Tag: data-breach
-
Ignoring DPDP Compliance? Here’s the Risk to Your Organization
In boardroom discussions, data breaches are typically evaluated through the lens of financial impact, regulatory exposure, and operational disruption. While these factors are critical, they often overshadow a more fundamental concern: the consumer. Every piece of personal data collected by an organization represents a relationship built on trust. When that data is mishandled, exposed, or……
-
Ignoring DPDP Compliance? Here’s the Risk to Your Organization
In boardroom discussions, data breaches are typically evaluated through the lens of financial impact, regulatory exposure, and operational disruption. While these factors are critical, they often overshadow a more fundamental concern: the consumer. Every piece of personal data collected by an organization represents a relationship built on trust. When that data is mishandled, exposed, or……
-
Datenleck bei Upwork-Konkurrent Fiverr: Sensible Dokumente von Freelancern bei Google abrufbar
First seen on t3n.de Jump to article: t3n.de/news/fiverr-datenleck-freelancer-dokumente-google-abrufbar-1738385/
-
Booking.com Breach Shows Exactly How Smishing Attacks Get Made
Booking.com’s breach exposed names, phone numbers, and booking details now being used in targeted WhatsApp phishing. Constella explains how the PII-to-smishing pipeline works and what to do about it. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/booking-com-breach-shows-exactly-how-smishing-attacks-get-made/
-
Clothing Retailer Patches Website Flaw Exposing Customer Data
A clothing retailer patched a website flaw that exposed customer data via order links, highlighting risks associated with predictable URL structures. The post Clothing Retailer Patches Website Flaw Exposing Customer Data appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-clothing-retailer-data-exposure-order-link-flaw/
-
Opsec oopsie: Dutch navy frigate location outed by mailing it a Bluetooth tracker
Tags: data-breachOr, how public information and a Euro5 tracker exposed an avoidable opsec lapse First seen on theregister.com Jump to article: www.theregister.com/2026/04/17/dutch_navy_frigate_tracked/
-
Opsec oopsie: Dutch navy frigate location outed by mailing it a Bluetooth tracker
Tags: data-breachOr, how public information and a Euro5 tracker exposed an avoidable opsec lapse First seen on theregister.com Jump to article: www.theregister.com/2026/04/17/dutch_navy_frigate_tracked/
-
Operation PowerOFF: 53 DDoS domains seized and 3 Million criminal accounts uncovered
Operation PowerOFF shut down 53 DDoS-for-hire domains, arrested four suspects, and exposed data on over 3 million criminal user accounts. Operation PowerOFF is an international law enforcement action that dismantled 53 domains linked to DDoS-for-hire services used by over 75,000 cybercriminals. Authorities arrested four suspects, seized infrastructure, and gained access to databases containing more than…
-
Exposed LLM Infrastructure: How Attackers Find and Exploit Misconfigured AI Deployments
Exposed LLM servers are being actively scanned and exploited. Learn how attackers find misconfigured AI infrastructure and how to secure it fast. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/exposed-llm-infrastructure-how-attackers-find-and-exploit-misconfigured-ai-deployments/
-
SEO Poisoning Attack Uses Microsoft Binary to Install RMM Tool
New research has exposed a search engine poisoning campaign that delivers a trojanized TestDisk installer, abuses a Microsoft-signed binary for DLL sideloading, and silently deploys the ScreenConnect remote monitoring and management (RMM) client for hands-on keyboard access. The rogue domain copies the branding of the real open-source data recovery tool, presenting itself as “The Ultimate…
-
Europas Datenleck-Krise: Deutschland ist wieder Hauptziel für Cybererpressung in Europa
Die aktuelle Lage markiert einen Wendepunkt. Datenlecks sind kein Randphänomen mehr, sondern ein strukturelles Risiko für Wirtschaft und Gesellschaft. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/europas-datenleck-krise-deutschland-ist-wieder-hauptziel-fuer-cybererpressung-in-europa/a44683/
-
Recently leaked Windows zero-days now exploited in attacks
Threat actors are exploiting three recently disclosed Windows security vulnerabilities in attacks aimed at gaining SYSTEM or elevated administrator permissions. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/recently-leaked-windows-zero-days-now-exploited-in-attacks/
-
Censys Warns 6 Million Public-Facing FTP Servers Are Still Exposed in 2026
A new security brief from internet intelligence firm Censys reveals that the 55 year old File Transfer Protocol continues to run on nearly 6 million internet facing hosts. As of April 2026, the dominant story of FTP exposure is not purpose built file transfer infrastructure, but rather a dangerous accumulation of platform defaults. Censys researchers…
-
Article 12 and the Logging Mandate: What the EU AI Act Actually Requires FireTail Blog
Tags: access, ai, breach, ciso, cloud, compliance, control, data, data-breach, finance, GDPR, grc, healthcare, infrastructure, insurance, jobs, metric, monitoring, regulation, risk, saas, service, toolApr 16, 2026 – Lina Romero – When GDPR arrived, the organisations that had mistaken documentation for capability were the ones that struggled the most. They had policies about data retention but no technical controls enforcing those policies. They had breach notification procedures but no systems capable of detecting a breach in time to use…
-
Smashing Security podcast #463: This AI company leaked its own code. It’s also built something terrifying
A hacking group claims to have broken into the flood defence system protecting Venice’s Piazza San Marco – and is offering to sell access to whoever wants it. The asking price? A frankly insulting $600. First seen on grahamcluley.com Jump to article: grahamcluley.com/smashing-security-podcast-463/
-
Fashion retailer Express left customers’ personal data and order details exposed to the internet
