Tag: breach
-
LastPass hammered with £1.2M fine for 2022 breach fiasco
UK data regulator says failures were unacceptable for a company managing the world’s passwords First seen on theregister.com Jump to article: www.theregister.com/2025/12/11/lastpass_ico_fine/
-
LastPass hammered with £1.2M fine for 2022 breach fiasco
UK data regulator says failures were unacceptable for a company managing the world’s passwords First seen on theregister.com Jump to article: www.theregister.com/2025/12/11/lastpass_ico_fine/
-
UK fines LastPass over 2022 data breach impacting 1.6 million users
The UK Information Commissioner’s Office (ICO) fined the LastPass password management firm £1.2 million for failing to implement security measures that allowed an attacker to steal personal information and encrypted password vaults belonging to up to 1.6 million UK users in a 2022 breach. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/uk-fines-lastpass-over-2022-data-breach-impacting-16-million-users/
-
Hackers reportedly breach developer involved with Russia’s military draft database
A hacking group it had maintained access to the firm’s systems for several months and had destroyed parts of the company’s infrastructure. First seen on therecord.media Jump to article: therecord.media/hackers-reportedly-breach-developer-involved-in-russian-military-database
-
UK fines LastPass £1.2 million for data breach affecting 1.6 million people
The Information Commissioner’s Office said LastPass had “failed to implement sufficiently robust technical and security measures” to protect its data. First seen on therecord.media Jump to article: therecord.media/uk-fines-lastpass-over-1-million-data-breach
-
Hackers exploit unpatched Gogs zero-day to breach 700 servers
An unpatched zero-day vulnerability in Gogs, a popular self-hosted Git service, has enabled attackers to gain remote code execution on Internet-facing instances and compromise hundreds of servers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/unpatched-gogs-zero-day-rce-flaw-actively-exploited-in-attacks/
-
Coupang CEO Resigns Following Major Data Breach Exposing 34 Million Customers
South Korea’s largest online retailer, Coupang, has been rocked by a massive data breach that exposed the personal details of nearly 34 million customers, forcing CEO Park Dae-jun to resign amid mounting scrutiny from regulators and the public. The breach, one of the most severe in South Korea’s history, reportedly included names, email addresses, phone…
-
Coupang CEO Resigns Following Major Data Breach Exposing 34 Million Customers
South Korea’s largest online retailer, Coupang, has been rocked by a massive data breach that exposed the personal details of nearly 34 million customers, forcing CEO Park Dae-jun to resign amid mounting scrutiny from regulators and the public. The breach, one of the most severe in South Korea’s history, reportedly included names, email addresses, phone…
-
Coupang CEO Resigns Following Major Data Breach Exposing 34 Million Customers
South Korea’s largest online retailer, Coupang, has been rocked by a massive data breach that exposed the personal details of nearly 34 million customers, forcing CEO Park Dae-jun to resign amid mounting scrutiny from regulators and the public. The breach, one of the most severe in South Korea’s history, reportedly included names, email addresses, phone…
-
“Cyber Tax” Warning as Two-Fifths of SMBs Raise Prices After Breach
New ITRC research finds 81% of US small businesses suffered a data or security breach in the past year First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/twofifths-smbs-raise-prices-after/
-
How to justify your security investments
Tags: ai, attack, automation, breach, business, ciso, cloud, computing, cyber, cyberattack, cybersecurity, data, encryption, finance, Hardware, incident, infrastructure, resilience, risk, saas, service, strategy, technology, tool, vulnerabilityThe language of risks and returns: Boards of directors make decisions considering concepts such as risk and return. These include financial risks, operational risks, and reputational risks for the company. Board members assess the probability, exposure, and impact of incidents in each of these areas. Accordingly, the CISO’s role is to clarify how a proposed…
-
How to justify your security investments
Tags: ai, attack, automation, breach, business, ciso, cloud, computing, cyber, cyberattack, cybersecurity, data, encryption, finance, Hardware, incident, infrastructure, resilience, risk, saas, service, strategy, technology, tool, vulnerabilityThe language of risks and returns: Boards of directors make decisions considering concepts such as risk and return. These include financial risks, operational risks, and reputational risks for the company. Board members assess the probability, exposure, and impact of incidents in each of these areas. Accordingly, the CISO’s role is to clarify how a proposed…
-
Drug R&D Firm Facing Costs, Lawsuits in Alleged Qilin Attack
Inotiv Tells SEC ‘It’s Still Evaluating Full Impact and Notifying Breach Victims’. Drug research firm Inotiv in a filing with federal regulators said it is still evaluating the financial and operational impact of an August cyberattack that’s linked to ransomware gang Qilin. The company is also notifying nearly 10,000 people whose data was allegedly stolen…
-
Drug R&D Firm Facing Costs, Lawsuits in Alleged Qilin Attack
Inotiv Tells SEC ‘It’s Still Evaluating Full Impact and Notifying Breach Victims’. Drug research firm Inotiv in a filing with federal regulators said it is still evaluating the financial and operational impact of an August cyberattack that’s linked to ransomware gang Qilin. The company is also notifying nearly 10,000 people whose data was allegedly stolen…
