• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

KFC Owner Discloses Data Breach

You are here: Home / General Cyber Security News / KFC Owner Discloses Data Breach
April 11, 2023

A primary US rapid meals firm has been sending out breach notification letters to people impacted by a ransomware incident that occurred in January.

Yum Manufacturers – which owns KFC, Taco Bell and Pizza Hut – experienced a ransomware breach on close to January 13. In accordance to an SEC filing a couple days later, it was compelled to near 300 retailers in the UK for a working day as a end result.

“Although information was taken from the company’s network and an investigation is ongoing, at this phase, there is no evidence that shopper databases ended up stolen,” it reported at the time.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Now a new breach notification letter dated April 6 is being despatched out to an unidentified selection of men and women, thought to be Yum Brands workforce.

Browse a lot more on ransomware: Food items Shortages at Dutch Supermarkets Right after Ransomware Outage.

When the firm maintains it has found “no evidence of id theft or fraud” involving the breached facts, it is delivering complimentary credit history monitoring and identity security for two decades to those impacted.

“As a matter of standard precaution, it is usually excellent follow to be vigilant towards identification theft and fraud by reviewing your account statements and monitoring any offered credit score studies for unauthorized or suspicious exercise, and by taking treatment in reaction to any email, telephone or other contacts that question for private or delicate information (e.g., phishing),” it suggested.

“Yum will hardly ever request delicate information by phone or email.”

The quickly-food huge states it and its subsidiaries hire close to 36,000 people today all over the world which include 23,000 in the US. It runs around 54,000 franchise eating places throughout the globe.

“We have incurred, and might carry on to incur, specific expenditures associated to this attack, which include costs to respond to, remediate and examine this issue,” the organization claimed in its 2022 annual report.

“We remain topic to pitfalls and uncertainties as a end result of the incident, which include as a outcome of the knowledge that was taken from the company’s network.”

Editorial graphic credit history: T. Schneider / Shutterstock.com


Some pieces of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «cryptocurrency stealer malware distributed via 13 nuget packages Cryptocurrency Stealer Malware Distributed via 13 NuGet Packages
Next Post: US Scrambles to Investigate Military Intel Leak Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.