The Intel leakage was intentional, according to both Intel and ZDNet. About 20GB of data tagged “Confidential” and giving information about chipset internal design, camera drivers binaries, Tiger Lake schematics, were leaked to the Telegram channel which posts about breaches happening to major tech giants. Till Kottman who manages this channel received the information about the data leak which occurred in Intel from an unknown individual who pretended to be a data-leaker. The anonymous violator has allegedly procured more details than there was exposed, believes Kottman, and the bulk is yet to come.
The leak stems from inside issues. An unauthorised user found the way to steal the Resource and Design Centre storing restricted-access tech data. The fraudster claims that the information was obtained via an unprotected server hosted on the Akamai CDN.
A stolen laptop led to a $1 million fine. About a month ago it became known that Lifespan Health System Affiliated Covered Entity (Lifespan ACE) would have to pay a considerable amount meeting HIPAA requirements. The employee who got robbed of the device appeared to have his laptop unencrypted. This made the non-profit organisation splash out on compensation and cover the security deficiency allocating $1,040,000 to pay to the Office of Civil Rights coming to terms with HIPAA Privacy and Security Rules.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!