Retail giant Express was publicly spilling customer information to the open web. The bug is now fixed after TechCrunch alerted Express, but the company would not say if it plans to notify customers. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/16/fashion-retailer-express-left-customers-personal-data-and-order-details-exposed-to-the-internet/
-
“I’m Just Scared”: Teen Hacker Jailed After Massive U.S. School Data Breach
Hacker Matthew Lane, now 20, played a central role in the PowerSchool data breach, one of the largest cyberattacks in U.S. education history. As he headed to federal prison in Connecticut, he admitted fear and regret, writing, “It’s extremely sad, and I’m just scared.” First seen on thecyberexpress.com Jump to article: thecyberexpress.com/hacker-matthew-lane-powerschool-data-breach/
-
“I’m Just Scared”: Teen Hacker Jailed After Massive U.S. School Data Breach
Hacker Matthew Lane, now 20, played a central role in the PowerSchool data breach, one of the largest cyberattacks in U.S. education history. As he headed to federal prison in Connecticut, he admitted fear and regret, writing, “It’s extremely sad, and I’m just scared.” First seen on thecyberexpress.com Jump to article: thecyberexpress.com/hacker-matthew-lane-powerschool-data-breach/
-
“I’m Just Scared”: Teen Hacker Jailed After Massive U.S. School Data Breach
Hacker Matthew Lane, now 20, played a central role in the PowerSchool data breach, one of the largest cyberattacks in U.S. education history. As he headed to federal prison in Connecticut, he admitted fear and regret, writing, “It’s extremely sad, and I’m just scared.” First seen on thecyberexpress.com Jump to article: thecyberexpress.com/hacker-matthew-lane-powerschool-data-breach/
-
Textbook titan McGraw Hill on ransomware crew’s reading list after 13.5M records exposed
Publisher claims misconfigured Salesforce-hosted page leaked data First seen on theregister.com Jump to article: www.theregister.com/2026/04/16/mcgraw_hill_salesforce/
-
UK told its Big Tech habit is now a national security risk
Open Rights Group says years of reliance on US giants have left Britain exposed First seen on theregister.com Jump to article: www.theregister.com/2026/04/15/uk_big_tech_dependence/
-
UK told its Big Tech habit is now a national security risk
Open Rights Group says years of reliance on US giants have left Britain exposed First seen on theregister.com Jump to article: www.theregister.com/2026/04/15/uk_big_tech_dependence/
-
Critical nginx UI tool vulnerability opens web servers to full compromise
Tags: access, ai, api, attack, authentication, ceo, credentials, data-breach, endpoint, exploit, infrastructure, Internet, risk, service, software, threat, tool, update, vulnerability/mcp_message, was implemented without authentication, a weakness Pluto Security dubbed ‘MCPwn’.”This exposes 12 MCP tools, including config writes with automatic nginx reload, to any host on the network. One unauthenticated API call is all it takes to inject a config and take over nginx,” said Pluto Security.Leveraging MCPwn, an attacker would be able to intercept…
-
Cookeville Regional Medical Center hospital data breach impacts 337,917 people
A ransomware attack on Cookeville Regional Medical Center hospital (Tennessee) exposed data of 337,000 people after hackers stole 500GB of sensitive information from its systems. A ransomware attack on Cookeville Regional Medical Center (CRMC) in Tennessee led to a major data breach affecting about 337,000 people. The attack, carried out by the Rhysida group, involved…
-
Critical nginx UI tool vulnerability opens web servers to full compromise
Tags: access, ai, api, attack, authentication, ceo, credentials, data-breach, endpoint, exploit, infrastructure, Internet, risk, service, software, threat, tool, update, vulnerability/mcp_message, was implemented without authentication, a weakness Pluto Security dubbed ‘MCPwn’.”This exposes 12 MCP tools, including config writes with automatic nginx reload, to any host on the network. One unauthenticated API call is all it takes to inject a config and take over nginx,” said Pluto Security.Leveraging MCPwn, an attacker would be able to intercept…
-
Breach Roundup: Mr. Raccoon Wants Your Password
Tags: breach, china, data, data-breach, flaw, fortinet, healthcare, leak, password, phishing, ransomware, scamAlso, Eurail Breach, ChipSoft Hospital Disruptions, W3LL Phishing Takedown. This week, a Raccoon-linked actor hit help desks, Eurail exposed 308K users, Fortinet patched critical flaws, Pushpaganda scams, major data leaks hit healthcare and China, ransomware and phishing ops surged, and multiple breaches impacted firms and hospitals. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/breach-roundup-mr-raccoon-wants-your-password-a-31450
-
Critical nginx UI tool vulnerability opens web servers to full compromise
Tags: access, ai, api, attack, authentication, ceo, credentials, data-breach, endpoint, exploit, infrastructure, Internet, risk, service, software, threat, tool, update, vulnerability/mcp_message, was implemented without authentication, a weakness Pluto Security dubbed ‘MCPwn’.”This exposes 12 MCP tools, including config writes with automatic nginx reload, to any host on the network. One unauthenticated API call is all it takes to inject a config and take over nginx,” said Pluto Security.Leveraging MCPwn, an attacker would be able to intercept…
-
Danske Bank upgrade error exposed 20,000 customer addresses
Danish bank revealed details of a customer data leak last year which affected thousands of customers First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641711/Danske-Bank-upgrade-error-exposed-20000-customer-addresses
-
The deepfake dilemma: From financial fraud to reputational crisis
Tags: ai, authentication, business, ceo, communications, control, cyber, data-breach, deep-fake, exploit, finance, fraud, malicious, phone, resilience, risk, threat, toolDeepfakes as tools for financial fraud: Deepfakes have quickly become a powerful enabler of financial fraud. This is largely because most business communication channels, like video and voice calls, remain unauthenticated. A single convincing audio or video call, seemingly from a trusted executive, can bypass established controls in minutes. Employees in these scenarios often follow…

