Articles tagged "Data Breach"

Found 152 articles

A serious security flaw known as 'MongoBleed' has been identified in MongoDB servers, allowing attackers who are not authenticated to access sensitive information like passwords and tokens. This vulnerability is currently being exploited in the wild, raising significant concerns for organizations using MongoDB. The issue stems from a memory leak that can be exploited by attackers to extract confidential data directly from the servers. Companies running affected versions of MongoDB should prioritize patching their systems to mitigate the risk of unauthorized data access. Given the potential for serious data breaches, immediate action is essential for any organization relying on MongoDB for data storage.

Impact: MongoDB servers
Remediation: Patch MongoDB servers immediately to the latest version to address the vulnerability.
Read Original
Actively Exploited

Brightspeed is currently investigating a cyberattack attributed to the hacking group Crimson Collective, which has reportedly stolen personal information of more than 1 million customers. This breach raises serious concerns about the security of sensitive data, as the stolen information could potentially be used for identity theft or fraud. Brightspeed has not disclosed specific details about the data compromised or how the attackers gained access. The incident emphasizes the ongoing risks faced by telecom companies and their customers in the digital age. Users affected by the breach should be vigilant about potential phishing attempts and monitor their accounts for unusual activity.

Impact: Personal information of Brightspeed customers
Remediation: Customers should monitor their accounts for suspicious activity and consider changing passwords.
Read Original

Sedgwick has confirmed that hackers have breached a file transfer system within its subsidiary that caters to government agencies. This compromise raises serious concerns about the security of sensitive data handled by the subsidiary, as it primarily deals with information from various government entities. The incident highlights ongoing vulnerabilities in systems that support critical infrastructure and public services. As investigations continue, the extent of data accessed or stolen remains unclear. This attack serves as a reminder for organizations, especially those dealing with government contracts, to bolster their cybersecurity measures to protect against similar threats.

Impact: Sedgwick's file transfer system used by government agencies
Remediation: Organizations should review their file transfer protocols and strengthen access controls. Regular audits and security assessments are recommended to identify potential vulnerabilities.
Read Original

A significant data breach involving Manage My Health has potentially compromised the sensitive information of over 120,000 patients in New Zealand. The breach raises serious concerns about the security measures in place to protect personal health data. Authorities have ordered a review to understand the extent of the breach and to prevent future incidents. This situation highlights the vulnerability of health information systems and the need for stronger protections to safeguard patient data. Patients affected by this incident may face risks related to identity theft and privacy violations, making it crucial for healthcare providers to enhance their cybersecurity practices.

Impact: Manage My Health health data systems
Remediation: N/A
Read Original

Ledger has informed some of its customers that their personal information was compromised due to a breach at Global-e, a third-party payment processor. The breach has raised concerns as it potentially exposes sensitive data like names, email addresses, and other identifying details. While Ledger itself was not directly attacked, the incident underscores the risks associated with relying on third-party services for payment processing. Customers affected by this breach should remain vigilant about their accounts and consider monitoring their financial statements for any suspicious activity. The incident also serves as a reminder for companies to ensure their third-party vendors maintain strong security practices to protect consumer data.

Impact: Ledger customers, Global-e payment processing system
Remediation: Customers should monitor their accounts and change passwords as a precaution.
Read Original
Actively Exploited

A report from TRM Labs has traced $35 million in stolen cryptocurrency back to a breach of LastPass that occurred in 2022. The breach reportedly led to attackers draining funds from users' wallets, raising significant concerns about the security of password management systems. LastPass has faced scrutiny due to this incident, as it underscores the potential risks for users relying on such services to safeguard sensitive information. This situation serves as a reminder for individuals to remain vigilant about their online security practices, especially when it comes to managing passwords and sensitive financial data. Users are encouraged to review their wallet security and consider additional protective measures.

Impact: LastPass, cryptocurrency wallets
Remediation: Users should review their wallet security, change passwords, enable two-factor authentication, and monitor for unauthorized transactions.
Read Original
Actively Exploited

Resecurity recently caught a group known as ShinyHunters, also referred to as Scattered Lapsus$ Hunters, using decoy accounts to target various sectors including airlines, telecommunications, and law enforcement in September 2025. This detection took place through a honeypot operation, where fake accounts were set up to lure attackers. The activities of ShinyHunters are concerning as they indicate a growing trend of sophisticated cyber attacks aimed at critical industries. The group is known for stealing sensitive data and selling it on the dark web, which poses significant risks to both organizations and individuals. Resecurity's findings emphasize the need for enhanced cybersecurity measures across these sectors to prevent future breaches.

Impact: Airlines, telecommunications, law enforcement agencies
Remediation: Organizations should implement advanced monitoring systems to detect decoy account usage and enhance security protocols to protect sensitive data.
Read Original

The hacking group ShinyHunters claims to have breached the cybersecurity firm Resecurity, alleging that they stole internal data. However, Resecurity has countered these claims, stating that the attackers only accessed a honeypot—a decoy system designed to lure in hackers and monitor their activities. This situation raises questions about the effectiveness of security measures and the tactics used by both attackers and defenders. If true, this incident illustrates the ongoing cat-and-mouse game in cybersecurity, where firms must stay vigilant against potential breaches while also employing strategies to detect and analyze threats. The outcome of this dispute could have implications for how companies approach cybersecurity defenses and incident reporting.

