Tag: data
-
Japanese sex toys maker Tenga discloses data breach
Sex toy maker Tenga says a hacker accessed an employee’s email account, potentially exposing customer names, emails, and order details. TENGA Co., Ltd. is a Tokyo-based Japanese sexual wellness and lifestyle company known for its innovative adult products. It employs roughly 125200 people worldwide across its Japan headquarters and international offices. Tenga operates in personal…
-
Japanese sex toys maker Tenga discloses data breach
Sex toy maker Tenga says a hacker accessed an employee’s email account, potentially exposing customer names, emails, and order details. TENGA Co., Ltd. is a Tokyo-based Japanese sexual wellness and lifestyle company known for its innovative adult products. It employs roughly 125200 people worldwide across its Japan headquarters and international offices. Tenga operates in personal…
-
Odido Breach Impacts Millions of Dutch Telco Users
Dutch telco Odido has revealed a major data breach impacting over six million customers First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/odido-breach-millions-dutch-telco/
-
Odido Breach Impacts Millions of Dutch Telco Users
Dutch telco Odido has revealed a major data breach impacting over six million customers First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/odido-breach-millions-dutch-telco/
-
ZeroDayRAT Exploit Targets Android iOS, Enabling Real-Time Surveillance and Massive Data Theft
A newly surfaced mobile spyware platform called ZeroDayRAT is rapidly gaining traction across underground Telegram channels. ZeroDayRAT is designed to give attackers complete remote control over both Android and iOS devices, supporting versions from Android 5 through 16 and iOS up to version 26, including the latest iPhone 17 Pro. The panel interface allows the operator to manage multiple infected devices worldwide as…
-
Canada Goose investigating as hackers leak 600K customer records
ShinyHunters, a well-known data extortion group, claims to have stolen more than 600,000 Canada Goose customer records containing personal and payment-related data. Canada Goose told BleepingComputer the dataset appears to relate to past customer transactions and that it has not found evidence of a breach of its own systems. First seen on bleepingcomputer.com Jump to…
-
Canada Goose investigating as hackers leak 600K customer records
ShinyHunters, a well-known data extortion group, claims to have stolen more than 600,000 Canada Goose customer records containing personal and payment-related data. Canada Goose told BleepingComputer the dataset appears to relate to past customer transactions and that it has not found evidence of a breach of its own systems. First seen on bleepingcomputer.com Jump to…
-
Canada Goose investigating as hackers leak 600K customer records
ShinyHunters, a well-known data extortion group, claims to have stolen more than 600,000 Canada Goose customer records containing personal and payment-related data. Canada Goose told BleepingComputer the dataset appears to relate to past customer transactions and that it has not found evidence of a breach of its own systems. First seen on bleepingcomputer.com Jump to…
-
How are NHIs ensuring protected data exchanges in financial services?
Are Machine Identities the Missing Link in Financial Services Security? What role do machine identities, often referred to as Non-Human Identities (NHIs), play in ensuring the robustness of protected data exchanges? Where digital transformation is both a boon and a challenge, machine identities have become pivotal for a seamless yet secure operation across various sectors,……
-
Can businesses truly trust Agentic AI with sensitive data handling?
How Can Non-Human Identities Shape Data Security? Have you ever wondered how organizations manage to keep their sensitive data secure in rising cybersecurity threats? With digital expanding rapidly, handling sensitive data securely has never been more crucial. One key player is the management of Non-Human Identities (NHIs), especially in cloud environments. Cybersecurity experts have long……
-
Can businesses truly trust Agentic AI with sensitive data handling?
