Curated articles, resources, tips and trends from the DevOps World.
Summary: This is a summary of an article originally published by the source. Read the full original article here →
https://www.upguard.com/security-report/plex was breached by an unauthorized third-party gained who gained access to a proprietary database. The specific attack vector that facilitated the breach hasn’t been disclosed. According to Plex, cybercriminals “tunneled” their way through sophisticated cybersecurity mechanisms to gain access to sensitive customer data. Tunneling references are usually descriptive of https://www.upguard.com/blog/prevent-third-party-data-breaches- when a data breach occurs through a compromised third-party vendor - which would align with Plex’s admission that the attack was facilitated by unauthorized third-party access.
If the Plex data breach occurred though a compromised third-party a Vendor Risk Management solution could preemptively detected potential vendor vulnerabitliies that could facilitate such breaches.
Made with pure grit © 2024 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com