Attacks/Breaches

1/30/2019
12:00 PM
50%
50%

Discover Issues New Cards Following Data Breach

The credit card company reports Discover's card systems were not involved in the breach, discovered in August 2018.

Discover Financial Services has alerted cardholders to a data breach but has not disclosed the extent of personal information compromised or the number of individuals affected.

The incident was detected by Discover on August 13, 2018, when the company learned user accounts may have been affected in a data breach. It reports the breach did not involve any Discover systems but the company is aware of a possible merchant data breach.

Financial firms are common targets for cybercrime, but this marks the second time in 2018 that Discover reported a security incident affecting users' credit cards to the California Attorney General, BleepingComputer points out. State law mandates that businesses working with residents must inform the attorney general if a data breach affects users' information.

In this case, the report states, there were two separate sample breach notifications filed with the attorney general's office, indicating there could be two collections of credit card data discovered, or two types of cards affected in the attack. Not all affected cardholders were issued a new card and account number.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/31/2019 | 9:56:04 AM
"Not all affected cardholders were issued a new card and account number."
"Not all affected cardholders were issued a new card and account number."

....why?
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
1/30/2019 | 12:33:43 PM
Not disclosed the extent
THAT is the key mistake ---- we found something bad, something got out but we're not telling you yet because either we don't know yet  --- improbable really --- or we have to check first with PR and Legal to see how we spin the story so we are not legally exposed.   All in all - more lies until the truth is forced out of their mouths. 
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11378
PUBLISHED: 2019-04-20
An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.
CVE-2019-11372
PUBLISHED: 2019-04-20
An out-of-bounds read in MediaInfoLib::File__Tags_Helper::Synched_Test in Tag/File__Tags.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
CVE-2019-11373
PUBLISHED: 2019-04-20
An out-of-bounds read in File__Analyze::Get_L8 in File__Analyze_Buffer.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
CVE-2019-11374
PUBLISHED: 2019-04-20
74CMS v5.0.1 has a CSRF vulnerability to add a new admin user via the index.php?m=Admin&c=admin&a=add URI.
CVE-2019-11375
PUBLISHED: 2019-04-20
Msvod v10 has a CSRF vulnerability to change user information via the admin/member/edit.html URI.