Tag: breach
-
Betterment data breach might be worse than we thought
This breach now appears far more serious. The leaked data includes rich personal and financial details that phishers could use. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/betterment-data-breach-might-be-worse-than-we-thought/
-
Data breach at fintech giant Figure affects close to a million customers
The Figure data breach allowed hackers to steal customer names, dates of birth, physical addresses, phone numbers, and email addresses. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/18/data-breach-at-fintech-giant-figure-affects-close-to-a-million-customers/
-
Substack Breach May Have Leaked Nearly 700,000 User Details Online
Substack says hackers accessed user emails, phone numbers, and internal metadata in October 2025, with a database of 697,313 records later posted online. The post Substack Breach May Have Leaked Nearly 700,000 User Details Online appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-substack-data-breach-user-accounts-leaked/
-
Identity and supply chain need more attention, risk intelligence firm says
Roughly a third of attacks now use stolen credentials, according to the company’s latest report. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/identity-supply-chain-dataminr-report/812447/
-
Threat groups using AI to speed up and scale cyberattacks
A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/threat-groups-ai-speed-scale-cyberattacks/812439/
-
Telegram channels expose rapid weaponization of SmarterMail flaws
Underground Telegram channels shared SmarterMail exploit PoCs and stolen admin credentials within days of disclosure. Flare explains how monitoring these communities reveals rapid weaponization of CVE-2026-24423 and CVE-2026-23760 tied to ransomware activity. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/telegram-channels-expose-rapid-weaponization-of-smartermail-flaws/
-
Data breach at fintech firm Figure affects nearly 1 million accounts
Hackers have stolen the personal and contact information of nearly 1 million accounts after breaching the systems of Figure Technology Solutions, a self-described blockchain-native financial technology company. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/
-
One stolen credential is all it takes to compromise everything
Attackers often gain access through routine workflows like email logins, browser sessions, and SaaS integrations. A single stolen credential can give them a quick path to move … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/18/identity-based-cyberattacks-compromise/
-
Security Metrics That Actually Predict a Breach
Identity drift, stale access paths, alert fatigue, and risky change patterns are the security metrics most likely to predict a breach. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/security-metrics-that-actually-predict-a-breach/
-
Kettering Health Notifying Patients of Interlock Breach
Cybercrime Group First Listed Ohio Health System as a Data Theft Victim Last June. Ohio-based Kettering Health is notifying current and former patients and affiliates that their personal, health and financial information was potentially compromised in a May 2025 ransomware attack and data theft incident claimed by cybercriminal gang Interlock. First seen on govinfosecurity.com Jump…
-
Canada Goose says leaked customer transaction data did not come from company systems
On Saturday afternoon, the ShinyHunters cybercriminal organization claimed to have stolen more than 600,000 records from the company containing personal information. First seen on therecord.media Jump to article: therecord.media/canada-goose-says-leaked-customer-data-was-not-from-company
-
Elon Musk’s AI Bot Snared in New Irish, European Probes
GrokAI Non-Consensual Sexual Imagery Raises Official Hackles. European regulatory pressure on Elon Musk’s X social media network intensified this week with new probes into potential breaches of privacy roles by Grok AI chatbot. X claims to have stopped Grok from outputting the offending images, but apparently the chatbot still generates them. First seen on govinfosecurity.com…
-
Data Minimization Is Still an Underrated Security Control
Why Reducing Data Volume Matters More Than Ever for SOCs and CISOs Data minimization is often perceived as a constraint on innovation. In reality, it is the ultimate enabler of resilience. It reduces the impact of breaches, weakens ransomware leverage, improves SOC efficiency and secures the AI frontier. First seen on govinfosecurity.com Jump to article:…
-
Top 5 Learnings from the 2026 Identity Breach Report
The 2026 Identity Breach Report marks a definitive shift in the cyber threat landscape, transitioning from simple data collection to what can only be described as the Industrialization of Identity. As adversaries adopt machine-scale automation, they are no longer just “leaking” data”, they are running high-velocity pipelines designed to weaponize human identities at an unprecedented scale.…
