Articles tagged "Data Breach"

Found 239 articles

Nike is currently investigating a potential security incident after the WorldLeaks cybercrime group claimed to have stolen sensitive data from the company. The attackers have threatened to leak this information if their demands are not met. This situation raises concerns about the security of customer data and proprietary company information, which could lead to significant reputational damage for Nike. As the investigation unfolds, it is important for users and stakeholders to stay informed about the nature of the data involved and any implications for their privacy and security. Companies like Nike must remain vigilant to protect against such threats as cybercriminals continue to target large organizations.

Impact: Nike systems and potentially customer data
Remediation: N/A
Read Original

A recent data leak has exposed millions of account credentials from various platforms, including Gmail, Facebook, and numerous financial services. This dataset contains sensitive information, potentially affecting countless users who have accounts on these platforms. The breach raises serious concerns about identity theft and fraud, as attackers may exploit this data for malicious activities. Users are urged to change their passwords immediately and enable two-factor authentication where available. This incident highlights the ongoing challenges of online security, reminding everyone of the importance of safeguarding personal information.

Impact: Gmail, Facebook, various financial accounts
Remediation: Users should change passwords and enable two-factor authentication.
Read Original

Recent research has revealed that attackers can now conduct more efficient intrusions targeting page caches in Linux systems. The study highlights vulnerabilities in how Linux manages memory, particularly in the page cache, which can be manipulated to access sensitive information. This development poses a risk to a wide range of Linux distributions, potentially affecting servers and workstations that rely on this operating system. As the efficiency of these attacks increases, companies and users need to be aware of the potential for data breaches and take preventive measures. It’s crucial for system administrators to stay informed and implement appropriate security protocols to mitigate these risks.

Impact: Linux systems, including various distributions and versions
Remediation: Implement security patches and updates as they become available; review and enhance memory management configurations.
Read Original
149M Logins from Roblox, TikTok, Netflix, Crypto Wallets Found Online

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A significant data breach has surfaced, revealing that 149 million login credentials from popular platforms such as Roblox, TikTok, Netflix, and various crypto wallets have been exposed online in plain text. This incident raises serious concerns for users of these services, as attackers could easily exploit these credentials for unauthorized access. The discovery of these credentials emphasizes the ongoing risks associated with poor security practices, such as weak passwords and lack of two-factor authentication. Companies must take immediate action to secure their systems and encourage users to change their passwords and enable additional security measures. As the digital landscape continues to evolve, incidents like this serve as a stark reminder of the importance of safeguarding personal information.

Impact: Roblox, TikTok, Netflix, Crypto Wallets
Remediation: Users should change their passwords immediately and enable two-factor authentication where available. Companies should conduct security audits and enhance their password policies.
Read Original
ShinyHunters Leak Alleged Data of Millions From SoundCloud, Crunchbase and Betterment

Hackread – Cybersecurity News, Data Breaches, AI, and More

ShinyHunters, a known hacking group, has reportedly leaked data from several companies, including SoundCloud, Crunchbase, and Betterment. The leak is said to involve the personal information of millions of users, raising serious concerns about data security and privacy. This incident follows previous breaches attributed to the group, which has a history of targeting various organizations. The potential for more leaks has been hinted at by the group, suggesting that the situation could worsen. This breach not only affects the companies involved but also puts the personal information of countless users at risk, emphasizing the ongoing challenges of cybersecurity in today's digital landscape.

Impact: SoundCloud, Crunchbase, Betterment
Remediation: Companies should notify affected users and assess their security measures to prevent future breaches.
Read Original

Under Armour is currently investigating a data breach that may have exposed approximately 72 million records. The company has stated that, so far, there is no evidence suggesting that the breach affected systems responsible for processing payments or storing customer passwords. This incident raises concerns about the potential exposure of personal data, which could include details such as email addresses and other sensitive information. For users of Under Armour's services, the situation is alarming as it may lead to phishing attempts or identity theft. The company is taking steps to understand the full scope of the breach and to protect its customers moving forward.

Impact: 72 million records, customer data including email addresses
Remediation: N/A
Read Original

Under Armour is currently investigating a significant data breach after approximately 72 million customer records were discovered online, allegedly posted by a cybercriminal. The leaked data includes personal information that could impact a large number of individuals who have engaged with the brand, which is known for its sportswear and fitness accessories. This incident raises serious concerns about data security and the potential risks to affected customers, including identity theft and fraud. As Under Armour works to assess the situation and secure its systems, customers are advised to monitor their accounts for any unusual activity. The breach serves as a reminder of the importance of strong cybersecurity measures in protecting personal information.

Impact: 72 million customer records, personal information
Remediation: Customers advised to monitor accounts for unusual activity; Under Armour conducting investigation and security assessment.
Read Original

A recent report from DLA Piper shows that over 160,000 companies have reported breaches to European GDPR regulators, marking a 22% increase in notifications compared to previous years. This surge indicates that businesses are becoming more aware of their obligations under the GDPR and are taking steps to comply with reporting requirements. The increase in notifications could also reflect a rise in actual data breaches or a heightened awareness of data privacy issues. Companies that fail to report breaches risk facing significant fines, which can be as much as 4% of their annual global revenue. This trend is crucial because it emphasizes the ongoing challenges organizations face in protecting personal data and maintaining compliance with data protection laws.

