Articles tagged "Data Breach"

Found 239 articles

The Dutch Data Protection Authority and the Council for the Judiciary have confirmed that their systems were compromised due to a zero-day exploit of Ivanti Endpoint Manager Mobile (EPMM). This vulnerability, recently disclosed, allowed attackers to access sensitive employee contact information. The breach was reported to parliament on January 29, indicating that it poses a significant risk to the privacy of individuals whose data was exposed. The incident underscores the importance of timely patching and system security, as organizations are urged to address these vulnerabilities to protect against future attacks.

Impact: Ivanti Endpoint Manager Mobile (EPMM), Dutch Data Protection Authority, Council for the Judiciary
Remediation: Organizations should immediately apply patches provided by Ivanti for Endpoint Manager Mobile. Additionally, it is recommended to review security configurations and access controls to mitigate risk from similar vulnerabilities.
Read Original

The Prometei botnet has compromised a UK construction firm's server by taking advantage of weak or default passwords through the Remote Desktop Protocol (RDP). This incident raises serious concerns about the security practices within the construction industry, which may not prioritize strong password policies. Attackers exploiting such vulnerabilities can gain unauthorized access to sensitive data, potentially leading to data breaches or further malicious activities. Companies are urged to implement stronger password policies and consider using multi-factor authentication to protect against similar attacks. This incident serves as a reminder of the importance of basic cybersecurity hygiene for all organizations, regardless of their sector.

Impact: UK construction firm's server, Remote Desktop Protocol (RDP)
Remediation: Implement strong password policies, utilize multi-factor authentication, and regularly update access credentials.
Read Original

The ransomware group known as Warlock Gang has successfully breached SmarterTools by exploiting vulnerabilities in the company's SmarterMail product. This breach raises significant concerns for organizations that rely on SmarterMail for email communication, as attackers could potentially access sensitive information. The incident serves as a reminder of the importance of regularly updating and patching software to protect against known vulnerabilities. Users of SmarterMail should be particularly vigilant and ensure their systems are secure to prevent further exploitation. As the cyber landscape continues to evolve, incidents like this highlight the ongoing risks businesses face from ransomware attacks.

Impact: SmarterMail
Remediation: Users should apply the latest security patches for SmarterMail and regularly review their security configurations.
Read Original
Cyber Attack Hits European Commission Staff Mobile Systems

Hackread – Cybersecurity News, Data Breaches, AI and More

The European Commission has reported a cyber attack on its mobile infrastructure, which potentially exposed the names and phone numbers of its staff members. This breach raises concerns about the security of sensitive personal information within a major governmental body. Such incidents can lead to targeted phishing attacks and further exploitation of the compromised data. The European Commission has not disclosed specific details about how the attack occurred or whether it has affected other systems. The revelation serves as a reminder of the ongoing risks faced by public institutions in safeguarding their digital assets.

Impact: European Commission staff mobile systems
Remediation: N/A
Read Original

Organizations need to rethink how they manage printers as part of their cybersecurity strategy. Many companies overlook printers when it comes to security, leaving them vulnerable to attacks. Experts suggest closing the ownership gap by clearly defining who is responsible for printer security and implementing strong security controls. This includes treating printers like any other endpoint in the network, ensuring they are updated and monitored for threats. Failing to secure printers can lead to data breaches and unauthorized access, putting sensitive information at risk.

Impact: Printers, networked printers, endpoint devices
Remediation: Establish ownership for printer security, implement durable security controls, monitor and update printers regularly
Read Original

The European Commission is currently investigating a cyberattack that appears to have breached its mobile device management system. Initial findings suggest that attackers may have accessed some personal information of staff members, including names and phone numbers. However, there are no indications that more sensitive data has been compromised so far. This incident raises concerns about the security of governmental systems and the potential risks to employee privacy. As investigations continue, it remains crucial for organizations to maintain strong cybersecurity measures to protect sensitive information from similar attacks.

Impact: European Commission mobile device management system
Remediation: N/A
Read Original

SmarterTools has reported a ransomware attack that compromised a data center used for quality control testing. The breach occurred due to a vulnerability in one of SmarterTools' own products, which allowed hackers to infiltrate their systems. As a result, customers have been affected, although specific details on the extent of the impact have not been disclosed. This incident raises concerns about the security of software products, especially those used in business environments. Companies using SmarterTools' services should review their security measures and remain vigilant for any unusual activity.

Impact: SmarterTools products, data center operations
Remediation: Customers should review their security protocols and monitor for unusual activity. Specific patches or updates were not mentioned.
Read Original

The European Commission has confirmed a data breach linked to its mobile device management platform, prompting an investigation into the incident. While specific details about the number of affected staff or the nature of the exposed data have not been released, the breach raises concerns about the security of sensitive information held by the Commission. This incident is particularly significant given the Commission's role in managing policies and regulations across the European Union. Officials are working to understand the scope of the breach and are likely to implement measures to prevent future incidents. The situation underscores the ongoing challenges organizations face in protecting their data against cyber threats.