-
Ransomware Victim Warning: The Streisand Effect May Apply
Analysis of Seized LockBit Data Suggests Victims Who Pay Enjoy More Media Coverage. Bad news for any organization that’s ever paid a ransom in a bid to avoid their breach coming to light, or for a promise from attackers to delete stolen data, with a study of seized LockBit data finding that victims who paid…
-
Ransomware Victim Warning: The Streisand Effect May Apply
Analysis of Seized LockBit Data Suggests Victims Who Pay Enjoy More Media Coverage. Bad news for any organization that’s ever paid a ransom in a bid to avoid their breach coming to light, or for a promise from attackers to delete stolen data, with a study of seized LockBit data finding that victims who paid…
-
CEO of South Korean retail giant Coupang resigns after massive data breach
The massive data breach at the South Korean retail giant Coupang affects more than half of the country’s population. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/10/ceo-of-south-korean-retail-giant-coupang-resigns-after-massive-data-breach/
-
Russia’s flagship airline hacked through little-known tech vendor, according to new report
The breach, which was claimed by the pro-Ukrainian hacker collective Silent Crow and the allied Belarusian Cyber-Partisans, paralyzed Aeroflot’s operations, grounding more than a hundred flights. First seen on therecord.media Jump to article: therecord.media/russia-flagship-airline-hacked-through-little-known-vendor
-
Google Chrome’s New AI Security Aims to Stop Hackers Cold
Google is also backing these measures with a $20,000 bounty for researchers who can demonstrate successful breaches of the new security boundaries. The post Google Chrome’s New AI Security Aims to Stop Hackers Cold appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-google-chrome-ai-security/
-
Exploitation Efforts Against Critical React2Shell Flaw Accelerate
The exploitation efforts by China-nexus groups and other bad actors against the critical and easily abused React2Shell flaw in the popular React and Next.js software accelerated over the weekend, with threats ranging from stolen credentials and initial access to downloaders, crypto-mining, and the NoodleRat backdoor being executed. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/12/exploitation-efforts-against-critical-react2shell-flaw-accelerate/
-
Exploitation Efforts Against Critical React2Shell Flaw Accelerate
The exploitation efforts by China-nexus groups and other bad actors against the critical and easily abused React2Shell flaw in the popular React and Next.js software accelerated over the weekend, with threats ranging from stolen credentials and initial access to downloaders, crypto-mining, and the NoodleRat backdoor being executed. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/12/exploitation-efforts-against-critical-react2shell-flaw-accelerate/
-
Racks, sprawl and the myth of redundancy: Why your failover isn’t as safe as you think
Tags: access, automation, backup, breach, cloud, control, data, data-breach, defense, detection, dns, encryption, firmware, flaw, infrastructure, intelligence, Internet, metric, mobile, network, resilience, software, strategy, supply-chain, tool, update, vulnerability, zero-dayCloud complexity and policy traps: Networks, however, no longer stay confined to racks. They live in routing tables, BGP sessions, cloud control planes and software-defined overlays. Many organizations rush to multi-region cloud setups, believing geographic distance alone guarantees resilience. It does not. Last year, I oversaw a global e-commerce platform with active-passive failover across two…
-
Racks, sprawl and the myth of redundancy: Why your failover isn’t as safe as you think
Tags: access, automation, backup, breach, cloud, control, data, data-breach, defense, detection, dns, encryption, firmware, flaw, infrastructure, intelligence, Internet, metric, mobile, network, resilience, software, strategy, supply-chain, tool, update, vulnerability, zero-dayCloud complexity and policy traps: Networks, however, no longer stay confined to racks. They live in routing tables, BGP sessions, cloud control planes and software-defined overlays. Many organizations rush to multi-region cloud setups, believing geographic distance alone guarantees resilience. It does not. Last year, I oversaw a global e-commerce platform with active-passive failover across two…
-
Spain arrests teen who stole 64 million personal data records
The National Police in Spain have arrested a suspected 19-year-old hacker in Barcelona, for allegedly stealing and attempting to sell 64 million records obtained from breaches at nine companies. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/spain-arrests-teen-who-stole-64-million-personal-data-records/
-
Seoul cyber investigators seize data, devices from ‘South Korea’s Amazon’ following data breach
Cyber investigators from the Seoul Metropolitan Police Agency seized devices and data from one of the country’s largest tech firms to find evidence uncovering how the breach took place. First seen on therecord.media Jump to article: therecord.media/seoul-cyber-investigators-seize-data-korea-tech-giant
-
Hackers Using FLIPPER Devices to Breach IT Systems Arrested by Authorities
Polish authorities have arrested three Ukrainian citizens after discovering sophisticated hacking equipment, including FLIPPER devices, during a routine traffic stop in Warsaw. The discovery marks a significant operation targeting cybercriminals allegedly traveling across Europe and conducting cyberattacks against critical infrastructure. Officers from Warsaw’s ÅšródmieÅ›cie district stopped a Toyota sedan on Senatorska Street. They found three…