Impact: N/A
Remediation: Companies should ensure compliance with GDPR reporting requirements and enhance data protection measures.
Read Original

A significant spam wave is hitting users globally, stemming from unsecured Zendesk support systems. Victims are reporting receiving hundreds of unsolicited emails with unusual and sometimes alarming subject lines, raising concerns about the safety and security of their information. This incident indicates a serious lapse in security measures, as attackers are exploiting vulnerabilities in the ticketing system to send out mass spam. The situation is alarming as it not only affects individuals but could also lead to broader security issues if sensitive information is compromised. Companies using Zendesk should review their security protocols to prevent unauthorized access and protect their users from being targeted in this way.

Impact: Zendesk support systems
Remediation: Companies should secure their Zendesk systems and review access controls to prevent unauthorized exploitation.
Read Original

PcComponentes, a well-known tech retailer in Spain, is facing scrutiny after claims surfaced about a data breach affecting 16 million customers. The company has denied these allegations but acknowledged that it experienced a credential stuffing attack. This type of attack occurs when hackers use stolen credentials from one service to access accounts on another, raising concerns about the security of customer data. While PcComponentes insists that the data breach claims are unfounded, the incident still raises alarms about the potential vulnerabilities faced by online retailers. Customers should be vigilant and consider changing their passwords, especially if they use the same credentials across multiple sites.

Impact: 16 million customer accounts
Remediation: Users should change passwords and enable two-factor authentication.
Read Original

The Everest ransomware group has claimed responsibility for a data breach affecting McDonald's India. They provided screenshots as proof, which reportedly include sensitive information such as financial reports, audit trails, pricing data, and internal communications. This incident raises concerns about the security of corporate data and the potential implications for customer trust and business operations. Companies need to take this threat seriously and evaluate their cybersecurity measures to prevent similar breaches. The exposure of such sensitive data could lead to financial losses and reputational damage for McDonald's India.

Impact: McDonald's India internal communications, financial reports, audit trails, pricing data
Remediation: Companies should review and strengthen their data security protocols and incident response plans.
Read Original

Hackers are taking advantage of poorly configured web applications that are designed for security training and testing, such as DVWA, OWASP Juice Shop, Hackazon, and bWAPP. These applications are being used as gateways to access the cloud environments of various Fortune 500 companies and security vendors. The attackers exploit these misconfigurations to infiltrate systems that should ideally serve as safe environments for testing security measures. This situation raises serious concerns for companies that rely on these tools for internal security practices, as it exposes them to potential data breaches and unauthorized access. Organizations need to ensure that their security testing applications are correctly configured to prevent exploitation by malicious actors.

Impact: DVWA, OWASP Juice Shop, Hackazon, bWAPP, Fortune 500 companies, security vendors
Remediation: Companies should review and properly configure their web applications used for security testing to close any vulnerabilities that could be exploited.
Read Original
Carlsberg Event Wristband Leaked PII, Researcher Told Not to Disclose

Hackread – Cybersecurity News, Data Breaches, AI, and More

A security lapse at a Carlsberg exhibition exposed attendees' personal information due to a poorly secured wristband system. This system allowed unauthorized access to sensitive data, such as visitor photos, videos, and full names. Despite attempts by a researcher to report the vulnerability, their concerns were ignored for several months, raising questions about the company's response to security issues. The incident underscores the need for better data protection practices, especially at public events where personal information is collected. This breach not only affects the individuals whose data was exposed but also damages Carlsberg's reputation as a secure event organizer.

Impact: Carlsberg exhibition wristband system, visitor personal information
Remediation: Implement stronger security measures for data storage and access control, conduct regular security audits, and establish a responsive incident reporting system.
Read Original

USB drives pose a significant security risk for enterprises, as they can easily introduce malware into corporate networks. Researchers warn that these small devices often go unchecked and can lead to data breaches or unauthorized access. Many organizations still rely on USB drives for data transfer, making them an attractive target for cybercriminals. The ease of use and widespread availability means that employees might unwittingly use infected drives, compromising sensitive information and systems. Companies should implement strict policies regarding the use of USB drives and consider investing in security solutions that can monitor and control their use.

Impact: USB drives, corporate networks
Remediation: Implement strict policies on USB drive usage, invest in security solutions for monitoring and controlling USB access.
Read Original

SK Telecom, a leading telecommunications company in South Korea, is challenging a hefty $91 million fine imposed by the Personal Information Protection Commission. This penalty was a result of a cyberattack in April that compromised the personal data of all 23 million of the company's users. The breach raised significant concerns about data security and the responsibilities of companies to protect customer information. By contesting the fine, SK Telecom is not only seeking to mitigate financial repercussions but also potentially setting a precedent for how data breaches are handled in the future. This incident serves as a reminder of the ongoing risks companies face in safeguarding sensitive user data.

Impact: 23 million SK Telecom users
Remediation: N/A
Read Original
PreviousPage 5 of 16Next