Articles tagged "Data Breach"

Found 239 articles

287 Chrome Extensions Caught Harvesting Browsing Data from 37M Users

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A recent investigation by Q Continuum has uncovered that 287 Chrome extensions are leaking private browsing data from approximately 37.4 million users to companies like Similarweb and Alibaba. These extensions, often perceived as harmless tools, have been found to convert users' browsing histories into marketable products. The data breach raises significant privacy concerns, particularly for users who may not be aware that their online activities are being monitored and sold. This incident highlights the need for users to be vigilant about the extensions they install and the permissions they grant. As these extensions may not seem malicious at first glance, it serves as a reminder of the potential risks associated with browser add-ons.

Impact: Chrome extensions, user browsing data
Remediation: Users should review and remove any unnecessary or suspicious Chrome extensions and check their permissions. Regularly monitoring browser settings and being cautious about the extensions installed is advisable.
Read Original

Fintech company Figure has confirmed a data breach resulting from a phishing attack that targeted one of its employees. The attackers used social engineering tactics to deceive the employee and gain access to a limited number of files. A spokesperson for Figure stated that while the breach is concerning, the extent of the data compromised is not extensive. This incident raises alarms about the effectiveness of employee training and awareness regarding phishing tactics, which continue to be a significant vulnerability for many organizations. Users and stakeholders of Figure should remain vigilant and monitor for any unusual activity related to their accounts.

Impact: Limited number of employee files
Remediation: Enhance employee training on phishing and social engineering tactics
Read Original
Actively Exploited

Conpet, Romania's national oil pipeline operator, has confirmed that its data was compromised due to a Qilin ransomware attack that targeted its IT infrastructure last week. This incident raises concerns about the security of critical infrastructure, as ransomware attacks can disrupt essential services and lead to significant operational challenges. While specific details about the type of data compromised haven't been disclosed, the breach highlights the ongoing risks that organizations in crucial sectors face from sophisticated cybercriminals. The attack underscores the need for robust security measures in protecting vital systems against ransomware threats. Stakeholders in the energy sector should take note and review their security protocols to prevent similar incidents.

Impact: Conpet IT infrastructure, potentially affecting operational data and sensitive information.
Remediation: N/A
Read Original

Atlas Air, a major U.S. cargo airline, has publicly rejected claims made by the Everest ransomware group that it successfully breached the airline's systems and stole 1.2 terabytes of sensitive technical information, including data related to Boeing aircraft. The airline insists that its operations remain secure and that there has been no compromise of its data. The allegations by Everest raise concerns about the vulnerability of critical infrastructure in the aviation sector, particularly as ransomware attacks have become more frequent and sophisticated. If the claims were true, it could have serious implications for aviation safety and security. However, with Atlas Air's denial, the situation remains unclear, and further investigation may be necessary to determine the validity of the ransomware group's claims.

Impact: Atlas Air systems, Boeing aircraft data
Remediation: N/A
Read Original

Odido, a telecommunications company, reported a significant data breach that exposed the personal information of approximately 6.2 million customers. The incident occurred over the weekend of February 7, when attackers accessed Odido's customer contact system. This breach raises serious concerns about data privacy and security, as it potentially includes sensitive information that could be misused by malicious actors. Customers may now face risks such as identity theft or phishing attacks, making it crucial for them to monitor their accounts and take protective measures. Odido has not disclosed specific details about how the breach happened or what steps they are taking to prevent future incidents.

Impact: Customer contact information for 6.2 million Odido customers
Remediation: N/A
Read Original
Actively Exploited

ApolloMD, a major healthcare firm based in Georgia with operations across the U.S., disclosed a significant data breach affecting over 626,000 patients. The incident, which occurred in May, was attributed to the Qilin ransomware group. Compromised information includes sensitive data, which raises serious concerns about patient privacy and potential identity theft. As healthcare organizations increasingly face cyber threats, this breach serves as a troubling reminder of the vulnerabilities within the sector. Patients and providers alike need to be vigilant about safeguarding personal information and responding to potential fallout from such attacks.

Impact: Sensitive patient information, including personal health data.
Remediation: Healthcare providers should enhance cybersecurity measures, conduct thorough audits, and inform affected patients about protective steps they can take.
Read Original

Conpet S.A., Romania's national oil pipeline operator, has confirmed that it fell victim to a data breach involving the Qilin ransomware gang last week. The attackers managed to steal sensitive company data, although specific details about the compromised information have not been disclosed. This incident raises concerns about the security of critical infrastructure, particularly in the energy sector. As ransomware attacks continue to target essential services, it highlights the need for stronger cybersecurity measures to protect against such threats. Companies in similar sectors should take this as a warning to review their security protocols and ensure they can respond effectively to potential breaches.

