Tuesday, June 25, 2024

POS Security Solutions Provider Announced a Security Breach that Affects Number of Restaurants and Hotels

NCBP announced a security breach that impacts hundreds of restaurants, Retail, and Grocery point of sale systems. The security breach impacted 137 restaurants.

According to North Country Business Products, Inc, following are the details exposed that include the cardholder’s name, credit card number, expiration date, and CVV.

The company learned that there is suspicious activity in their system between January 3, 2019, and January 24, 2019, and launched a Forensic investigation to determine the nature of the incident.

From the investigation report, the NCBP reads that hackers deployed malware to certain business partners restaurants and have collected the credit and debit card information.

NCBP started notifying customers of its business partners about the breach, “North Country established a dedicated assistance line for individuals seeking additional information regarding this incident.”

Here you can see the complete list of the North Country’s business partners whose customer data was potentially exposed.

“North Country takes this incident and the security of our customers’ information very seriously. The company has updated processes to further strengthen its systems to protect its business partners’ customer debit or credit card information and will continue to work with third-party experts to help ensure the highest levels of security.”

North Country Business Products was found in 1948, and the company offers a point of sale solution partner who offers customized solutions and support for the grocery and hospitality industries.

Related Read

2.7 Million Sensitive Medical Recorded Calls Audio Exposed on The Internet

Hacker Who Stole 620 Million Records has Stolen Another 127 Million Records from Another 8 Websites


Latest articles

Beware Of Shorten URLs With Word Files That Install Remcos RAT

A new method of distributing the Remcos Remote Access Trojan (RAT) has been identified.This...

Top 10 Best Penetration Testing Companies & Services in 2024

Penetration Testing Companies are pillars of information security; nothing is more important than ensuring...

Hackers Use Windows XSS Flaw To Execute Arbitrary Command In MMC Console

Attackers are leveraging a new infection technique called GrimResource that exploits MSC files.By...

New Webkit Vulnerabilities Let Attackers Exploit PS4 And PS5 Playstations

Webkit vulnerabilities in PS4 and PS5 refer to bugs found in the Webkit engine...

Hackers Exploit Multiple WordPress Plugins to Hack Websites & Create Rogue Admin Accounts

Wordfence Threat Intelligence team identified a significant security breach involving multiple WordPress plugins. The initial...

Hackers Attacking Windows IIS Server to Upload Web Shells

Windows IIS Servers often host critical web applications and services that provide a gateway...

WikiLeaks Founder Julian Assange Released in Stunning Deal with U.S.

WikiLeaks founder Julian Assange has been released from prison after reaching a deal with...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles