A serious security flaw known as 'MongoBleed' has been identified in MongoDB servers, allowing attackers who are not authenticated to access sensitive information like passwords and tokens. This vulnerability is currently being exploited in the wild, raising significant concerns for organizations using MongoDB. The issue stems from a memory leak that can be exploited by attackers to extract confidential data directly from the servers. Companies running affected versions of MongoDB should prioritize patching their systems to mitigate the risk of unauthorized data access. Given the potential for serious data breaches, immediate action is essential for any organization relying on MongoDB for data storage.
Articles tagged "Data Breach"
Found 152 articles
SecurityWeek
Brightspeed is currently investigating a cyberattack attributed to the hacking group Crimson Collective, which has reportedly stolen personal information of more than 1 million customers. This breach raises serious concerns about the security of sensitive data, as the stolen information could potentially be used for identity theft or fraud. Brightspeed has not disclosed specific details about the data compromised or how the attackers gained access. The incident emphasizes the ongoing risks faced by telecom companies and their customers in the digital age. Users affected by the breach should be vigilant about potential phishing attempts and monitor their accounts for unusual activity.
Sedgwick has confirmed that hackers have breached a file transfer system within its subsidiary that caters to government agencies. This compromise raises serious concerns about the security of sensitive data handled by the subsidiary, as it primarily deals with information from various government entities. The incident highlights ongoing vulnerabilities in systems that support critical infrastructure and public services. As investigations continue, the extent of data accessed or stolen remains unclear. This attack serves as a reminder for organizations, especially those dealing with government contracts, to bolster their cybersecurity measures to protect against similar threats.
Infosecurity Magazine
A significant data breach involving Manage My Health has potentially compromised the sensitive information of over 120,000 patients in New Zealand. The breach raises serious concerns about the security measures in place to protect personal health data. Authorities have ordered a review to understand the extent of the breach and to prevent future incidents. This situation highlights the vulnerability of health information systems and the need for stronger protections to safeguard patient data. Patients affected by this incident may face risks related to identity theft and privacy violations, making it crucial for healthcare providers to enhance their cybersecurity practices.
BleepingComputer
Ledger has informed some of its customers that their personal information was compromised due to a breach at Global-e, a third-party payment processor. The breach has raised concerns as it potentially exposes sensitive data like names, email addresses, and other identifying details. While Ledger itself was not directly attacked, the incident underscores the risks associated with relying on third-party services for payment processing. Customers affected by this breach should remain vigilant about their accounts and consider monitoring their financial statements for any suspicious activity. The incident also serves as a reminder for companies to ensure their third-party vendors maintain strong security practices to protect consumer data.
Infosecurity Magazine
A report from TRM Labs has traced $35 million in stolen cryptocurrency back to a breach of LastPass that occurred in 2022. The breach reportedly led to attackers draining funds from users' wallets, raising significant concerns about the security of password management systems. LastPass has faced scrutiny due to this incident, as it underscores the potential risks for users relying on such services to safeguard sensitive information. This situation serves as a reminder for individuals to remain vigilant about their online security practices, especially when it comes to managing passwords and sensitive financial data. Users are encouraged to review their wallet security and consider additional protective measures.
Security Affairs
Resecurity recently caught a group known as ShinyHunters, also referred to as Scattered Lapsus$ Hunters, using decoy accounts to target various sectors including airlines, telecommunications, and law enforcement in September 2025. This detection took place through a honeypot operation, where fake accounts were set up to lure attackers. The activities of ShinyHunters are concerning as they indicate a growing trend of sophisticated cyber attacks aimed at critical industries. The group is known for stealing sensitive data and selling it on the dark web, which poses significant risks to both organizations and individuals. Resecurity's findings emphasize the need for enhanced cybersecurity measures across these sectors to prevent future breaches.
BleepingComputer
The hacking group ShinyHunters claims to have breached the cybersecurity firm Resecurity, alleging that they stole internal data. However, Resecurity has countered these claims, stating that the attackers only accessed a honeypot—a decoy system designed to lure in hackers and monitor their activities. This situation raises questions about the effectiveness of security measures and the tactics used by both attackers and defenders. If true, this incident illustrates the ongoing cat-and-mouse game in cybersecurity, where firms must stay vigilant against potential breaches while also employing strategies to detect and analyze threats. The outcome of this dispute could have implications for how companies approach cybersecurity defenses and incident reporting.
BleepingComputer
The hacking group known as ShinyHunters has claimed responsibility for breaching the cybersecurity firm Resecurity and stealing internal data. However, Resecurity disputes this claim, stating that the attackers only managed to access a honeypot—a decoy system intentionally set up to contain fake information. This honeypot was designed to track and analyze the activities of potential attackers. The incident raises questions about the effectiveness of cybersecurity measures and the tactics used by hackers. While Resecurity maintains that no real data was compromised, the event serves as a reminder of the ongoing challenges in cybersecurity and the importance of vigilance against potential threats.
Hackread – Cybersecurity News, Data Breaches, AI, and More
Resecurity has responded to claims from the hacking group ShinyHunters, asserting that the attackers did not breach any real systems or access customer data. Instead, Resecurity says the hackers interacted with a honeypot designed to capture malicious activity, which contained only fake information. This incident underscores the ongoing challenges in cybersecurity, as groups like ShinyHunters may attempt to exploit vulnerabilities or claim breaches that aren't genuine. For companies, this serves as a reminder to monitor their security measures and ensure they are prepared for potential threats, even if they turn out to be misdirected. The situation illustrates the importance of having robust security practices in place to counteract both real and perceived threats.
Hackread – Cybersecurity News, Data Breaches, AI, and More
The hacking group known as ShinyHunters claims to have breached Resecurity, a US cybersecurity firm. They reportedly accessed sensitive data, although specific details about the type of information compromised have not been disclosed yet. Resecurity has acknowledged the incident and provided an update, although it remains unclear how many users or entities may be affected by this breach. This incident raises concerns about the security measures in place at cybersecurity firms themselves, as they are expected to be leaders in protecting sensitive data. The implications of such a breach could significantly undermine trust in the industry.
Covenant Health has announced that nearly 478,000 patients' data was compromised in a breach first identified in May. The healthcare organization confirmed that personal information, including names, addresses, and some medical details, may have been accessed by unauthorized individuals. This incident raises concerns about patient privacy and the security of sensitive health information. Covenant Health is working to notify affected individuals and is taking steps to enhance its cybersecurity measures to prevent future breaches. The scale of this incident highlights the ongoing vulnerabilities faced by healthcare organizations in protecting patient data.
Hackread – Cybersecurity News, Data Breaches, AI, and More
Tokyo FM is currently looking into a significant data breach that reportedly involves the theft of over 3 million records. According to claims made by a hacker, sensitive information may have been compromised, although the specific types of data have not been detailed. This incident could potentially affect a large number of users, raising concerns about identity theft and data misuse. As the investigation unfolds, individuals associated with Tokyo FM are advised to monitor their accounts and consider changing their passwords. The situation serves as a reminder of the vulnerabilities that organizations face and the importance of data protection measures.
BleepingComputer
Investigations by TRM Labs have linked ongoing cryptocurrency thefts to a breach of LastPass that occurred in 2022. Attackers managed to access encrypted vaults and have been draining cryptocurrency wallets years after the initial breach. They are laundering the stolen funds through exchanges based in Russia. This incident raises significant concerns about the long-term risks associated with data breaches, as compromised information continues to be exploited long after it is stolen. Users of LastPass and others in the cryptocurrency space should be particularly vigilant about securing their assets and monitoring for any unauthorized transactions.
Covenant Health, a healthcare organization based in Andover, Massachusetts, experienced a significant ransomware attack in May 2025, attributed to the Qilin group. This incident compromised the personal data of over 478,000 individuals, raising serious concerns about patient privacy and data security. Affected individuals may have had their sensitive health information exposed, which could lead to identity theft and other security risks. The breach emphasizes the ongoing vulnerabilities within the healthcare sector, where attackers increasingly target patient data for ransom. As healthcare providers continue to digitize their services, the need for robust cybersecurity measures becomes more pressing.