Articles tagged "Data Breach"

Found 354 articles

Hims, a telehealth company, has suffered a data breach that exposes sensitive personal health information (PHI) of its users. The breach could reveal details about users' conditions, such as baldness, obesity, or erectile dysfunction. The attackers may misuse this data for identity theft, targeted phishing scams, or other malicious activities. This incident raises serious concerns about the protection of personal health data in the telehealth sector, highlighting the ongoing challenges companies face in safeguarding sensitive information. Users of Hims should be vigilant about potential phishing attempts and monitor their accounts for unusual activity.

Impact: Hims telehealth services and user accounts
Remediation: Users should change their passwords and enable two-factor authentication where possible. Companies should review their security measures and consider additional training for staff on data protection.
Read Original
UNC6783 Hackers Use Fake Okta Pages in Corporate Breach Campaign

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Hackers identified as UNC6783 are targeting corporations by impersonating support staff and creating fake Okta login pages. They use social engineering techniques to trick employees into providing access to corporate systems, leading to the theft of sensitive data. This tactic raises concerns for companies relying on Okta for identity management, as it demonstrates how attackers can exploit trust and established processes. Organizations need to enhance their security awareness training and implement stronger verification measures to protect against such deceptive practices. The implications of these breaches could be severe, affecting not just the companies involved but also their customers and partners.

Impact: Okta login systems, corporate systems
Remediation: Companies should implement stronger verification measures and enhance security awareness training for employees.
Read Original

In December 2025, hackers successfully breached Eurail's systems, resulting in the theft of personal information belonging to 308,777 travelers. The compromised data includes names and passport numbers, raising significant concerns about potential identity theft and the misuse of sensitive information. Eurail is now in the process of notifying those affected by the breach, emphasizing the urgent need for vigilance among individuals whose data may be at risk. This incident underscores the ongoing vulnerability of companies to cyberattacks and the importance of implementing stronger security measures to protect customer information.

Impact: Eurail customer data, including names and passport numbers
Remediation: N/A
Read Original

ChipSoft, a Dutch healthcare software provider, has been hit by a ransomware attack that has disrupted its online services. The attack forced the company to take its website and digital services offline, affecting both patients and healthcare providers who rely on their systems for medical information and services. This incident raises concerns about the security of healthcare IT systems, especially as they handle sensitive patient data. The downtime could lead to delays in patient care and disrupt operations for healthcare professionals. As ransomware attacks continue to pose a significant threat to the healthcare sector, this incident serves as a reminder of the vulnerabilities present in digital health infrastructure.

Impact: ChipSoft's website and digital services for patients and healthcare providers
Remediation: N/A
Read Original

A recently patched vulnerability in the EngageLab SDK, a third-party software development kit used in many Android applications, has potentially exposed the private data of around 50 million users, including 30 million cryptocurrency wallet holders. The flaw allowed apps on the same device to bypass Android's security measures, enabling unauthorized access to sensitive information. This incident raises significant concerns about the security of users' cryptocurrency assets, as the compromised data could have led to theft or fraud. Developers using the EngageLab SDK are urged to update their applications to protect users from potential attacks. The vulnerability was identified and addressed, but users should remain vigilant about app permissions and security practices.

Impact: EngageLab SDK used in various Android applications, particularly cryptocurrency wallets
Remediation: Developers should update their applications using the EngageLab SDK to the latest patched version as soon as possible.
Read Original

Sensitive documents from the Los Angeles Police Department have reportedly been leaked online by a group known as World Leaks. The breach has exposed around 7.7 terabytes of data, which includes over 337,000 files. This incident raises serious concerns about the security of law enforcement data and the potential implications for public safety and privacy. With such a large volume of sensitive information now accessible, there is a heightened risk of misuse or further exploitation. The LAPD and other authorities will need to take immediate action to assess the extent of the breach and protect against future incidents.

Impact: Los Angeles Police Department (LAPD) documents and data
Remediation: N/A
Read Original

On April 7, 2026, ChipSoft, a healthcare software vendor based in the Netherlands, suffered a ransomware attack that has been confirmed by Z-CERT, the country's computer emergency response team for the healthcare sector. This incident raises serious concerns about the security of healthcare data, as ransomware attacks can disrupt medical services and compromise sensitive patient information. The attack's timing is particularly alarming given the essential role that healthcare software plays in patient care and operations. Authorities are likely working to assess the full impact of the breach and to assist affected healthcare providers in managing the fallout. This incident underscores the ongoing vulnerabilities in the healthcare sector regarding cybersecurity threats.

Impact: ChipSoft healthcare software systems
Remediation: N/A
Read Original
Actively Exploited

Edge devices, which connect various networks and serve as points of entry, are increasingly becoming targets for cyber attackers. These devices can be exploited to gain unauthorized access to systems, allowing attackers to persist within networks and pivot to steal sensitive identity information. This trend raises concerns for organizations relying on edge computing, as vulnerabilities in these devices can lead to significant data breaches. Ensuring the security of edge devices is crucial, as they play a pivotal role in the overall security posture of an organization. Companies need to prioritize safeguarding these devices to protect against modern cyber threats.

