The Singapore Red Cross breach compromised data of more than 4,000 blood donors
On May 16, 2019, the Singapore Red Cross (SRC) revealed in a statement that a data breach leaked the information of 4,297 potential blood donors. Information that may have been compromised includes names, contact numbers, email addresses, blood types, appointment dates and times, and locations where donors were interested in donating at.
What exactly happened.
On May 8, 2019, an employee at the SRC detected unauthorized access on the database that stores information collected from interested donors using a form on their website. SRC immediately took steps to analyze the extent of the damage and fixed it. Fortunately, no other information was compromised in the breach.
On the same day the breach was detected, the SRC contacted the Personal Data Protection Commission and the Health Sciences Authority; they also notified all of the affected candidates. With the help of a third-party cybersecurity team, the SRC is taking steps to enhance their security protocols to prevent similar incidents in the future.
Hackers resort to some common attack types such as denial-of-service (DoS), distributed denial-of-service (DDoS), man-in-the-middle (MitM), SQL injection, cross-site scripting (XSS), and eavesdropping. Most of the time, users discover they've become victims of a cyberattack only after the damage is done.
Since cyberattacks are relatively hard to detect, investing in a good security information and event management (SIEM) solution is the key to identifying threats before they cause significant damage. Download Log360 to combat internal and external cybersecurity attacks.
Here's how ManageEngine can help.
Log360, our comprehensive SIEM solution, can help your organization by:
- Alerting security teams in real time about events that require their immediate attention, such as network attacks, unauthorized access attempts to files or folders, security group membership changes, and account lockouts.
- Detecting unauthorized network access attempts with its built-in Structured Threat Information eXpression (STIX/TAXII) feeds processor. Log360 also has a global IP threat database that can instantly detect known malicious traffic passing through the network, as well as outbound connections to malicious domains and callback servers. Its global IP threat database contains more than 600 million blacklisted IP addresses that are collected from trusted open-source threat feeds and updated daily.
- Finding potential insider threats with its user and entity behavior analytics engine, which creates a baseline of normal activities that are specific to each user and notifies security personnel instantly when there's a deviation from this norm. Rather than using static threshold values, this tool employs a combination of data analytics and machine learning to define dynamic thresholds based on real-world user behavior.
- Obtaining important forensic information about incidents. The collected logs can be securely archived to help prove adherence to compliance standards and reduce potential legal penalties during investigations.
- Automatically raising incidents as tickets to the designated administrator in ServiceDesk Plus, JIRA, Zendesk, Kayako, or ServiceNow to create an incident resolution process that's swift and accountable.
Download a free trial of Log360 to see the tool in action for yourself.
Latest Ransomware attacks
Latest Data breach attacks
Latest Email Phishing attacks
Latest DoS and DDoS attacks
Latest Brute force attack
Latest Advanced persistent threat (APT)
Stay In The Know
Subscribe to our digest to get your weekly dose of cyber security updates straight to your inbox.
Thank you. You will receive weekly cybersecurity news soon!