Impact: Conpet S.A. (national oil pipeline operator in Romania)
Remediation: Companies should review and strengthen their cybersecurity measures, particularly for critical infrastructure. Specific remediation steps were not detailed.
Read Original

Odido, a Dutch telecommunications provider, has reported a significant data breach affecting the personal information of approximately 6.2 million customers. The company revealed that a cyberattack led to the exposure of sensitive data, although specific details about the nature of the data compromised have not been fully disclosed. This incident raises serious concerns about customer privacy and the security measures in place to protect personal information. Customers of Odido should remain vigilant and monitor their accounts for any unusual activity, as the fallout from such breaches can lead to identity theft and fraud. The incident emphasizes the ongoing challenges companies face in safeguarding user data against cyber threats.

Impact: Personal data of 6.2 million customers
Remediation: N/A
Read Original

A significant data breach has occurred in Senegal, with a group known as Green Blood Group reportedly stealing personal records and biometric data from nearly 20 million residents. This breach raises alarms about the country's cybersecurity maturity, as vast amounts of sensitive information are now at risk. The stolen data could be used for identity theft and fraud, posing serious concerns for individuals and institutions alike. As the nation grapples with this incident, it highlights the urgent need for improved data protection measures and infrastructure to safeguard personal information. The breach not only affects individuals but also undermines public trust in the systems designed to protect their data.

Impact: Personal records and biometric data of nearly 20 million Senegalese residents.
Remediation: Strengthening cybersecurity measures and implementing better data protection protocols.
Read Original

Volvo reported a compromise involving Conduent, a third-party service provider. This incident reveals vulnerabilities in how third-party vendors manage security, emphasizing the need for a more transparent approach to disclosures. Although details about the exact nature of the compromise are still emerging, it raises concerns about the safety of customer data and operational integrity for companies relying on third-party services. Stakeholders must take this incident as a wake-up call to enhance their security practices and ensure that third-party vendors adhere to strict security protocols to protect sensitive information. This situation serves as a reminder of the risks posed by third-party relationships in the digital landscape.

Impact: Conduent services, Volvo systems
Remediation: Companies should review third-party security practices and implement stricter disclosure policies.
Read Original

A recent data breach involving Conduent has compromised the personal information of nearly 17,000 employees at Volvo Group, part of a much larger incident affecting at least 25 million individuals. Initially thought to involve only 10 million people, the breach has expanded significantly, raising concerns about data security across numerous organizations. The exposed data could include sensitive information, putting affected employees at risk for identity theft and other malicious activities. This incident emphasizes the need for companies to bolster their cybersecurity measures and protect sensitive employee data. The breach's scale indicates a potential vulnerability in third-party vendor systems, which can have widespread implications for many businesses relying on such services.

Impact: Data of approximately 17,000 Volvo Group employees, potentially including personal and sensitive information.
Remediation: Companies should review their data protection policies and enhance security measures for third-party vendor access.
Read Original

A recent security incident has exposed sensitive data of about 152,000 users of various photo identification apps. Researchers from Cybernews discovered that the breaches were due to misconfigured Firebase instances within these applications. The lack of proper authentication and access controls left their databases vulnerable and open to unauthorized access. This incident raises significant concerns about user privacy and the safety of personal information, as such data breaches can lead to identity theft and other malicious activities. Users of these apps should be aware of the risks and take steps to secure their information.

Impact: Photo identification apps using misconfigured Firebase instances
Remediation: Implement proper authentication and access controls for Firebase instances and review app configurations to ensure databases are secured.
Read Original

Volvo Group North America has reported a data breach that occurred due to a cyberattack on Conduent, a business services company that provides IT support to Volvo. The breach exposed customer data, although specific details about what information was compromised have not been disclosed. This incident raises concerns about the security of third-party vendors and the risks they pose to their clients. As companies increasingly rely on external service providers, the need for robust security measures in these partnerships becomes even more critical. Customers of Volvo Group North America should remain vigilant about potential impacts from this breach, including possible phishing attempts or identity theft.

Impact: Customer data of Volvo Group North America
Remediation: N/A
Read Original

Dutch agencies, including the Data Protection Authority and the Council for the Judiciary, have confirmed cyberattacks that exploited vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). These attacks resulted in the exposure of employee contact data. The flaws in Ivanti EPMM were recently disclosed, allowing attackers to breach the systems of these government bodies. This incident raises concerns about the security of sensitive personal information and the potential for further exploitation of these vulnerabilities. Authorities have reported the incidents to parliament, emphasizing the need for improved security measures in public sector agencies.

Impact: Ivanti Endpoint Manager Mobile (EPMM), Dutch Data Protection Authority, Council for the Judiciary
Remediation: Update Ivanti EPMM to the latest version and apply security patches as they become available.
Read Original

Recent zero-day attacks have breached the European Commission and government agencies in Finland and the Netherlands, targeting vulnerabilities in Ivanti software. These incidents appear to be linked, raising concerns about the security of sensitive governmental information. Ivanti is known for providing IT management solutions, and the exploitation of these vulnerabilities can lead to unauthorized access to critical data. This situation emphasizes the need for government agencies to enhance their cybersecurity measures and stay updated with software patches to prevent future breaches. The ongoing exploitation underscores a serious risk to national security and personal data protection across Europe.

Impact: Ivanti software products
Remediation: Update Ivanti software to the latest versions and apply any available security patches.
Read Original
Page 1 of 16Next