Impact: N/A
Remediation: N/A
Read Original

The hacking group known as ShinyHunters has claimed responsibility for breaching the cybersecurity firm Resecurity and stealing internal data. However, Resecurity disputes this claim, stating that the attackers only managed to access a honeypot—a decoy system intentionally set up to contain fake information. This honeypot was designed to track and analyze the activities of potential attackers. The incident raises questions about the effectiveness of cybersecurity measures and the tactics used by hackers. While Resecurity maintains that no real data was compromised, the event serves as a reminder of the ongoing challenges in cybersecurity and the importance of vigilance against potential threats.

Impact: N/A
Remediation: N/A
Read Original
Resecurity Says ShinyHunters Fell for Honeypot After Breach Claim

Hackread – Cybersecurity News, Data Breaches, AI, and More

Resecurity has responded to claims from the hacking group ShinyHunters, asserting that the attackers did not breach any real systems or access customer data. Instead, Resecurity says the hackers interacted with a honeypot designed to capture malicious activity, which contained only fake information. This incident underscores the ongoing challenges in cybersecurity, as groups like ShinyHunters may attempt to exploit vulnerabilities or claim breaches that aren't genuine. For companies, this serves as a reminder to monitor their security measures and ensure they are prepared for potential threats, even if they turn out to be misdirected. The situation illustrates the importance of having robust security practices in place to counteract both real and perceived threats.

Impact: N/A
Remediation: N/A
Read Original
ShinyHunters Claim Breach of US Cybersecurity Firm Resecurity (Updated)

Hackread – Cybersecurity News, Data Breaches, AI, and More

The hacking group known as ShinyHunters claims to have breached Resecurity, a US cybersecurity firm. They reportedly accessed sensitive data, although specific details about the type of information compromised have not been disclosed yet. Resecurity has acknowledged the incident and provided an update, although it remains unclear how many users or entities may be affected by this breach. This incident raises concerns about the security measures in place at cybersecurity firms themselves, as they are expected to be leaders in protecting sensitive data. The implications of such a breach could significantly undermine trust in the industry.

Impact: Resecurity's data and potentially client information
Remediation: N/A
Read Original

Covenant Health has announced that nearly 478,000 patients' data was compromised in a breach first identified in May. The healthcare organization confirmed that personal information, including names, addresses, and some medical details, may have been accessed by unauthorized individuals. This incident raises concerns about patient privacy and the security of sensitive health information. Covenant Health is working to notify affected individuals and is taking steps to enhance its cybersecurity measures to prevent future breaches. The scale of this incident highlights the ongoing vulnerabilities faced by healthcare organizations in protecting patient data.

Impact: Personal health information, including names, addresses, and medical details of patients.
Remediation: Covenant Health is notifying affected individuals and enhancing cybersecurity measures.
Read Original
Tokyo FM Data Breach: Hacker Claims Over 3 Million Records Stolen

Hackread – Cybersecurity News, Data Breaches, AI, and More

Tokyo FM is currently looking into a significant data breach that reportedly involves the theft of over 3 million records. According to claims made by a hacker, sensitive information may have been compromised, although the specific types of data have not been detailed. This incident could potentially affect a large number of users, raising concerns about identity theft and data misuse. As the investigation unfolds, individuals associated with Tokyo FM are advised to monitor their accounts and consider changing their passwords. The situation serves as a reminder of the vulnerabilities that organizations face and the importance of data protection measures.

Impact: Tokyo FM user records, personal information of listeners
Remediation: Users should monitor accounts for suspicious activity and change passwords.
Read Original

Investigations by TRM Labs have linked ongoing cryptocurrency thefts to a breach of LastPass that occurred in 2022. Attackers managed to access encrypted vaults and have been draining cryptocurrency wallets years after the initial breach. They are laundering the stolen funds through exchanges based in Russia. This incident raises significant concerns about the long-term risks associated with data breaches, as compromised information continues to be exploited long after it is stolen. Users of LastPass and others in the cryptocurrency space should be particularly vigilant about securing their assets and monitoring for any unauthorized transactions.

Impact: LastPass, cryptocurrency wallets
Remediation: Users should enhance their security measures, such as enabling two-factor authentication and regularly monitoring wallet activity.
Read Original

Covenant Health, a healthcare organization based in Andover, Massachusetts, experienced a significant ransomware attack in May 2025, attributed to the Qilin group. This incident compromised the personal data of over 478,000 individuals, raising serious concerns about patient privacy and data security. Affected individuals may have had their sensitive health information exposed, which could lead to identity theft and other security risks. The breach emphasizes the ongoing vulnerabilities within the healthcare sector, where attackers increasingly target patient data for ransom. As healthcare providers continue to digitize their services, the need for robust cybersecurity measures becomes more pressing.

Impact: Personal data of over 478,000 individuals, including sensitive health information.
Remediation: N/A
Read Original
PreviousPage 3 of 11Next