Tag: breach
-
DraftKings hacker sentenced to prison, ordered to pay $1.4 Million
A DraftKings hacker got 30 months in prison for selling stolen credentials and must pay over $1.4 million in fines and restitution. Kamerin Stokes, 23, from Memphis (aka TheMFNPlug), received a 30-month prison sentence for his role in a 2022 credential stuffing attack against DraftKings. He continued selling stolen login data online even after pleading…
-
DraftKings hacker sentenced to prison, ordered to pay $1.4 Million
A DraftKings hacker got 30 months in prison for selling stolen credentials and must pay over $1.4 million in fines and restitution. Kamerin Stokes, 23, from Memphis (aka TheMFNPlug), received a 30-month prison sentence for his role in a 2022 credential stuffing attack against DraftKings. He continued selling stolen login data online even after pleading…
-
Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shops
In cybercrime markets, trust isn’t assumed, it’s verified. Flare reveals how underground guides teach actors to evaluate carding shops based on data quality, reputation, and survivability. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/inside-an-underground-guide-how-threat-actors-vet-stolen-credit-card-shops/
-
Breach of Confidence 17 April 2026
I’ve spent the week watching people earnestly debate whether AI will replace security analysts. The real threat isn’t AI taking your job. It’s having to sit through another webinar about it. France Wants a Divorce France has announced plans to reduce dependency on US tech, which apparently includes ditching Windows. Bold move. The problem with……
-
$15M Grinex Hack Forces Trading Halt After Major Crypto Wallet Breach
The Grinex cyberattack has once again drawn attention to the vulnerabilities facing the global Crypto exchange ecosystem. In a cyberattack on Grinex, the Kyrgyzstan-based platform was forced to suspend all trading operations after hackers executed a large-scale wallet breach, stealing more than $15 million in USDT. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/grinex-cyberattack-15m-wallet-breach/
-
Article 12 and the Logging Mandate: What the EU AI Act Actually Requires FireTail Blog
Tags: access, ai, breach, ciso, cloud, compliance, control, data, data-breach, finance, GDPR, grc, healthcare, infrastructure, insurance, jobs, metric, monitoring, regulation, risk, saas, service, toolApr 16, 2026 – Lina Romero – When GDPR arrived, the organisations that had mistaken documentation for capability were the ones that struggled the most. They had policies about data retention but no technical controls enforcing those policies. They had breach notification procedures but no systems capable of detecting a breach in time to use…
-
“I’m Just Scared”: Teen Hacker Jailed After Massive U.S. School Data Breach
Hacker Matthew Lane, now 20, played a central role in the PowerSchool data breach, one of the largest cyberattacks in U.S. education history. As he headed to federal prison in Connecticut, he admitted fear and regret, writing, “It’s extremely sad, and I’m just scared.” First seen on thecyberexpress.com Jump to article: thecyberexpress.com/hacker-matthew-lane-powerschool-data-breach/
-
“I’m Just Scared”: Teen Hacker Jailed After Massive U.S. School Data Breach
Hacker Matthew Lane, now 20, played a central role in the PowerSchool data breach, one of the largest cyberattacks in U.S. education history. As he headed to federal prison in Connecticut, he admitted fear and regret, writing, “It’s extremely sad, and I’m just scared.” First seen on thecyberexpress.com Jump to article: thecyberexpress.com/hacker-matthew-lane-powerschool-data-breach/
-
Cookeville Regional Medical Center hospital data breach impacts 337,917 people
A ransomware attack on Cookeville Regional Medical Center hospital (Tennessee) exposed data of 337,000 people after hackers stole 500GB of sensitive information from its systems. A ransomware attack on Cookeville Regional Medical Center (CRMC) in Tennessee led to a major data breach affecting about 337,000 people. The attack, carried out by the Rhysida group, involved…
-
Breach Roundup: Mr. Raccoon Wants Your Password
Tags: breach, china, data, data-breach, flaw, fortinet, healthcare, leak, password, phishing, ransomware, scamAlso, Eurail Breach, ChipSoft Hospital Disruptions, W3LL Phishing Takedown. This week, a Raccoon-linked actor hit help desks, Eurail exposed 308K users, Fortinet patched critical flaws, Pushpaganda scams, major data leaks hit healthcare and China, ransomware and phishing ops surged, and multiple breaches impacted firms and hospitals. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/breach-roundup-mr-raccoon-wants-your-password-a-31450
-
McGraw-Hill Confirms Data Exposure Tied to Salesforce Issue
McGraw-Hill confirms limited data exposure, disputing claims of 45M stolen records. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/mcgraw-hill-confirms-data-exposure-tied-to-salesforce-issue/
-
McGraw-Hill Confirms Data Exposure Tied to Salesforce Issue
McGraw-Hill confirms limited data exposure, disputing claims of 45M stolen records. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/mcgraw-hill-confirms-data-exposure-tied-to-salesforce-issue/
-
McGraw-Hill Confirms Data Exposure Tied to Salesforce Issue
McGraw-Hill confirms limited data exposure, disputing claims of 45M stolen records. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/mcgraw-hill-confirms-data-exposure-tied-to-salesforce-issue/
-
McGraw-Hill Confirms Data Exposure Tied to Salesforce Issue
McGraw-Hill confirms limited data exposure, disputing claims of 45M stolen records. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/mcgraw-hill-confirms-data-exposure-tied-to-salesforce-issue/
-
Comcast’s $117.5M Breach Settlement: Up to 30M People May Qualify
Comcast customers affected by the 2023 breach may qualify for cash, reimbursement, and identity protection under a proposed $117.5 million settlement. The post Comcast’s $117.5M Breach Settlement: Up to 30M People May Qualify appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-comcast-117-5m-settlement-30m-data-breach/
-
Data breach at edtech giant McGraw Hill affects 13.5 million accounts
