Tag: data
-
Hack at Dutch gym chain Basic-Fit exposes customer data in several EU countries
Unknown hackers breached the systems of European gym chain Basic-Fit and downloaded personal data belonging to members across several countries, the company has announced. First seen on therecord.media Jump to article: therecord.media/dutch-gym-chain-basic-fit-hit-by-hackers
-
Gym giant Basic-Fit confirms data on a million members stolen in cyberattack
Names, addresses, dates of birth, and bank details accessed, though not passwords First seen on theregister.com Jump to article: www.theregister.com/2026/04/13/basicfit_breach/
-
Rockstar Games gets a taste of grand theft data amid ShinyHunters threat of ‘Pay or leak’
Gang claims it accessed Snowflake metrics via third-party tool First seen on theregister.com Jump to article: www.theregister.com/2026/04/13/shinyhunters_rockstar_breach/
-
Citizen Lab: Webloc tracked 500M devices for global law enforcement
Citizen Lab reported that law enforcement used the surveillance tool Webloc to track up to 500M devices via ad data globally. A report by Citizen Lab revealed that law enforcement agencies in the U.S., Hungary, and El Salvador used a surveillance tool called Webloc to track devices via advertising data, potentially affecting up to 500…
-
Basic-Fit Suffers Data Breach Affecting Millions Across Multiple Nations
European fitness operator Basic-Fit has confirmed a significant data breach affecting approximately one million members across its network. The incident heavily impacted users in the Netherlands, which accounted for 200,000 of the compromised accounts. This breach underscores the persistent targeting of consumer lifestyle platforms by threat actors seeking massive datasets. The cyber incident targeted the…
-
Booking.com warns customers of hack that exposed their data
Undisclosed number of names and contact and reservation details accessed in latest cybercrime attempt<ul><li><a href=”https://www.theguardian.com/business/live/2026/apr/13/oil-price-barrel-trump-naval-blockade-strait-of-hormuz-stock-markets-ftse-latest-news-updates”>Business live latest updates</li></ul>The accommodation reservation website Booking.com has suffered a data breach with “unauthorised parties” gaining access to customers’ details.The platform said it “noticed some suspicious activity involving unauthorised third parties being able to access some of our guests’ booking…
-
Iran-linked group Handala claims to have breached three major UAE organizations
Iran-linked group Handala claims to have breached three major UAE organizations, Dubai Courts, Dubai Land Department, and Dubai Roads & Transport Authority The group Handala claimed a major cyberattack against the UAE, targeting Dubai Courts Department, Dubai Land Department, and Dubai Roads and Transport Authority. They alleged destroying 6 petabytes of data and stealing 149 TB…
-
CISOs tackle the AI visibility gap
Tags: ai, business, ciso, control, data, framework, governance, leak, risk, service, software, strategy, technology, tool, vulnerabilityGaining visibility: CISOs say they’re aware of the consequences of having blind spots, with data leaks and problematic AI outputs being common ones.They’re now working to gain the needed visibility to prevent such issues, says Aaron Momin, CISO and chief risk officer for Synechron, a digital consulting and technology services firm.”The business has a mandate…
-
OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident
OpenAI revealed a GitHub Actions workflow used to sign its macOS apps, which downloaded the malicious Axios library on March 31, but noted that no user data or internal system was compromised.”Out of an abundance of caution, we are taking steps to protect the process that certifies our macOS applications are legitimate OpenAI apps,” OpenAI…
-
Fixing vulnerability data quality requires fixing the architecture first
In this Help Net Security interview, Art Manion, Deputy Director at Tharros, examines why vulnerability data across repositories stays inconsistent and hard to trust. The … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/13/art-manion-tharros-vulnerability-data-quality/
-
MITRE releases a shared fraud-cyber framework built from real attack data
Financial fraud losses in the United States reached $16.6 billion in 2024, up from $4.2 billion in 2020. Behind those numbers is a structural problem: the teams responsible … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/13/mitre-fight-fraud-framework-f3/
-
Google Brings EndEnd Encrypted Gmail to Android and iPhone
Google has officially expanded Gmail’s end-to-end encryption (E2EE) feature to Android and iOS devices, empowering organizations and users to protect the confidentiality of email content directly from their mobile devices. This enhancement is part of Gmail’s client-side encryption (CSE) program, enabling stricter compliance controls and preserving data sovereignty across regulated industries. With this new rollout, Gmail users can…
-
What is WUE? A Guide to Data Center Water Efficiency
Water Usage Effectiveness (WUE) measures how efficiently a data center uses water in relation to its IT power consumption. This guide explains how to calculate WUE, its importance for sustainability, and proven strategies to reduce water waste and operational costs in modern data centers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/what-is-wue-a-guide-to-data-center-water-efficiency/
-
Is investing in advanced NHI systems justified
