{"id":24227,"date":"2018-04-06T01:00:03","date_gmt":"2018-04-06T07:00:03","guid":{"rendered":"https://www.webroot.com/blog/?p=24227"},"modified":"2018-04-09T08:53:46","modified_gmt":"2018-04-09T14:53:46","slug":"cyber-news-rundown-4-6-18","status":"publish","type":"post","link":"https://www.webroot.com/blog/2018\/04\/06\/cyber-news-rundown-4-6-18\/","title":{"rendered":"Cyber News Rundown: Breaking Panera Bread"},"content":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask.<\/p>\n<h2>Panera Ignores Security Flaw for Months<\/h2>\n<p>This week it was revealed that Panera <a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/04\/panera-accused-security-researcher-of-scam-when-he-reported-a-major-flaw\/\">failed to disclose<\/a> or resolve a data breach affecting nearly 37 million customers for more than eight months. When researchers initially reached out to the company in August of last year, Panera officials believed the e-mail to be spam and ignored it until the researcher followed up about the leak. While a resolution has finally been put forth by Panera, their attempts to downplay the leak to the media and extreme delay in taking action are unacceptable for an organization of that size.<\/p>\n<h2>Indian Utility Company Facing Ransom<\/h2>\n<p>A regional power utilities system in India was recently breached and now finds their billing data held hostage for nearly 20 Bitcoins. While officials are the cause of the attack, the billing systems are already back to normal, as there were several methods for backing up the data. The affected site was one of two that monitor many districts\u2019 electricity billing throughout the region.<\/p>\n<h2>Under Armour Fitness Tracking App Breached<\/h2>\n<p>Under Armour announced this past week that their MyFitnessPal app had been subject to a data breach potentially affecting nearly <a href=\"https:\/\/www.wired.com\/story\/under-armour-myfitnesspal-hack-password-hashing\/\">150 million users.<\/a> Fortunately, the breach seems to contain only usernames, email addresses, and passwords for the app. Customers\u2019 more sensitive information is stored beneath another layer of encryption. Under Armour has since released a full FAQ site along with a public statement in less than a week from the initial discovery.<\/p>\n<h2>Employee Info Leaking from Live Chat Widgets<\/h2>\n<p>Several live chat widgets have been found to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/live-chat-widgets-leak-employee-details-from-high-profile-companies\/\">expose a considerable number<\/a> of personal details for employee conducting the chats. What\u2019s more worrisome, the offending widgets can be found on hundreds of the largest websites, though the data being leaked varies based on company data policies. At least one of the notified widget creators has acknowledged the issue and will hopefully resolve it quickly.<\/p>\n<h2>High-end Retailers Have Payment Data Stolen<\/h2>\n<p>At least three separate high-end retailers recently disclosed a <a href=\"https:\/\/www.reuters.com\/article\/legal-us-hudson-s-bay-databreach\/saks-lord-taylor-hit-by-payment-card-data-breach-idUSKCN1H91W7\">payment system breach<\/a> that could impact millions of recent customers. A few hundred thousand cards have already been released, with the hacker group known as JokerStash promising to release more than 5 million in total, likely split amongst the stored data of the three retailers.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask. Panera Ignores Security Flaw for Months This week it was revealed that Panera failed to disclose or [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":24229,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[21936],"yst_prominent_words":[22075,3775,22071,11641,4965,22065,4983,4951,3769,6465,22067,22063,22061,4801,5425,22069,10543,19099,3479,22073],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24227"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=24227"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24227\/revisions"}],"predecessor-version":[{"id":24231,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24227\/revisions\/24231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/24229"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=24227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=24227"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=24227"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=24227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}