Articles tagged "Data Breach"

Found 354 articles

Wynn Resorts has reported that around 21,000 employees have been impacted by a cyberattack linked to the ShinyHunters hacking group. The breach reportedly involved sensitive employee data, and there are indications that the company may have paid a ransom to prevent the information from being leaked. This incident raises significant concerns about data security in the hospitality industry, especially as personal information becomes more vulnerable to cybercriminals. The fact that such a large number of employees are affected highlights the scale of the attack and the potential risks associated with inadequate cybersecurity measures. As companies like Wynn Resorts face increasing threats from hackers, it becomes critical for them to enhance their security protocols to protect sensitive information.

Impact: Employee personal data, including names and contact information.
Remediation: N/A
Read Original

The Qilin ransomware group has claimed responsibility for a data breach involving Die Linke, a left-wing political party in Germany. The group announced that they have stolen sensitive data from the party and are threatening to make it public unless their demands are met. While Die Linke has confirmed that the incident occurred, they have stated that there was no breach of their systems. This incident raises concerns about the cybersecurity of political organizations, especially given the sensitive nature of the data involved. The threat of public data leaks can have serious implications for political entities, affecting both their reputation and operational integrity.

Impact: Die Linke political party
Remediation: N/A
Read Original

A breach involving the European Commission's cloud infrastructure has resulted in the exposure of sensitive data from at least 30 EU entities. The incident was linked to the TeamPCP hacking group, which is known for targeting various organizations. CERT-EU, the Computer Emergency Response Team for the EU, confirmed this breach and made the information public on March 27. This incident raises significant concerns about the security of sensitive government data and the potential for further exploitation of the exposed information. Organizations within the EU must assess their security measures to prevent similar breaches in the future.

Impact: Data from at least 30 EU entities, including sensitive government information.
Remediation: Organizations should review and enhance their cloud security protocols, conduct thorough audits of their systems, and implement robust access controls.
Read Original

Hims & Hers Health, a telehealth service provider, has reported a data breach due to stolen support tickets from Zendesk, a third-party customer service platform. This incident raises concerns as it potentially exposes sensitive information from users who sought medical advice or treatment through the service. The company is urging affected users to stay vigilant about their personal information and to monitor their accounts for any suspicious activity. This breach underscores the risks associated with relying on third-party vendors for customer support and handling sensitive data. Users should be aware of possible phishing attempts or unauthorized access to their accounts following this incident.

Impact: Hims & Hers Health user data, Zendesk support tickets
Remediation: Monitor accounts for suspicious activity; users should be cautious of phishing attempts.
Read Original

The Qilin ransomware group has targeted Die Linke, a German political party, causing significant disruption to its IT systems. This attack not only resulted in a systems outage but also included threats of leaking sensitive data. The party confirmed that data had indeed been stolen during the breach. This incident raises concerns about the security of political organizations, especially in light of upcoming elections and the potential for sensitive information to be weaponized. As cyberattacks against political entities become more common, the implications for privacy and security in the political arena are increasingly serious.

Impact: Die Linke party's IT systems and sensitive data
Remediation: N/A
Read Original
AI Firm Mercor Confirms Breach as Hackers Claim 4TB of Stolen Data

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Mercor, an AI firm, has confirmed a significant data breach linked to a supply chain attack involving LiteLLM. Hackers claim to have stolen 4TB of sensitive data, which may include internal systems and proprietary information. This breach raises serious concerns about the security of supply chain processes, as attackers often exploit vulnerabilities in third-party software to gain access to larger networks. Companies that rely on LiteLLM and similar technologies should be particularly vigilant and assess their security measures. The implications of such a large data theft could be severe, affecting not only Mercor but also its clients and partners who may be at risk of data exposure or further attacks.

Impact: LiteLLM supply chain, Mercor's internal systems, sensitive data
Remediation: Companies should review their supply chain security practices, implement stronger access controls, and monitor for unusual activity. Specific patches or updates were not mentioned.
Read Original

The European Union's Cybersecurity Service (CERT-EU) has confirmed a significant data breach affecting the European Commission, linked to the TeamPCP hacking group. This breach has compromised the data of at least 29 other EU entities, raising concerns about the security of sensitive information within the Union's institutions. The attack underscores the ongoing risks to government networks from sophisticated cyber threats. The incident not only impacts the directly affected organizations but also raises alarms about the potential for further exploitation of the exposed data. As the investigation continues, EU officials are likely to review their cybersecurity protocols to prevent similar incidents in the future.

Impact: European Commission, 29 other EU entities
Remediation: N/A
Read Original

Hasbro has reported unauthorized access to its systems, leading the company to activate its business continuity plans and take some systems offline. The incident was disclosed in an 8-K filing, indicating that the attack has had a significant impact on the company's operations. While specific details about the nature of the attack or the data involved have not been released, the company expects that remediation could take weeks. This incident raises concerns about the security of sensitive information within major corporations and highlights the ongoing risks businesses face from cyber threats. Stakeholders are advised to stay informed as the situation develops.

