<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Another Breach - CafePress in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Another-Breach-CafePress/m-p/26358#M3306</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/887781263"&gt;@AppDefects&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Can anyone keep up with the daily barrage of data breach announcements?&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Not really but I remember when these were not reported by corporations as they were afraid for their reputations or CIOs/CISO were afraid they would lose their jobs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A number of organizations still require silence on these events and only when things like GDPR (or other) audits highlight them do them come to light.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I applaud companies like Norsk Hydro and their openness on the Ransomware that hit them.&amp;nbsp; Believe it allows the benefit of their experience to be shared with the community (what happened, how they handled it, the final outcome).&lt;/P&gt;</description>
    <pubDate>Mon, 05 Aug 2019 14:41:04 GMT</pubDate>
    <dc:creator>dcontesti</dc:creator>
    <dc:date>2019-08-05T14:41:04Z</dc:date>
    <item>
      <title>Another Breach - CafePress</title>
      <link>https://community.isc2.org/t5/Industry-News/Another-Breach-CafePress/m-p/26353#M3304</link>
      <description>&lt;P&gt;And it seems that another breach has been reported.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.forbes.com/sites/daveywinder/2019/08/05/cafepress-hacked-23m-accounts-compromised-is-yours-one-of-them/#70e10fdf407e" target="_blank"&gt;https://www.forbes.com/sites/daveywinder/2019/08/05/cafepress-hacked-23m-accounts-compromised-is-yours-one-of-them/#70e10fdf407e&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This time, it says 23 Million accounts may have been breached along with passwords of about 1/2 of those.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 14:04:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Another-Breach-CafePress/m-p/26353#M3304</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2019-08-05T14:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: Another Breach - CafePress</title>
      <link>https://community.isc2.org/t5/Industry-News/Another-Breach-CafePress/m-p/26354#M3305</link>
      <description>&lt;P&gt;Can anyone keep up with the daily barrage of data breach announcements?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 14:25:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Another-Breach-CafePress/m-p/26354#M3305</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2019-08-05T14:25:00Z</dc:date>
    </item>
    <item>
      <title>Re: Another Breach - CafePress</title>
      <link>https://community.isc2.org/t5/Industry-News/Another-Breach-CafePress/m-p/26358#M3306</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/887781263"&gt;@AppDefects&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Can anyone keep up with the daily barrage of data breach announcements?&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Not really but I remember when these were not reported by corporations as they were afraid for their reputations or CIOs/CISO were afraid they would lose their jobs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A number of organizations still require silence on these events and only when things like GDPR (or other) audits highlight them do them come to light.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I applaud companies like Norsk Hydro and their openness on the Ransomware that hit them.&amp;nbsp; Believe it allows the benefit of their experience to be shared with the community (what happened, how they handled it, the final outcome).&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 14:41:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Another-Breach-CafePress/m-p/26358#M3306</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2019-08-05T14:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: Another Breach - CafePress</title>
      <link>https://community.isc2.org/t5/Industry-News/Another-Breach-CafePress/m-p/26373#M3308</link>
      <description>&amp;gt; dcontesti (Community Champion) posted a new topic in Industry News on 08-05-2019&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; This time, it says 23 Million&lt;BR /&gt;&amp;gt; accounts may have been breached along with passwords of about 1/2 of those. &amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;According to email from Have I Been Pwned, I had, over the years, acquired at&lt;BR /&gt;least two accounts there. Both, undoubtedly, with "throw away" passwords.&lt;BR /&gt;&lt;BR /&gt;(My little brother, at one time, conducted a lot of business there, so he might be&lt;BR /&gt;more involved ...)&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;A paradox is only the truth standing on its head to attract&lt;BR /&gt;attention. - G. K. Chesterton&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
      <pubDate>Mon, 05 Aug 2019 18:07:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Another-Breach-CafePress/m-p/26373#M3308</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-08-05T18:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: Another Breach - CafePress</title>
      <link>https://community.isc2.org/t5/Industry-News/Another-Breach-CafePress/m-p/26398#M3309</link>
      <description>&lt;P&gt;To build off what&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;said, If you are the primary security POC for your agency (or can at least get an email account setup that matches one of 4 parameters) you can get alerts from HaveIBeenPwned everytime someone from your domain (@domain.extention) has an email identified in these new breaches.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get these and then notify the users that whatever password they used in conjunction with their CORPORATE/BUSINESS email has been compromised and to never use that password, or any variation, again. It also helps me see how users are misusing the business email address they were given that was supposed to be for official use only.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 20:14:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Another-Breach-CafePress/m-p/26398#M3309</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2019-08-05T20:14:34Z</dc:date>
    </item>
  </channel>
</rss>