Impact: Mobile device management platform of the European Commission
Remediation: N/A
Read Original

In 2025, Proton's Data Breach Observatory reported a staggering 794 major data breaches that collectively exposed over 306 million records. These incidents primarily targeted small businesses, highlighting a significant vulnerability within this sector. The breaches varied in nature, but they all led to sensitive information being compromised, which can have dire consequences for both the businesses involved and their customers. The data exposed in these breaches could include personal information, financial details, and other confidential records, raising concerns about identity theft and fraud. This situation underscores the urgent need for small businesses to bolster their cybersecurity measures to protect against such attacks.

Impact: Small businesses, customer records, personal information, financial details
Remediation: Small businesses should implement stronger cybersecurity measures, including regular security audits, employee training, and updated software systems.
Read Original

Substack has confirmed that it experienced a data breach, although the company did not disclose how many users were affected. While the details surrounding the breach remain limited, Substack mentioned that only a small amount of user data was compromised. This incident raises concerns about the security of users' personal information on the platform, especially given the growing number of breaches affecting online services. Users of Substack should remain vigilant, as data breaches can lead to phishing attempts and other security risks. The lack of specific details about the breach leaves many questions unanswered, particularly regarding what types of data were compromised and how the breach occurred.

Impact: Substack user data
Remediation: N/A
Read Original
Flickr Notifies Users of Data Breach After External Partner Security Flaw

Hackread – Cybersecurity News, Data Breaches, AI and More

Flickr has informed its users about a data breach linked to a security flaw in a third-party email vendor. This issue may have led to the exposure of user information, including usernames, email addresses, IP addresses, and activity logs. Although Flickr did not specify how many users were affected, the incident raises concerns about the security of personal data held by external partners. Users should be vigilant about potential phishing attempts or unauthorized access to their accounts, as this type of leaked information can often be exploited for malicious purposes. The situation serves as a reminder for companies to carefully vet their third-party vendors to protect user data.

Impact: Flickr users
Remediation: Users are advised to monitor their accounts for suspicious activity and change their passwords as a precaution.
Read Original

Spain's Ministry of Science has taken precautionary measures by partially shutting down its IT systems following reports of a potential data breach. This move affects various services that interact with citizens and businesses, although specific details about the nature of the breach and the data involved remain unclear. The shutdown aims to protect sensitive information and prevent further compromise. As the situation develops, officials will likely assess the extent of the breach and restore services as it becomes safe to do so. This incident raises concerns about the security of government systems and the protection of personal data in the digital age.

Impact: IT systems of Spain's Ministry of Science, citizen-facing and company-facing services
Remediation: N/A
Read Original
Actively Exploited

A recent cybersecurity incident saw attackers breach a cloud environment in just eight minutes, using exposed test credentials that were found in a public S3 bucket. This rapid breach highlights the dangers of improperly secured cloud storage and the need for better credential management practices. Organizations using cloud services should ensure that sensitive information is not publicly accessible and that test credentials are properly safeguarded. The incident serves as a stark reminder that even minor oversights can lead to significant security breaches, potentially compromising sensitive data. Companies need to take immediate action to review their cloud configurations and implement stricter access controls.

Impact: Public S3 buckets and cloud environments
Remediation: Organizations should audit their S3 buckets for exposed credentials, implement stricter access controls, and ensure that test credentials are not publicly accessible.
Read Original

A significant data breach has occurred due to an unsecured Elasticsearch cluster, exposing over 8.7 billion records related to Chinese citizens. This incident is one of the largest data spills linked to the open-source search and analytics tool. The exposed data includes sensitive information, raising serious concerns regarding privacy and security for those affected. Researchers are warning that such massive leaks could lead to identity theft and other malicious activities. It's crucial for organizations using Elasticsearch to ensure their configurations are secure to prevent similar incidents in the future.

Impact: Elasticsearch cluster, Chinese citizen records
Remediation: Ensure Elasticsearch clusters are properly configured and secured, including setting up authentication and access controls.
Read Original

Hackers are targeting NGINX servers in a campaign that reroutes user traffic through their own infrastructure. This attack compromises the servers, allowing the perpetrators to intercept and manipulate the data being transmitted. Affected users may experience altered content or be redirected to malicious sites without their knowledge. The incident raises concerns about the security of NGINX, a widely used web server software, and the potential for significant data breaches. Organizations using NGINX should take immediate precautions to safeguard their systems and ensure that their configurations are secure to prevent such hijacking.

Impact: NGINX servers
Remediation: Implement security best practices for NGINX configurations, regularly update server software, and monitor traffic for unusual patterns.
Read Original
PreviousPage 2 of 16Next