How Can Non-Human Identities Shape Data Security? Have you ever wondered how organizations manage to keep their sensitive data secure in rising cybersecurity threats? With digital expanding rapidly, handling sensitive data securely has never been more crucial. One key player is the management of Non-Human Identities (NHIs), especially in cloud environments. Cybersecurity experts have long……
-
NDSS 2025 Diffence: Fencing Membership Privacy With Diffusion Models
Session 12C: Membership Inference Authors, Creators & Presenters: PAPER Yuefeng Peng (University of Massachusetts Amherst), Ali Naseh (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst) Deep learning models, while achieving remarkable performances across various tasks, are vulnerable to membership inference attacks (MIAs), wherein adversaries identify if a specific data point was part of…
-
NDSS 2025 Diffence: Fencing Membership Privacy With Diffusion Models
Session 12C: Membership Inference Authors, Creators & Presenters: PAPER Yuefeng Peng (University of Massachusetts Amherst), Ali Naseh (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst) Deep learning models, while achieving remarkable performances across various tasks, are vulnerable to membership inference attacks (MIAs), wherein adversaries identify if a specific data point was part of…
-
Security Affairs newsletter Round 563 by Pierluigi Paganini INTERNATIONAL EDITION
Tags: attack, breach, cisa, data, data-breach, email, fintech, flaw, international, phishing, WeeklyReviewA new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Fintech firm Figure disclosed data breach after employee phishing attack U.S. CISA adds a flaw in…
-
287 Chrome Extensions Caught Harvesting Browsing Data from 37M Users
New investigation by Q Continuum reveals 287 Chrome extensions leaking the private browsing data of 37.4 million users to firms like Similarweb and Alibaba. Learn how these harmless tools turn your history into a product. First seen on hackread.com Jump to article: hackread.com/chrome-extensions-harvest-browsing-data-37m-users/
-
Indian pharmacy chain giant exposed customer data and internal systems
A backend flaw in web admin dashboards used by one of India’s largest pharmacy chains, exposed thousands of online pharmacy orders. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/13/indias-major-pharmacy-chain-exposed-customer-data-and-internal-systems/
-
What future-proof methods do Agentic AIs use in data protection?
How Secure Is Your Organization’s Cloud Environment? How secure is your organization’s cloud environment? With the digital transformation accelerates, gaps in security are becoming increasingly noticeable. Non-Human Identities (NHIs), representing machine identities, are pivotal in these frameworks. In cybersecurity, they are formed by integrating a ‘Secret’”, like an encrypted password or key”, and the permissions…
-
Texas AG Investigating Conduent, BCBS Texas in Hack
Will the Back-Office Services’ Firm Incident Shatter US Data Breach Records?. The Texas attorney general office has launched an investigation into the Conduent Business Services hacking incident, which affected about 15.5 million Texans, including about 4 million Blue Cross Blue Shield of Texas members. Will the nationwide victim tally shatter data breach records in the…
-
260K Users Exposed in AI Extension Scam
Fake AI Chrome extensions exposed 260,000 users by using remote iframes to extract data and maintain persistent access. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/260k-users-exposed-in-ai-extension-scam/
-
Fintech lending giant Figure confirms data breach
The company said hackers downloaded “a limited number of files” after breaking into an employee’s account. The hacking group ShinyHunters took responsibility for the breach. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/13/fintech-lending-giant-figure-confirms-data-breach/
-
Randall Munroe’s XKCD ‘International Station’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/02/randall-munroes-xkcd-international-station/
-
What Interoperability in Healthcare Really Means for Security and Privacy
Healthcare interoperability improves care but expands attack surfaces, increasing data exposure, compliance risk, and security challenges across connected systems. First seen on hackread.com Jump to article: hackread.com/interoperability-in-healthcare-security-privacy/
-
What Interoperability in Healthcare Really Means for Security and Privacy
Healthcare interoperability improves care but expands attack surfaces, increasing data exposure, compliance risk, and security challenges across connected systems. First seen on hackread.com Jump to article: hackread.com/interoperability-in-healthcare-security-privacy/
-
What Interoperability in Healthcare Really Means for Security and Privacy
Healthcare interoperability improves care but expands attack surfaces, increasing data exposure, compliance risk, and security challenges across connected systems. First seen on hackread.com Jump to article: hackread.com/interoperability-in-healthcare-security-privacy/
-
What Interoperability in Healthcare Really Means for Security and Privacy
Healthcare interoperability improves care but expands attack surfaces, increasing data exposure, compliance risk, and security challenges across connected systems. First seen on hackread.com Jump to article: hackread.com/interoperability-in-healthcare-security-privacy/
-
2026 Predictions: AI Is Breaking Identity, Data Security
Agentic AI Is Reshaping Security Faster Than Traditional Defenses Can Keep Up Agentic artificial intelligence is fundamentally altering organizational workflows and how risk materializes. In 2026, emerging cybersecurity trends will push organizations to move from deterministic, rule-based risk models toward adaptive models built for autonomous, non-deterministic systems. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/blogs/2026-predictions-ai-breaking-identity-data-security-p-4042
-
Dutch phone giant Odido says millions of customers affected by data breach
The Dutch phone giant Odido is the latest phone and internet company to be hacked in recent months, as governments and financially motivated hackers continue to steal highly confidential information about phone customers. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/13/dutch-phone-giant-odido-says-millions-of-customers-affected-by-data-breach/

