Wynn Resorts has reported that around 21,000 employees have been impacted by a cyberattack linked to the ShinyHunters hacking group. The breach reportedly involved sensitive employee data, and there are indications that the company may have paid a ransom to prevent the information from being leaked. This incident raises significant concerns about data security in the hospitality industry, especially as personal information becomes more vulnerable to cybercriminals. The fact that such a large number of employees are affected highlights the scale of the attack and the potential risks associated with inadequate cybersecurity measures. As companies like Wynn Resorts face increasing threats from hackers, it becomes critical for them to enhance their security protocols to protect sensitive information.
Articles tagged "Data Breach"
Found 354 articles
The Qilin ransomware group has claimed responsibility for a data breach involving Die Linke, a left-wing political party in Germany. The group announced that they have stolen sensitive data from the party and are threatening to make it public unless their demands are met. While Die Linke has confirmed that the incident occurred, they have stated that there was no breach of their systems. This incident raises concerns about the cybersecurity of political organizations, especially given the sensitive nature of the data involved. The threat of public data leaks can have serious implications for political entities, affecting both their reputation and operational integrity.
A breach involving the European Commission's cloud infrastructure has resulted in the exposure of sensitive data from at least 30 EU entities. The incident was linked to the TeamPCP hacking group, which is known for targeting various organizations. CERT-EU, the Computer Emergency Response Team for the EU, confirmed this breach and made the information public on March 27. This incident raises significant concerns about the security of sensitive government data and the potential for further exploitation of the exposed information. Organizations within the EU must assess their security measures to prevent similar breaches in the future.
Hims & Hers Health, a telehealth service provider, has reported a data breach due to stolen support tickets from Zendesk, a third-party customer service platform. This incident raises concerns as it potentially exposes sensitive information from users who sought medical advice or treatment through the service. The company is urging affected users to stay vigilant about their personal information and to monitor their accounts for any suspicious activity. This breach underscores the risks associated with relying on third-party vendors for customer support and handling sensitive data. Users should be aware of possible phishing attempts or unauthorized access to their accounts following this incident.
The Qilin ransomware group has targeted Die Linke, a German political party, causing significant disruption to its IT systems. This attack not only resulted in a systems outage but also included threats of leaking sensitive data. The party confirmed that data had indeed been stolen during the breach. This incident raises concerns about the security of political organizations, especially in light of upcoming elections and the potential for sensitive information to be weaponized. As cyberattacks against political entities become more common, the implications for privacy and security in the political arena are increasingly serious.
Hackread – Cybersecurity News, Data Breaches, AI and More
Mercor, an AI firm, has confirmed a significant data breach linked to a supply chain attack involving LiteLLM. Hackers claim to have stolen 4TB of sensitive data, which may include internal systems and proprietary information. This breach raises serious concerns about the security of supply chain processes, as attackers often exploit vulnerabilities in third-party software to gain access to larger networks. Companies that rely on LiteLLM and similar technologies should be particularly vigilant and assess their security measures. The implications of such a large data theft could be severe, affecting not only Mercor but also its clients and partners who may be at risk of data exposure or further attacks.
BleepingComputer
The European Union's Cybersecurity Service (CERT-EU) has confirmed a significant data breach affecting the European Commission, linked to the TeamPCP hacking group. This breach has compromised the data of at least 29 other EU entities, raising concerns about the security of sensitive information within the Union's institutions. The attack underscores the ongoing risks to government networks from sophisticated cyber threats. The incident not only impacts the directly affected organizations but also raises alarms about the potential for further exploitation of the exposed data. As the investigation continues, EU officials are likely to review their cybersecurity protocols to prevent similar incidents in the future.
Hasbro has reported unauthorized access to its systems, leading the company to activate its business continuity plans and take some systems offline. The incident was disclosed in an 8-K filing, indicating that the attack has had a significant impact on the company's operations. While specific details about the nature of the attack or the data involved have not been released, the company expects that remediation could take weeks. This incident raises concerns about the security of sensitive information within major corporations and highlights the ongoing risks businesses face from cyber threats. Stakeholders are advised to stay informed as the situation develops.
Security Affairs
Hasbro, the well-known toy manufacturer, reported a cyberattack on Wednesday that has disrupted some of its operations. The company is currently investigating the incident to determine the extent of the attack and whether any sensitive data has been compromised. This situation raises concerns not only for Hasbro and its employees but also for customers who may be affected if personal information is involved. The investigation is ongoing, and Hasbro is working to restore its normal operations as quickly as possible. This incident serves as a reminder of the vulnerabilities that organizations face in the digital landscape.
In January 2026, Nacogdoches Memorial Hospital experienced a significant data breach when hackers infiltrated its internal network, compromising the personal and health information of approximately 250,000 individuals. The stolen data includes sensitive health records, which can lead to identity theft and fraud. This breach raises concerns about the hospital's cybersecurity measures and the potential risks for affected patients. As healthcare organizations increasingly become targets for cybercriminals, the incident underscores the need for stronger protections and response strategies in the medical field. The hospital is likely to face scrutiny regarding its data security protocols and the impact on patient trust moving forward.
SecurityWeek
Mercor, an AI recruiting firm, is currently facing a significant security incident after a supply chain attack attributed to the cybercriminal group Lapsus$. The attackers claim to have stolen around 4 terabytes of data from the company. This breach raises serious concerns about the security of sensitive information related to recruitment and hiring processes, which could potentially impact both job seekers and employers using Mercor's services. The firm is actively investigating the breach to assess the extent of the damage and to implement necessary security measures. The situation highlights the risks associated with supply chain vulnerabilities, especially in sectors that rely heavily on technology and data management.
SCM feed for Latest
A recent report from Infosecurity Magazine reveals that the Phantom Stealer, a .NET-based malware, has been targeting manufacturing, technology, and logistics sectors across Europe. This malware is part of the Phantom Project cybercrime kit, which also includes a crypter and a remote access tool. The attacks occurred in a series of phishing campaigns from November 2025 to January 2026. Organizations in these industries should be aware of the potential for data breaches and operational disruptions due to these ongoing attacks. The targeted sectors are crucial for the economy, making the successful exploitation of these vulnerabilities particularly concerning.
SecurityWeek
Hasbro, the well-known toy company, is currently investigating a cyberattack that has affected its operations. While details are still emerging, the company is looking into the possibility of compromised files, which could potentially expose sensitive information. This incident raises concerns not only for Hasbro but also for customers and partners who may be impacted by data breaches or operational disruptions. As the investigation unfolds, it will be crucial for Hasbro to communicate transparently with stakeholders and take necessary steps to secure its systems. Cyberattacks on major companies like Hasbro remind us that even well-established brands are vulnerable to security threats.
Venom Stealer is a new type of malware that allows cybercriminals to continuously collect sensitive information from infected devices. This software has features that enable it to maintain persistence, which means it can stay on a system even after a reboot or other attempts to remove it. The malware targets login credentials, session data, and cryptocurrency assets, putting users' financial security at risk. As it automates the data harvesting process, attackers can siphon off valuable information without needing to be present. This poses a significant threat to individuals and organizations that rely on digital platforms for transactions and communications.
A recent software update from Lloyds Bank has accidentally exposed mobile banking users' transaction details to other users of the app. This incident has affected around 450,000 individuals who may have had their sensitive information accessible to others using the same application. The breach raises significant concerns about data privacy and the security of financial transactions. Users are now at risk of having their banking activities viewed by unintended parties, which could lead to identity theft or fraud. Lloyds has acknowledged the issue and is working to rectify the situation, but the incident serves as a reminder of the vulnerabilities that can arise from software updates.