sites.udel.edu Open in urlscan Pro
34.215.37.29  Public Scan

Submitted URL: https://click.message.usc.edu/?qs=1ca842ca6f38e1594fae9d0526f7239432934db70c9d07a460565e6927d0efd7afb4bad490c60ee15a6bcb9e78ea...
Effective URL: https://sites.udel.edu/threat/2023/08/08/major-security-breaches/
Submission: On November 09 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://sites.udel.edu/threat/

<form role="search" method="get" class="et-search-form" action="https://sites.udel.edu/threat/">
  <input type="search" class="et-search-field" placeholder="Search …" value="" name="s" title="Search for:">
</form>

POST

<form action="" method="post" id="subscribe-by-email-button-form">
  <p id="sbe-follow-dialog-desc">Get every new post delivered right to your inbox.</p>
  <p>
    <label class="sbe-screen-reader-text" for="sbe-follow-email">Your Email</label>
    <input type="email" name="email" id="sbe-follow-email" class="sbe-follow-email" placeholder="Your email" required="">
    <label aria-hidden="true" class="sbe-screen-reader-text" for="security-check">Leave this field blank</label>
    <input aria-hidden="true" type="text" class="screen-reader-text sbe-screen-reader-text" name="security-check" id="security-check">
  </p>
  <div class="sbe-recaptcha-holder">
    <input name="g-recaptcha-response" type="hidden" class="g-recaptcha-response">
    <p class="sbe-recaptcha-privacy"><small>This form is protected by reCAPTCHA and the Google <a href="https://policies.google.com/privacy" rel="nofollow">Privacy Policy</a> and
        <a href="https://policies.google.com/terms" rel="nofollow">Terms of Service</a> apply.</small></p>
  </div>
  <input type="hidden" name="sbe-blog-id" value="1789">
  <input type="hidden" name="action" value="sbe-subscribe">
  <input type="hidden" id="_wpnonce" name="_wpnonce" value="07162ca9ee"><input type="hidden" name="_wp_http_referer" value="/threat/2023/08/08/major-security-breaches/">
  <p><input type="submit" value="Subscribe me!"></p>
</form>

Text Content

Subscribe By Email
Information Technologies | Secure UD Threat Alerts
 * Blog
 * Vulnerabilities
 * Resources
   * Notices for IT Pros
   * News Resources
   * Phishing Resources
 * Report a Phish


Select Page
 * Blog
 * Vulnerabilities
 * Resources
   * Notices for IT Pros
   * News Resources
   * Phishing Resources
 * Report a Phish




MAJOR SECURITY BREACHES IN 2023

Aug 8, 2023 | Newsletters

Regardless of an organization’s size, everyone is vulnerable to cyber attacks
and data breaches. Every day cybercriminals come up with new and creative ways
to steal private or sensitive information that they can then leverage for money.
The following table summarizes the publicly disclosed data breaches that have
occurred worldwide in 2023:

Data Breach Statistics through July 2023 (source: IT Governance)

Number of data breaches in 2023694Number of breached records in 2023612.4
millionBiggest data breach of 2023 -Twitter220 millionMost breached
sectorsHealthcare (199)Education (119)

Let’s take a more in-depth look at some recent breaches:

 * MOVEit (May 2023) – 17.5 million impacted

Thousands of organizations have been affected by the recent MOVEit data breach.
Progress MOVEit is a leading secure Managed File Transfer (MFT) software used by
organizations around the world to provide visibility and control over file
transfer activities. It is believed that around the end of May, the
Russian-linked “Clop” ransomware group exploited a vulnerability
(CVE-2023-34362) using “SQL injection” in Progress Software’s MOVEit file
transfer application. Although the numbers may change, it is currently estimated
that sensitive “personally identifiable information” (PII) of more than 17.5
million individuals worldwide has been stolen.

Among the organizations impacted by this breach are many schools and
universities, including John Hopkins University, University of Utah, and UCLA.
Although MOVEit is not directly used at UD, two of the University’s third-party
service providers use it. At the end of June, UD was notified that the records
of several hundred UD individuals were believed to have been affected.
Investigations by these third-party service providers are still on-going. For
more information about this breach and the potential impact on the UD community,
please see the July 13th UDaily article.

 * Enzo Biochem (April 2023) – 2.5 million impacted

Enzo Biochem is a pioneer in molecular diagnostics and provides treatments for
cancer, metabolic, and infectious diseases as well as testing services for a
variety of transmissible diseases such as COVID-19 and STDs. In April it was
breached by a ransomware attack that affected the PII of nearly 2.5 million
people. 

 * PharMerica (March 2023) – 6 million impacted

The personally identifiable information of almost 6 million individuals was
compromised in a data breach at PharMerica – one of the largest providers of
pharmacy services in the United States. Upon discovering the incident,
PharMerica began an internal investigation and determined an unknown third party
accessed PharMerica computer systems from March 12-13. Responsibility for the
breach has been claimed by the “Money Message” ransomware group. This breach is
the largest healthcare data breach to be reported by a single HIPAA-covered
entity so far in 2023. 

Learning from these breaches can help us defend UD against nefarious threat
actors. As per the Gartner prediction report, by 2025 human failure will be
responsible for over half of all significant cyber incidents. Humans are the
weakest link in cybersecurity. Completing the Secure UD Education – 2023 and
keeping up-to-date with cybersecurity best practices can help. Cybersecurity is
everyone’s responsibility. 


SHARE THIS POST:

Share on Twitter Share on Facebook Share on LinkedIn Share on Email


QUICK LINKS

 * UD IT Home Page
 * Secure UD Home Page
   * Secure UD “Take a BITE out of phish!” campaign
   * Secure UD Training
   * Secure UD News
 * US-CERT Current Activity
 * Contact Us

CATEGORIES

 * Adobe
 * Android
 * Announcements
 * Apple
 * Breaches
 * Cyber Snooping
 * Featured
 * Fraud
 * Google
 * it-pros
 * Malware
 * Microsoft
 * Mobile
 * Mozilla
 * NCSAM
 * Newsletter
 * Newsletters
 * Oracle
 * Passwords
 * Phishing
 * Privacy
 * Shopping Scams
 * Social Media
 * Telephone Scams
 * Uncategorized
 * Updates
 * Vulnerabilities
 * Web Browsing
 * Wi-Fi
 * Windows

TAGS

2FA Banking BITE Blackboard Dropbox eBay Email Accounts Encryption Facebook Fake
App Fake Notifications Google IE iOS IRS or other Tax Scams Macros Malware MFA
Outlook Package Delivery Scams Passwords PayPal PDF Phishing Phishing Test
Physical Threat scams Ransomware Shopping SMiShing Social engineering Software
Updates Spear Phishing spearphishing spoofing Travel Twitter UD Specific Scams
Verizon Vishing Vulnerabilities Windows Wire Transfer Worm XP You've been hacked
 * X

Designed by Elegant Themes | Powered by WordPress

 * Go to the UD twitter page (external link)>
 * Go to the UD facebook page (external link)>
 * Go to the UD instagram page (external link)>
 * Go to the UD youtube page (external link)>
 * Go to the UD pintrest page (external link)>
 * Go to the UD linkedin page (external link)>

 * © 2023  University of Delaware
 * Comments
 * Legal Notices
 * Accessibility Notice

Subscribe
Close


SUBSCRIBE BY EMAIL

Get every new post delivered right to your inbox.

Your Email Leave this field blank

This form is protected by reCAPTCHA and the Google Privacy Policy and Terms of
Service apply.