The news recently broke that Kitronik, a leading supplier of electronic project kits in the UK, was the latest victim of Magecart’s global payment card-skimming malware. Kitronik suffered a data breach that may have exposed names, email addresses, card numbers, expiry dates, CVV security codes and postal addresses.
Rich Campagna, CMO at Bitglass:
“Payment card-skimming malware continues to be a security challenge for retailers around the globe. British Airways, Newegg, and now Kitronik have all been victims of Magecart’s malware, highlighting the need for security solutions which monitor for vulnerabilities and threats, across all devices and applications, in real time. With these capabilities, retailers can be proactive in detecting and thwarting breaches before they happen, ensuring that their customers’ sensitive information is protected.”
Ruchika Mishra, Director of Products and Solutions at Balbix:
“Perhaps most alarming about the Kitronik breach is that Magecart is a known malware that has proven successful in attacking other major companies very recently. Organizations have a responsibility to take proper actions to protect against all threats, but it’s especially disappointing when companies fail to thwart well-known cybersecurity threats. It is imperative that organizations pay attention to the latest threats and factor them in to calculations of their own breach risk, and leverage this information to prioritize action items to strengthen security. Leveraging tools that do this automatically, powered by AI, is most effective.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.