Impact: Edge devices, perimeter security systems
Remediation: Implement stronger security measures for edge devices, conduct regular security audits, and update firmware to the latest versions.
Read Original

Eurail B.V., which operates digital passes for 33 national railways in Europe, reported a data breach that occurred in December 2025, affecting over 300,000 individuals. The breach involved the theft of personal information, although specific details about what data was compromised have not been disclosed. This incident raises serious concerns about the security of personal information in the travel industry, especially as digital services become more prevalent. Affected individuals may face risks such as identity theft or fraud. Eurail has not provided specific steps taken to address the breach or protect users going forward, making it crucial for those impacted to monitor their accounts closely.

Impact: Personal information of over 300,000 individuals, including potentially sensitive data.
Remediation: N/A
Read Original

In December 2025, a data breach at Eurail compromised the personal information of approximately 300,000 individuals. Hackers managed to access sensitive data, including names and passport numbers, from the European travel company's network. This incident raises concerns about the security of personal information and highlights the risks associated with storing such data online. Affected individuals could face identity theft or fraud due to the exposure of their passport details. Companies in the travel sector must enhance their cybersecurity measures to protect customer data and prevent similar breaches in the future.

Impact: Names, passport numbers
Remediation: N/A
Read Original

Signature Healthcare and Signature Healthcare Brockton Hospital in Massachusetts are dealing with disruptions to several of their information systems due to a recent cyberattack. This incident has impacted the hospital's operations, potentially affecting patient care and administrative functions. While specific details about the nature of the attack or the systems involved have not been disclosed, the incident raises concerns about the security of healthcare data and the increasing frequency of such attacks on medical facilities. As hospitals increasingly rely on digital systems, they become prime targets for cybercriminals, which can lead to significant operational challenges and risks to patient safety. The situation underscores the need for robust cybersecurity measures in the healthcare sector.

Impact: Signature Healthcare information systems, Signature Healthcare Brockton Hospital systems
Remediation: N/A
Read Original

A malicious package named 'hermes-px' has been found on PyPI, posing as an AI inference proxy tool compatible with OpenAI. This package was used by attackers to compromise the internal AI endpoint of a Tunisian university. Once inside, they were able to exfiltrate sensitive data, including prompts and conversations from Anthropic's Claude AI. This incident raises concerns about the security of third-party packages and the potential for serious data breaches if similar tactics are employed elsewhere. Users and developers need to be vigilant about the origins of the code they use to avoid falling victim to such attacks.

Impact: PyPI, hermes-px package, Anthropic Claude AI
Remediation: Users should avoid using unverified packages, conduct thorough code reviews, and implement security measures to monitor for unauthorized data access.
Read Original

A recent breach at a Software as a Service (SaaS) integration provider has led to data theft affecting over a dozen companies. Attackers stole authentication tokens, enabling unauthorized access to sensitive information. This incident highlights the vulnerability of third-party services, which can serve as gateways for attackers to infiltrate larger networks. Companies that use the affected integration provider are now at risk of having their data compromised. As the situation develops, affected organizations must assess their security measures and ensure that they are safeguarding against similar breaches in the future.

Impact: Snowflake customers, SaaS integration provider's clients
Remediation: Companies should review their authentication processes and consider implementing additional security measures such as multi-factor authentication.
Read Original

Storm-1175, a China-based cybercriminal group, is executing rapid ransomware attacks using newly discovered vulnerabilities to infiltrate networks. The group focuses on exploiting flaws before organizations have a chance to patch them, allowing for swift movement from gaining access to stealing data and deploying Medusa ransomware. This tactic not only threatens the immediate security of affected networks but also poses a significant risk to sensitive data and financial resources. Companies need to be vigilant about their security measures, especially around exposed systems, to defend against these fast-moving attacks. The urgency of this situation is underscored by the group's ability to execute attacks shortly after vulnerabilities are made public.

Impact: N/A
Remediation: Organizations should prioritize patching newly disclosed vulnerabilities and reinforce security measures on exposed systems.
Read Original

The Medusa ransomware group has been swift in exploiting vulnerabilities, utilizing zero-day exploits to gain access to systems. Once inside, they quickly exfiltrate and encrypt data, often within days of their initial breach. This rapid response poses a significant threat to organizations, as it reduces the time available for victims to respond and mitigate the damage. Companies across various sectors need to be vigilant and ensure their systems are updated to prevent falling victim to these attacks. The effectiveness of Medusa's tactics highlights the importance of maintaining robust cybersecurity defenses and monitoring for unusual activity.

Impact: N/A
Remediation: Organizations should ensure their systems are up to date with the latest security patches and conduct regular vulnerability assessments to identify and address potential weaknesses.
Read Original
PreviousPage 2 of 24Next