UPDATE: Capital One data hacker breached 30 more companies

An image of Data, Cyber Security, UPDATE: Capital One data hacker breached 30 more companies

A former Amazon employee charged with stealing the data of American credit card company Capital One has also breached up to 30 more companies

In a memorandum filed in a federal court in Seattle, Paige Thompson, the woman accused of stealing the information of 106 million Americans from Capital One, was found to have made numerous “major cyber intrusions that resulted in the theft of massive amounts of data from what now appears to be more than 30 victim companies.”

While the data obtained from the Capital One hack included personal details, such as names, social security numbers, addresses and phone numbers, it is believed that the data Thompson retrieved from the other companies isn’t as personal. 

It is understood that Thompson, who goes by the name “erratic” online, did not attempt to sell or share any of the data she stole from these companies. Among the companies involved are educational institutions and “other entities.”

US Attorney for Western Washington Brian Moran’s filing made mention of Paige Thompson’s significant “mental health issues,” saying that she poses a flight risk, and a threat to others if she is released. Moran calls for the detainment of Thompson while prosecutors tackle the evidence. 

Online privacy has been in the spotlight recently, following a number of high profile data breaches and hacks. 

From organisations’ poor security of customer data, including a serious biometrics breach found by vpnMentor and Facebook’s catalogue of errors, to direct hacks on companies to either profit from or expose flaws in their data handling, it seems as though each day presents new revelations in data security.

Deepfakes are now easier to make, becoming more widely used by fraudsters to obtain data. Recently, The FT reported that a company was swindled out of $10 million by thieves using deepfake technology and AI to impersonate a company executive. 

The toolkit used by hackers is becoming more varied, and the increase in connected devices is allowing for new, weaker entry points into organisations’ information. 

As the technology used for hacks becomes more sophisticated, and cheaper, companies must do more to safeguard their customers’ information with vastly improved governance.  

An image of Data, Cyber Security, UPDATE: Capital One data hacker breached 30 more companies

Luke Conrad

Technology & Marketing Enthusiast

Addressing Regulatory Compliance in Government-Owned, Single-Use Devices

Nadav Avni • 26th March 2024

Corporate-owned single-use (COSU) devices, also known as dedicated devices, make work easier for businesses and many government agencies. They’re powerful smart devices that fulfil a single purpose. Think smart tablets used for inventory tracking, information kiosks, ATMs, or digital displays. But, in a government setting, these devices fall under strict regulatory compliance standards.

Advantages of Cloud-based CAD Solutions for Modern Designers

Marius Marcus • 22nd March 2024

Say goodbye to the days of clunky desktop software chaining us to specific desks. Instead, we’re stepping into a new era fueled by cloud CAD solutions. These game-changing tools not only offer designers unmatched flexibility but also foster collaboration and efficiency like never before!

What are Multi-core Safety-Critical Avionics?

Wind River • 13th March 2024

A multi-core processor is a type of central processing unit that integrates multiple individual processing units onto a single chip. It supports different cores executing their tasks simultaneously, for quick and enhanced overall performance. Multi-core processors nowadays support safety-critical avionics. Find out more about what multi-core processors are, what multi-core safety-critical avionics are, and how...

Why Transition from 4G to 5G+ vRAN/O-RAN?

Emily Goldshteyn • 13th March 2024

The journey from legacy to 5G doesn’t have to be off-putting. It is a process that, if approached strategically, can make your company a pioneer in the digital age. Virtual and Open RAN, which come with broader choices of technology options and greater flexibility, are giving service providers greater opportunity as they transition their networks....