Over 328,000 Users Hit By Foxit Data Breach

By   ISBuzz Team
Writer , Information Security Buzz | Sep 05, 2019 05:15 am PST

It has been reported that PDF solutions provider Foxit has informed customers that it had recently detected unauthorised access to data associated with its “My Account” service. The company told SecurityWeek that the incident impacted 328,549 users. The compromised data includes names, email addresses, passwords, phone numbers, company names, and IP addresses, but payment information was not exposed.

Notify of
2 Expert Comments
Oldest Most Voted
Inline Feedbacks
View all comments
Matan Or-El
Matan Or-El , Co-Founder and CEO
September 5, 2019 1:22 pm

Since no payment information was compromised in the Foxit breach, this latest cyber incident may appear to be innocuous. Yet since Foxit sells its software to many major companies including Google, Microsoft and Amazon, this breach has the power to provide cybercriminals with a backdoor into businesses. With access to business emails and passwords, hackers can conceivably obtain sensitive information that can cause significant damage to company reputation and result in prohibitive regulatory penalties. To help avoid cyber incidents like this, it\’s always important to comprehensively evaluate and continuously monitor the cyber posture of all parts of the supply chain.

Last edited 4 years ago by Matan Or-El
Lisa Baergen
Lisa Baergen , VP of Marketing
September 5, 2019 1:18 pm

Here is yet another of the many headlines we see daily about exposed credentials through breaches, phishing, and other treacherous means. Foxit and its customers are the latest victims who need to mitigate any harm stemming from this incident. To reduce the ramifications, consumers must ensure to have different passwords for different online accounts so that when one password is compromised, it does not work for a variety of online accounts.

For online companies who share customers with Foxit, credentials like passwords are not reliable anymore. To protect customer accounts and company assets, businesses need to make sure they have other authentication technologies like passive biometrics and behavioural analytics that can verify that the right customer is behind the device – by identifying them by their online behaviour. This way, even if a password has been compromised, the company can still verify the user behind the device correctly and protect the account from fraud.

Last edited 4 years ago by Lisa Baergen

Recent Posts

Would love your thoughts, please comment.x