How Can Organizations Justify Investing in Advanced NHI Systems? Is your organization effectively managing Non-Human Identities (NHIs) to safeguard your cloud environments? With a data management expert specializing in cybersecurity, understanding the strategic importance of NHIs is crucial for protecting your digital assets. Let’s delve into why investing in advanced NHI systems is justified for……
-
FBI Recovers Deleted Signal Messages Through iPhone Notifications
Signal messages may persist in iPhone notification data, enabling FBI access even after deletion, a court case reveals. First seen on hackread.com Jump to article: hackread.com/fbi-recover-deleted-signal-messages-iphone-notifications/
-
How the Internet Broke Everyone’s Bullshit Detectors
From AI-generated images to restricted satellite data, the systems used to verify what’s real online are struggling to keep up. First seen on wired.com Jump to article: www.wired.com/story/how-the-internet-broke-everyones-bullshit-detectors/
-
Hungarian government creds left in the safe hands of ‘FrankLampard’
Nearly 800 state logins surfaced in breach data, including defense and NATO-linked accounts First seen on theregister.com Jump to article: www.theregister.com/2026/04/11/hungary_government_logins_breach/
-
Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc.The tool was developed by Israeli company Cobwebs Technologies and is now sold by its successor Penlink after the two firms merged in July…
-
South Korea introduces universal basic mobile data access
Everyone gets unlimited 400 Kbps access, oldies get expanded caps, and leaky telcos get their social license back First seen on theregister.com Jump to article: www.theregister.com/2026/04/10/south_korea_data_access_universal/
-
ShinyHunters Claims Rockstar Games Snowflake Breach via Anodot
ShinyHunters claims access to Rockstar Games Snowflake data via Anodot breach, threatening a data leak on April 14 if ransom demands are not met. First seen on hackread.com Jump to article: hackread.com/shinyhunters-rockstar-games-snowflake-breach-anodot/
-
Breaking the Patch Sound Barrier: Your Vulnerability Remediation Will Not Keep Up With AI Exploit”¦
Breaking the Patch Sound Barrier: Your Vulnerability Remediation Will Not Keep Up With AI Exploit Speed. So? Many years ago while at Gartner, I wrote a blog post where I defined the concept of the “Patch Sound Barrier.” (original via Archive if you don’t believe that I was that smart back in 2013 🙂) This was an…
-
Are businesses free to choose their preferred Agentic AI models
Are Organizations Truly Free to Choose Agentic AI Models? What is the ultimate freedom when it comes to selecting Agentic AI models for your business? In cybersecurity and data management, especially concerning Non-Human Identities (NHIs), the ability to choose from a diverse range of Agentic AI models has become increasingly vital. These models, which emulate……
-
Are businesses free to choose their preferred Agentic AI models
Are Organizations Truly Free to Choose Agentic AI Models? What is the ultimate freedom when it comes to selecting Agentic AI models for your business? In cybersecurity and data management, especially concerning Non-Human Identities (NHIs), the ability to choose from a diverse range of Agentic AI models has become increasingly vital. These models, which emulate……
-
RaaS Gang Anubis Claims Signature Healthcare Data Theft
Attackers Allege They Stole 2TBs of Patient Data, But Didn’t Encrypt IT System. Ransomware group Anubis claimed it stole 2 terabytes of patient data in an attack this week on Signature Healthcare. The Massachusetts health system is still diverting ambulance patients from its hospital and using paper charts while it continues to recover. First seen…
-
Anthropic Claude Mythos Will Break Vulnerability Management
Tags: access, ai, attack, control, cyber, cybersecurity, data, exploit, metric, risk, software, tool, update, vulnerability, vulnerability-managementAnthropic’s latest AI Model, Claude Mythos, will break the cybersecurity vulnerability management operational models. Mythos is so good at discovering and building viable exploits it is currently being rolled-out in a controlled manner under “Project Glasswing”. Those cybersecurity companies who have early access are attesting to the blazing speed and accuracy of the model…
-
Anthropic Claude Mythos Will Break Vulnerability Management
Tags: access, ai, attack, control, cyber, cybersecurity, data, exploit, metric, risk, software, tool, update, vulnerability, vulnerability-managementAnthropic’s latest AI Model, Claude Mythos, will break the cybersecurity vulnerability management operational models. Mythos is so good at discovering and building viable exploits it is currently being rolled-out in a controlled manner under “Project Glasswing”. Those cybersecurity companies who have early access are attesting to the blazing speed and accuracy of the model…
-
Old Docker authorization bypass pops up despite previous patch
Tags: access, api, botnet, cloud, container, credentials, data, docker, exploit, flaw, monitoring, tool, update, vulnerabilityNo one checked oversized requests: While the previous authorization bypass was triggered when request Content-Length was set to 0, no one checked at the time what would happen in the same function if the request exceeded a certain size.”When an API request body exceeds 1MB, Docker’s middleware silently drops the body before your authorization plugin…