The ShinyHunters extortion group has leaked data from 13.5 million McGraw Hill user accounts, stolen after breaching the company’s Salesforce environment earlier this month. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/data-breach-at-edtech-giant-mcgraw-hill-affects-135-million-accounts/
-
6-Year Ransomware Campaign Targets Turkish Homes & SMBs
While enterprises breaches make more headlines, smaller incidents tend to be under-reported, if at all, allowing campaigns to last longer with less disruption. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/6-year-ransomware-campaign-turkish-homes-smbs
-
7 biggest healthcare security threats
Tags: access, ai, api, attack, breach, business, cloud, control, credentials, cyber, cyberattack, cybersecurity, dark-web, data, data-breach, email, endpoint, google, government, hacking, healthcare, HIPAA, infrastructure, injection, insurance, Internet, phishing, risk, security-incident, service, software, spam, sql, threat, tool, vulnerabilityCloud vulnerabilities and misconfigurations: Many healthcare organizations have adopted cloud services as part of broader digital transformation initiatives. As a result, patient health information (PHI) and other sensitive data is increasingly being hosted in vendor cloud environments.The trend has broadened attack surface at healthcare organizations, says Anthony James, vice president of products at Infoblox, especially…
-
7 biggest healthcare security threats
Tags: access, ai, api, attack, breach, business, cloud, control, credentials, cyber, cyberattack, cybersecurity, dark-web, data, data-breach, email, endpoint, google, government, hacking, healthcare, HIPAA, infrastructure, injection, insurance, Internet, phishing, risk, security-incident, service, software, spam, sql, threat, tool, vulnerabilityCloud vulnerabilities and misconfigurations: Many healthcare organizations have adopted cloud services as part of broader digital transformation initiatives. As a result, patient health information (PHI) and other sensitive data is increasingly being hosted in vendor cloud environments.The trend has broadened attack surface at healthcare organizations, says Anthony James, vice president of products at Infoblox, especially…
-
Ghost breaches: How AI-mediated narratives have become a new threat vector
Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. First seen on cyberscoop.com Jump to article: cyberscoop.com/ai-generated-breach-narratives-ghost-threat-vector-op-ed/
-
“I’m Just Scared”: Teen Hacker Jailed After Massive U.S. School Data Breach
Hacker Matthew Lane, now 20, played a central role in the PowerSchool data breach, one of the largest cyberattacks in U.S. education history. As he headed to federal prison in Connecticut, he admitted fear and regret, writing, “It’s extremely sad, and I’m just scared.” First seen on thecyberexpress.com Jump to article: thecyberexpress.com/hacker-matthew-lane-powerschool-data-breach/
-
What makes Agentic AI a smart choice for data security?
How Can Non-Human Identities Revolutionize Cloud Security? Can the effective management of Non-Human Identities (NHIs) transform cloud security? When organizations increasingly pivot towards cloud infrastructures, safeguarding digital environments has become a pivotal concern across industries. With data breaches making headlines globally, it is imperative for businesses to adopt comprehensive cybersecurity strategies that shield every corner……
-
Crypto-exchange Kraken extorted by hackers after insider breach
The Kraken cryptocurrency exchange announced that a cybercrime group is trying to extort the company by threatening to release videos showing internal systems that host client data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/crypto-exchange-kraken-extorted-by-hackers-after-insider-breach/
-
5 trends defining the future of AI-powered cybersecurity
Tags: ai, automation, backup, breach, business, cloud, compliance, cyber, cybersecurity, data, defense, detection, endpoint, framework, government, metric, monitoring, msp, regulation, resilience, threatSee how AI is altering the landscape in the new N-able and Futurum report, Cybersecurity in the Age of AI: Moving from Fragile to Resilient. Get key insights on building a modern framework for business resilience. 2. From perimeter security to continuous cyber resilience: The “castle and moat” approach is obsolete. In a world of…
-
McGraw-Hill confirms data breach following extortion threat
Education company McGraw-Hill has confirmed in a statement to BleepingComputer that hackers exploited a Salesforce misconfiguration and accessed its internal data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/mcgraw-hill-confirms-data-breach-following-extortion-threat/
-
Claude Mythos Changed Everything. Your APIs Are the First Target.
Tags: access, ai, api, attack, breach, ceo, crowdstrike, cyber, cybersecurity, data, endpoint, exploit, finance, flaw, infrastructure, threat, tool, update, vulnerability, zero-dayAnthropic just released Claude Mythos Preview. They did not make it publicly available. That decision alone should tell you everything you need to know about what this model can do. During internal testing, Mythos autonomously discovered and exploited zero-day vulnerabilities across every major operating system and web browser. It found a 27-year-old bug in OpenBSD.…
-
US, UK and Canada disrupt $45M crypto theft in Operation Atlantic
US, UK and Canada ran Operation Atlantic, uncovering $45M in crypto theft and freezing $12M to return to victims. An international law enforcement operation from the US, UK and Canada, codenamed Operation Atlantic, has targeted large-scale cryptocurrency theft schemes. Authorities identified more than $45 million in stolen digital assets and successfully froze around $12 million.…
-
5 Ways Zero Trust Maximizes Identity Security
Stolen credentials remain a top breach vector, often leading to unchecked privilege escalation. Specops explains how identity-first Zero Trust limits access, enforces device trust, and blocks lateral movement. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/5-ways-zero-trust-maximizes-identity-security/

