its report on a wave of DDoS attacks targeting 40 Hungarian media outlets. In June, Russian independent outlets IStories and Verstka were hit by DDoS attacks shortly after ...
5 months ago Therecord.media
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
2 years ago Securityzap.com
New Microsoft Purview features use AI to help secure and govern all your data - More than 90% of organizations use multiple cloud infrastructures, platforms, and services to run their business, adding complexity to securing all data.1Microsoft Purview can help you secure and govern your entire data estate in this complex and ...
2 years ago Microsoft.com
Developing Software Applications Under the Guidance of Data-Driven Decision-Making Principles - To architect and cultivate an application that yields precise outputs in alignment with business requirements, paramount emphasis must be given to the foundational data and the pertinent data scenarios shaping the application. Software application ...
1 year ago Feeds.dzone.com