-
Previously Compromised Data: Why Credential Exposure Never Expires
For years, organizations have framed breach risk as something finite. A breach occurs, notifications are sent, passwords are reset, and the incident is eventually considered closed. On paper, that model suggests progress. In reality, it creates a dangerous false sense of closure. Recent breach analysis shows fewer massive breach notifications reaching consumers, yet credential-based attacks,……
-
South Korea slaps $25M fine on Dior, Louis Vuitton, Tiffany over Salesforce breach
South Korea fined Dior, Louis Vuitton, and Tiffany $25M after hackers breached their Salesforce systems, exposing customer data. South Korea’s Personal Information Protection Commission fined luxury brands including Dior, Louis Vuitton, and Tiffany & Co. a total of 36 billion Korean won ($25 million) after hackers compromised their Salesforce systems. The attack, linked to Scattered…
-
Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
Cloud attacks move fast, faster than most incident response teams.In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In the cloud, infrastructure is short-lived. A compromised instance can disappear in minutes. Identities rotate. Logs expire. Evidence can vanish before analysis even begins.Cloud forensics is fundamentally First…
-
Unit 42: Nearly two-thirds of breaches now start with identity abuse
Palo Alto Network’s incident response firm said identity-based attacks are exploding as poor security controls stretch across a widening mosaic of integrated tools and systems. First seen on cyberscoop.com Jump to article: cyberscoop.com/attackers-abuse-identity-unit42-palo-alto-networks-incident-response-report/
-
Poland arrests suspect linked to Phobos ransomware operation
Polish police have detained a 47-year-old man suspected of ties to the Phobos ransomware group and seized computers and mobile phones containing stolen credentials, credit card numbers, and server access data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/poland-arrests-suspect-linked-to-phobos-ransomware-operation/
-
New Sophisticated ‘Carding-as-a-Service’ Marketplaces Fuel Surge in Credit Card Fraud
Credit card fraud has matured into a service-based criminal economy where stolen cards, malware, and support are bundled and sold like commercial products. Underground “dump shops” such as Findsome, UltimateShop, and Brian’s Club now operate as full-fledged carding-as-a-service (CaaS) marketplaces, mirroring legitimate e”‘commerce platforms in usability, scale, and customer focus. At the core of this ecosystem is…
-
Hackers sell stolen Eurail traveler information on dark web
Eurail B.V. revealed that traveler data were stolen in a recent security breach, and are now being sold on the dark web. Eurail B.V. confirmed that the traveler data stolen in a breach earlier this year is now being offered for sale on the dark web. The company disclosed the development as part of its…
-
Your encrypted data is already being stolen
Quantum computing is often treated as a distant, theoretical cybersecurity issue. According to Ronit Ghose, Global Head, Future of Finance of Citi Institute, that mindset is … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/17/ronit-ghose-citi-institute-quantum-risk-financial-services/
-
Your encrypted data is already being stolen
Quantum computing is often treated as a distant, theoretical cybersecurity issue. According to Ronit Ghose, Global Head, Future of Finance of Citi Institute, that mindset is … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/17/ronit-ghose-citi-institute-quantum-risk-financial-services/
-
How Red Teaming Reduces Breach Risk?
Red Teaming (also called adversary simulation) is a way to test how strong an organization’s security really is. In this, trained and authorized security experts act like real hackers and try to break into systems, just like attackers would in the real world. NIST defines a Red Team as a group that is allowed to……
-
CISO Julie Chatman offers insights for you to take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
CISO Julie Chatman offers insights for you to take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
Feds Launch Portal to Report Substance Use Disorder Breaches
New HHS Enforcement Program Focuses on Patient Confidentiality, Aligning With HIPAA. The U.S. Department of Health and Human Services has launched a new breach reporting website and guidance materials to support its duties of enforcing compliance mandates that went into effect Monday to better align the confidentiality of substance use disorder records with the HIPAA…

