U.S. companies hit with record fines for privacy in 2025

CyberScoop

Overview

In 2025, U.S. companies are facing record fines related to privacy violations, largely driven by stringent privacy laws in states like California. The increased scrutiny comes from new partnerships between states and a growing concern over how artificial intelligence and automation impact personal privacy. These fines reflect a broader trend of enforcing privacy regulations more aggressively, signaling to businesses that they must prioritize consumer data protection. As more states adopt similar laws, companies across various sectors will need to reassess their data handling practices to avoid costly penalties. This situation is significant as it emphasizes the evolving landscape of privacy laws and the responsibility of companies to comply with them.

Key Takeaways

  • Action Required: Companies should review and update their privacy policies and data handling practices to comply with state regulations.
  • Timeline: Newly disclosed

Original Article Summary

The increase is being driven by powerful privacy laws in states like California, new interstate partnerships and a renewed focus on the privacy impacts of AI and automation. The post U.S. companies hit with record fines for privacy in 2025 appeared first on CyberScoop.

Impact

Not specified

Exploitation Status

No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.

Timeline

Newly disclosed

Remediation

Companies should review and update their privacy policies and data handling practices to comply with state regulations.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Coverage

GlassWorm attackers activate new ‘sleeper’ extensions on Open VSX

SCM feed for Latest

Researchers have identified a new group of 73 malicious extensions linked to the GlassWorm campaign, which are designed to mimic legitimate projects. These extensions have been activated on Open VSX, a marketplace for Visual Studio Code extensions. The attackers aim to deceive users into installing these fake extensions, potentially compromising their systems. This incident raises concerns for developers and organizations using Open VSX, as it exposes them to security risks if they inadvertently install these malicious add-ons. Users need to be cautious and verify the authenticity of extensions before installation to avoid falling victim to this ongoing attack.

Apr 28, 2026

Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place

Proofpoint News Feed

A recent study by Proofpoint revealed that half of global organizations have experienced incidents involving artificial intelligence, even with AI security measures in place. This suggests that existing safeguards are not sufficient to prevent misuse or attacks related to AI technologies. The research highlights a growing concern among businesses about the vulnerabilities associated with AI, particularly as adoption rates increase. Security professionals need to reassess their strategies to better protect against AI-related threats, as the technology continues to evolve. This finding serves as a wake-up call for organizations to enhance their defenses and stay ahead of potential risks.

Apr 28, 2026

NCSC launches SilentGlass, a plug-in device to secure HDMI and DisplayPort links

Security Affairs

The UK’s National Cyber Security Centre (NCSC) has introduced SilentGlass, a new security device designed to protect HDMI and DisplayPort connections from potential hardware attacks. This small plug-in device addresses a significant security gap in IT systems, which often overlook the physical connections between computers and monitors. By blocking malicious links, SilentGlass aims to safeguard sensitive information displayed on screens, making it particularly important for organizations that handle confidential data. The device is now available for commercial use globally, emphasizing the importance of securing physical connections in an increasingly digital world.

Apr 28, 2026

Medtronic Hack Confirmed After ShinyHunters Threatens Data Leak

SecurityWeek

The ShinyHunters cybercrime group has claimed to have stolen approximately 9 million records of personal information from Medtronic, a major medical technology company. This claim was made after ShinyHunters threatened to leak the data if their demands were not met. Medtronic has confirmed that a security incident occurred, raising concerns about the protection of sensitive health-related information. This incident could lead to significant privacy issues for affected individuals, as the stolen data may include personal health details. The situation underscores the need for robust cybersecurity measures, especially in the healthcare sector, where data breaches can have serious implications for patient confidentiality and trust.

Apr 28, 2026

Thousands of Zimbra servers vulnerable to actively exploited flaw

SCM feed for Latest

A vulnerability has been discovered in the Zimbra Collaboration Suite, affecting versions 8.8.15, 9.0, 10.0, and 10.1. This flaw is currently being actively exploited, putting thousands of Zimbra servers at risk. Organizations using these specific versions need to act quickly to protect their systems from potential attacks. The exploitation of this vulnerability could lead to unauthorized access or data breaches, making it critical for users to ensure their software is updated. Companies should monitor for any signs of intrusion and apply necessary patches as soon as they become available.

Apr 27, 2026

BlackFile hackers target retail, hospitality with vishing and data extortion

SCM feed for Latest

BlackFile hackers are using voice phishing, or vishing, to target the retail and hospitality sectors. They make calls using spoofed numbers to pose as IT support, tricking employees into revealing sensitive information. This method allows them to gather data for potential extortion. Companies in these industries should be vigilant as the attackers exploit trust in IT communications to gain access to critical systems. The rise of such tactics underscores the need for enhanced security training for staff to recognize and respond to these types of scams.

Apr 27, 2026