Impact: Hasbro systems and potentially customer data, though specifics are not provided.
Remediation: Activated business continuity plans and took some systems offline.
Read Original

Hasbro, the well-known toy manufacturer, reported a cyberattack on Wednesday that has disrupted some of its operations. The company is currently investigating the incident to determine the extent of the attack and whether any sensitive data has been compromised. This situation raises concerns not only for Hasbro and its employees but also for customers who may be affected if personal information is involved. The investigation is ongoing, and Hasbro is working to restore its normal operations as quickly as possible. This incident serves as a reminder of the vulnerabilities that organizations face in the digital landscape.

Impact: Hasbro operations and potentially customer data
Remediation: N/A
Read Original

In January 2026, Nacogdoches Memorial Hospital experienced a significant data breach when hackers infiltrated its internal network, compromising the personal and health information of approximately 250,000 individuals. The stolen data includes sensitive health records, which can lead to identity theft and fraud. This breach raises concerns about the hospital's cybersecurity measures and the potential risks for affected patients. As healthcare organizations increasingly become targets for cybercriminals, the incident underscores the need for stronger protections and response strategies in the medical field. The hospital is likely to face scrutiny regarding its data security protocols and the impact on patient trust moving forward.

Impact: Personal and health information of 250,000 individuals
Remediation: N/A
Read Original
Actively Exploited

Mercor, an AI recruiting firm, is currently facing a significant security incident after a supply chain attack attributed to the cybercriminal group Lapsus$. The attackers claim to have stolen around 4 terabytes of data from the company. This breach raises serious concerns about the security of sensitive information related to recruitment and hiring processes, which could potentially impact both job seekers and employers using Mercor's services. The firm is actively investigating the breach to assess the extent of the damage and to implement necessary security measures. The situation highlights the risks associated with supply chain vulnerabilities, especially in sectors that rely heavily on technology and data management.

Impact: Mercor data, AI recruiting systems
Remediation: N/A
Read Original
Actively Exploited

A recent report from Infosecurity Magazine reveals that the Phantom Stealer, a .NET-based malware, has been targeting manufacturing, technology, and logistics sectors across Europe. This malware is part of the Phantom Project cybercrime kit, which also includes a crypter and a remote access tool. The attacks occurred in a series of phishing campaigns from November 2025 to January 2026. Organizations in these industries should be aware of the potential for data breaches and operational disruptions due to these ongoing attacks. The targeted sectors are crucial for the economy, making the successful exploitation of these vulnerabilities particularly concerning.

Impact: Phantom Stealer malware, manufacturing organizations, technology companies, logistics firms.
Remediation: Organizations should implement strong phishing defenses, user training on recognizing phishing attempts, and regular updates to security software.
Read Original

Hasbro, the well-known toy company, is currently investigating a cyberattack that has affected its operations. While details are still emerging, the company is looking into the possibility of compromised files, which could potentially expose sensitive information. This incident raises concerns not only for Hasbro but also for customers and partners who may be impacted by data breaches or operational disruptions. As the investigation unfolds, it will be crucial for Hasbro to communicate transparently with stakeholders and take necessary steps to secure its systems. Cyberattacks on major companies like Hasbro remind us that even well-established brands are vulnerable to security threats.

Impact: N/A
Remediation: N/A
Read Original

Venom Stealer is a new type of malware that allows cybercriminals to continuously collect sensitive information from infected devices. This software has features that enable it to maintain persistence, which means it can stay on a system even after a reboot or other attempts to remove it. The malware targets login credentials, session data, and cryptocurrency assets, putting users' financial security at risk. As it automates the data harvesting process, attackers can siphon off valuable information without needing to be present. This poses a significant threat to individuals and organizations that rely on digital platforms for transactions and communications.

Impact: Users of infected devices, particularly those handling sensitive credentials and cryptocurrency assets.
Remediation: Users should ensure their antivirus software is up to date and consider implementing multi-factor authentication for sensitive accounts. Regularly changing passwords and monitoring accounts for unauthorized activity is also advised.
Read Original

A recent software update from Lloyds Bank has accidentally exposed mobile banking users' transaction details to other users of the app. This incident has affected around 450,000 individuals who may have had their sensitive information accessible to others using the same application. The breach raises significant concerns about data privacy and the security of financial transactions. Users are now at risk of having their banking activities viewed by unintended parties, which could lead to identity theft or fraud. Lloyds has acknowledged the issue and is working to rectify the situation, but the incident serves as a reminder of the vulnerabilities that can arise from software updates.

Impact: Lloyds Bank mobile banking application
Remediation: Lloyds is working on resolving the issue with the faulty software update.
Read Original
PreviousPage 3 of 24Next