Hacker “NightLion” Steals 8,200+ Databases From Cybersecurity Firm

The cybersecurity experts commented below on the news that Hacker “NightLion” steals 8,200+ databases from a cybersecurity firm.

Experts Comments

July 15, 2020
Anurag Kahol
CTO
Bitglass
Outsourcing services provides significant advantages for growing businesses, but relying upon third-party partnerships can expand the attack surface for bad actors looking to gain access to company and customer data. While the incident involving DataViper was clearly motivated by revenge, bad actors frequently target third-party vendors in order to gain access to enterprise data that may otherwise be well protected. The reputational and financial repercussions of breaches can impact a company.....Read More
Outsourcing services provides significant advantages for growing businesses, but relying upon third-party partnerships can expand the attack surface for bad actors looking to gain access to company and customer data. While the incident involving DataViper was clearly motivated by revenge, bad actors frequently target third-party vendors in order to gain access to enterprise data that may otherwise be well protected. The reputational and financial repercussions of breaches can impact a company for years. According to IBM, the average total cost of a breach is roughly $3.92 million and, if a third party is involved, cost per breach rises by an average of more than $370,000. To safeguard data and maintain customer trust, companies must secure access to their resources, block threats like malware, prevent data leakage, enable secure remote work, and comply with regulatory frameworks. This can be accomplished by employing advanced security platforms that provide consistent security for all interactions between devices, apps, the web, and more, from a single control point. Additionally, any organisation that outsources services must prioritise managing and assessing third-party risk.  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.