sites.udel.edu
Open in
urlscan Pro
34.215.37.29
Public Scan
Submitted URL: https://click.message.usc.edu/?qs=1ca842ca6f38e1594fae9d0526f7239432934db70c9d07a460565e6927d0efd7afb4bad490c60ee15a6bcb9e78ea...
Effective URL: https://sites.udel.edu/threat/2023/08/08/major-security-breaches/
Submission: On November 09 via manual from US — Scanned from DE
Effective URL: https://sites.udel.edu/threat/2023/08/08/major-security-breaches/
Submission: On November 09 via manual from US — Scanned from DE
Form analysis
2 forms found in the DOMGET https://sites.udel.edu/threat/
<form role="search" method="get" class="et-search-form" action="https://sites.udel.edu/threat/">
<input type="search" class="et-search-field" placeholder="Search …" value="" name="s" title="Search for:">
</form>
POST
<form action="" method="post" id="subscribe-by-email-button-form">
<p id="sbe-follow-dialog-desc">Get every new post delivered right to your inbox.</p>
<p>
<label class="sbe-screen-reader-text" for="sbe-follow-email">Your Email</label>
<input type="email" name="email" id="sbe-follow-email" class="sbe-follow-email" placeholder="Your email" required="">
<label aria-hidden="true" class="sbe-screen-reader-text" for="security-check">Leave this field blank</label>
<input aria-hidden="true" type="text" class="screen-reader-text sbe-screen-reader-text" name="security-check" id="security-check">
</p>
<div class="sbe-recaptcha-holder">
<input name="g-recaptcha-response" type="hidden" class="g-recaptcha-response">
<p class="sbe-recaptcha-privacy"><small>This form is protected by reCAPTCHA and the Google <a href="https://policies.google.com/privacy" rel="nofollow">Privacy Policy</a> and
<a href="https://policies.google.com/terms" rel="nofollow">Terms of Service</a> apply.</small></p>
</div>
<input type="hidden" name="sbe-blog-id" value="1789">
<input type="hidden" name="action" value="sbe-subscribe">
<input type="hidden" id="_wpnonce" name="_wpnonce" value="07162ca9ee"><input type="hidden" name="_wp_http_referer" value="/threat/2023/08/08/major-security-breaches/">
<p><input type="submit" value="Subscribe me!"></p>
</form>
Text Content
Subscribe By Email Information Technologies | Secure UD Threat Alerts * Blog * Vulnerabilities * Resources * Notices for IT Pros * News Resources * Phishing Resources * Report a Phish Select Page * Blog * Vulnerabilities * Resources * Notices for IT Pros * News Resources * Phishing Resources * Report a Phish MAJOR SECURITY BREACHES IN 2023 Aug 8, 2023 | Newsletters Regardless of an organization’s size, everyone is vulnerable to cyber attacks and data breaches. Every day cybercriminals come up with new and creative ways to steal private or sensitive information that they can then leverage for money. The following table summarizes the publicly disclosed data breaches that have occurred worldwide in 2023: Data Breach Statistics through July 2023 (source: IT Governance) Number of data breaches in 2023694Number of breached records in 2023612.4 millionBiggest data breach of 2023 -Twitter220 millionMost breached sectorsHealthcare (199)Education (119) Let’s take a more in-depth look at some recent breaches: * MOVEit (May 2023) – 17.5 million impacted Thousands of organizations have been affected by the recent MOVEit data breach. Progress MOVEit is a leading secure Managed File Transfer (MFT) software used by organizations around the world to provide visibility and control over file transfer activities. It is believed that around the end of May, the Russian-linked “Clop” ransomware group exploited a vulnerability (CVE-2023-34362) using “SQL injection” in Progress Software’s MOVEit file transfer application. Although the numbers may change, it is currently estimated that sensitive “personally identifiable information” (PII) of more than 17.5 million individuals worldwide has been stolen. Among the organizations impacted by this breach are many schools and universities, including John Hopkins University, University of Utah, and UCLA. Although MOVEit is not directly used at UD, two of the University’s third-party service providers use it. At the end of June, UD was notified that the records of several hundred UD individuals were believed to have been affected. Investigations by these third-party service providers are still on-going. For more information about this breach and the potential impact on the UD community, please see the July 13th UDaily article. * Enzo Biochem (April 2023) – 2.5 million impacted Enzo Biochem is a pioneer in molecular diagnostics and provides treatments for cancer, metabolic, and infectious diseases as well as testing services for a variety of transmissible diseases such as COVID-19 and STDs. In April it was breached by a ransomware attack that affected the PII of nearly 2.5 million people. * PharMerica (March 2023) – 6 million impacted The personally identifiable information of almost 6 million individuals was compromised in a data breach at PharMerica – one of the largest providers of pharmacy services in the United States. Upon discovering the incident, PharMerica began an internal investigation and determined an unknown third party accessed PharMerica computer systems from March 12-13. Responsibility for the breach has been claimed by the “Money Message” ransomware group. This breach is the largest healthcare data breach to be reported by a single HIPAA-covered entity so far in 2023. Learning from these breaches can help us defend UD against nefarious threat actors. As per the Gartner prediction report, by 2025 human failure will be responsible for over half of all significant cyber incidents. Humans are the weakest link in cybersecurity. Completing the Secure UD Education – 2023 and keeping up-to-date with cybersecurity best practices can help. Cybersecurity is everyone’s responsibility. SHARE THIS POST: Share on Twitter Share on Facebook Share on LinkedIn Share on Email QUICK LINKS * UD IT Home Page * Secure UD Home Page * Secure UD “Take a BITE out of phish!” campaign * Secure UD Training * Secure UD News * US-CERT Current Activity * Contact Us CATEGORIES * Adobe * Android * Announcements * Apple * Breaches * Cyber Snooping * Featured * Fraud * Google * it-pros * Malware * Microsoft * Mobile * Mozilla * NCSAM * Newsletter * Newsletters * Oracle * Passwords * Phishing * Privacy * Shopping Scams * Social Media * Telephone Scams * Uncategorized * Updates * Vulnerabilities * Web Browsing * Wi-Fi * Windows TAGS 2FA Banking BITE Blackboard Dropbox eBay Email Accounts Encryption Facebook Fake App Fake Notifications Google IE iOS IRS or other Tax Scams Macros Malware MFA Outlook Package Delivery Scams Passwords PayPal PDF Phishing Phishing Test Physical Threat scams Ransomware Shopping SMiShing Social engineering Software Updates Spear Phishing spearphishing spoofing Travel Twitter UD Specific Scams Verizon Vishing Vulnerabilities Windows Wire Transfer Worm XP You've been hacked * X Designed by Elegant Themes | Powered by WordPress * Go to the UD twitter page (external link)> * Go to the UD facebook page (external link)> * Go to the UD instagram page (external link)> * Go to the UD youtube page (external link)> * Go to the UD pintrest page (external link)> * Go to the UD linkedin page (external link)> * © 2023 University of Delaware * Comments * Legal Notices * Accessibility Notice Subscribe Close SUBSCRIBE BY EMAIL Get every new post delivered right to your inbox. Your Email Leave this field blank This form is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.