The wine and liquor store BevMo suffered a payment card breach, a hacker stole credit card numbers and other information from more than 14,000 customers who purchased goods on the website.
The company has notified the California attorney general’s office that a threat actor has injected a software skimmer into the checkout page of the website.
Attackers used a software skimmer that allowed them to capture information from orders placed between Aug. 2 and Sept. 26. Stolen data includes customer names, phone numbers, addresses and credit and debit card numbers along with security codes.
The wine and liquor store announced to have removed the malicious code from its online store and confirmed an ongoing investigation.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – BevMo, Payment Card breach)
[adrotate banner=”5″] [adrotate banner=”13″]
Two vulnerabilities in SinoTrack GPS devices can allow remote vehicle control and location tracking by…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Wazuh, and WebDAV flaws to its Known…
Over 40,000 internet-exposed security cameras worldwide are vulnerable to remote hacking, posing serious privacy and…
INTERPOL announced that a joint operation code-named Operation Secure took down 20,000+ malicious IPs/domains tied…
A critical remote code execution (RCE) vulnerability in Roundcube was exploited days after patch, impacting…
A vulnerability could allow recovery of the phone number associated with a Google account by…
This website uses cookies.