Tech-Wonders.com

Menu
  • Apps
  • How To
  • Gadgets
    • Mobile
  • Software
  • Technology
  • Sitemap
  • Contact Us

Tech-Wonders.com » Security

The 3 Most High-Profile Data Breaches to Follow in 2022

Data breaches aren’t a new occurrence and have been appearing increasingly over the past few years. In this article, we’re going to provide you with insight into the three most high-profile data breaches you should follow in 2022.

3 Most High-Profile Data Breaches to Follow in 2022

Data breaches can happen for a number of reasons, from insiders intentionally releasing information, whilst others accidentally through human error. Data breaches can also occur through lost or stolen devices/documentation, or through malicious cyber attackers who use methods such as phishing, brute force attacks and malware.

Claiming compensation for a data breach is important because being a victim of a data breach can have significant implications on your life, from financial loss to increased stress levels. It’s crucial to be aware of what data breaches are, how they can happen and how you can protect your data from being leaked or stolen.

So that you are aware of the current data breach affairs, we’ve developed a list of the three most high-profile data breaches to follow in 2022. Keep reading to find out more.

What is a Data Breach?

A data breach exposes sensitive and confidential data to a person or group who are not authorised to view or know the data. Private sensitive and personal data can consist of anything from bank account details to medical information.

Businesses and organisations have a responsibility to protect an individual’s personal information, and the guidelines to do this are set out under the Data Protection Act 2018.

Data breaches are progressively becoming more frequent, with research conducted by a Hiscox study suggesting that every 19 seconds, a small business is hacked in the UK.

What High Profile Data Breaches Should You Follow in 2022

1. Crypto.com see $30 million stolen from customers

One of the most recent and significant data breaches was by the cryptocurrency exchange, Crypto.com, the fourth largest in the world. Originally the breach was downplayed by the company, claiming it was “an incident” and that no user’s funds had been stolen in the attack.

It has since been confirmed that the breach resulted in 483 users having cryptocurrency stolen from their wallets. The hackers responsible stole 4,836.26 ETH, equivalent to $15 million, 443.93 BTC, equivalent to $18 million, and $66,200 from other cryptocurrencies.

The company confirmed that they had resolved the cyber-attack by fully reimbursing the affected user’s loss of funds.

A Bitcoin covered in black crystals photo

2. Personal details concerning more than half a million highly vulnerable people stolen

The humanitarian organisation, International Red Cross (ICRC), based in Geneva, was involved in a cyber-attack. During the attack, hackers stole around 515,000 personal details of vulnerable persons, many of whom had fled from war torn countries or as detainees around the world.

Whilst it is not yet known who stole the data, nothing has been leaked. The Director-General of the ICRC, Robert Mardini, said the hack has put vulnerable people at greater risk than they already are.

The data was stolen from more than 60 Red Cross and Red Crescent national societies, based all around the world. The hackers targeted the external company the ICRC use to store their data.

To prevent the attack from escalating further, the ICRC had to shut down its system, which reunites those who had been separated due to war.

For further information about this data breach and to keep in the loop, see the article reported by BBC.

3. Harbour Plaza Hotel see 1.2 million customer’s data leaked

Another one of 2022’s so far noteworthy data breaches to occur is the data leak incident that Harbour Plaza Hotel experienced at the start of February. The hotel group has luxury hotels across Hong Kong and China. The breach affected 1.2 million individuals that had previously stayed with the company.

There are not currently details as to exactly what data was stolen during the leak or how it happened. That said, the company revealed that it was likely names, email addresses, contact numbers, and stay details that were compromised during the incident.

The hotel group are currently using a third-party cybersecurity forensics team to investigate into the matter. They have further revealed their security will be tightened to prevent potential future attacks from happening.

data breach or data leak

Don’t Become a Data Breach Victim

So far, we are just over two months into 2022 and already facing a high number of data breaches across the world. With the current affairs occurring between Ukraine and Russia, it’s likely that there may be an increase in the amount of cyber attacks that happen in the next couple of months.

What we can determine from this article is that protecting your data is extremely crucial. Without doing so, you have the potential to end up being an affected individual of the next data breach that occurs. It’s better to be safe than sorry.

Do you recognise any of these companies? How do you protect your data? Let us know in the comment box below.

You might also like
  • How Can You Properly Manage Data Breaches?
Tweet
WhatsApp submit Email
Prev Article
Next Article
Tags:Cyber Attacks Cybersecurity Data Breaches Data Security Personal Information Security

One Response

  1. Biswajit Rajwar

    OMG! I have read through your website and the information you gave is just wow! Thank you honestly I like your content very much.

Leave a Reply Cancel Reply

Recent Posts

  • How to Make Your Home Office Look Exquisite?
    How to Make Your Home Office Look Exquisite?
  • How Does ERP Software Help a Manufacturing Company?
    How Does ERP Software Help a Manufacturing Company?
  • How to Determine If You Qualify for ELD Exemption?
    How to Determine If You Qualify for ELD Exemption?
  • Georgia Crypto Mining’s Potential: What’s Driving Growth in the Industry?
    Georgia Crypto Mining’s Potential: What’s Driving Growth in the Industry?

Categories

  • Apps
  • Big Data
  • Blog
  • Books and Reviews
  • C Programming Language
  • Cars
  • Certifications
  • Chemistry
  • Computers
  • Data Warehousing
  • Ecommerce
  • Electrical
  • Electronics
  • Engineering
  • Entrepreneurs
  • Facebook
  • Featured
  • FinTech
  • Fuzzy Logic
  • Gadgets
  • Games
  • Gmail
  • Google
  • Google Plus
  • Health Tech
  • How-to Topics
  • Infographics
  • Instagram
  • Internet
  • JavaScript
  • Jobs
  • LinkedIn
  • Marketing
  • Mathematics
  • Microsoft
  • Mobile
  • Numismatics
  • Online Earning
  • Pinterest
  • Plagiarism
  • Programming Languages
  • Python Programming Language
  • Real Estate
  • Road Transport
  • Salesforce
  • Science and Technology
  • Security
  • SEO
  • Social Media
  • Social Networking
  • Software
  • SQL
  • Swift Programming Language
  • TikTok
  • Travel
  • Troubleshooting Tips
  • Twitter
  • Web Designing and Development
  • Websites
  • Windows
  • WordPress
  • YouTube Tips and Tricks

Tech-Wonders.com

Technology Blog

About the Admin

RamaRaoBobby Hi there! I am RamaRao Bobby, Founder and Editor-in-Chief of
Tech-Wonders.com, Kakinada’s Top Technology Blog.

I am an avid Dog Lover and Tech Enthusiast. Read More

  • Archives
  • Disclaimer
  • Privacy Policy
  • Featured Comments

Recent Comments

  • Rudhresh on Why Choose Python for Software Development?
  • Poonam on Best Top 10 Marathi Websites and Blogs
  • Jeff Stewart on Best Web Hosting Services to Publish a Blog or Website
  • Jack on How to Unlock Your AT&T iPhone Using Unlock Phone Codes
  • Gavrielle Curry on Major Procurement Issues: How to Fix Them With Technology

Always Remain in Touch

Subscribe

Copyright © 2022 Tech-Wonders.com