Tag: data
-
Hacker mass-mails HungerRush extortion emails to restaurant patrons
Customers of restaurants using the HungerRush point-of-sale (POS) platform say they received emails from a threat actor attempting to extort the company, warning that restaurant and customer data could be exposed if HungerRush fails to respond. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hacker-mass-mails-hungerrush-extortion-emails-to-restaurant-patrons/
-
FBI seizes LeakBase cybercrime forum, data of 142,000 members
The FBI has seized the LeakBase cybercrime forum, a major online forum used by cybercriminals buy and sell hacking tools and stolen data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-seizes-leakbase-cybercrime-forum-data-of-142-000-members/
-
Airtable’s 500K Row Limit Is Not a Scalability Fix, It’s a Signal to Rethink Your Data Strategy
Airtable’s new 500,000-row limit is making headlines, but it is not a true scalability upgrade. It is a signal. A signal that many teams are…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/03/airtables-500k-row-limit-is-not-a-scalability-fix-its-a-signal-to-rethink-your-data-strategy/
-
NDSS 2025 Detecting Server-Induced Client Vulnerabilities In Windows Remote IPC
Tags: china, computing, conference, cve, data, detection, Internet, network, technology, tool, vulnerability, windowsSession 14C: Vulnerability Detection Authors, Creators & Presenters: (Except Where Noted – The Following Authors Are From The Institute of Information Engineering, Chinese Academy Of Sciences) Fangming Gu, Qingli Guo, Jie Lu (Institute of Computing Technology, Chinese Academy of Sciences), Qinghe Xie , Beibei Zhao, Kangjie Lu (University of Minnesota), Hong Li, Xiaorui Gong PAPER…
-
Best DeleteMe Alternatives (2026): Competitors and Comparisons
Best DeleteMe alternatives for 2026 compared, including Incogni, Optery, Aura, Kanary, and Privacy Bee for data broker removal and privacy protection. First seen on hackread.com Jump to article: hackread.com/deleteme-alternatives-2026-competitors-comparisons/
-
LexisNexis confirms data breach at Legal & Professional arm, some customer records affected
Crooks claim 2 GB haul from AWS instance via React2Shell exploit First seen on theregister.com Jump to article: www.theregister.com/2026/03/04/lexisnexis_legal_professional_confirms_data/
-
Ransomware Breach at University of Hawaii Cancer Center Affects 1.2M People
The University of Hawaii Cancer Centre has confirmed a massive ransomware attack affecting 1.24 million people. Sensitive data, including Social Security numbers and historical voter records dating back to 1993, was compromised. First seen on hackread.com Jump to article: hackread.com/ransomware-breach-university-of-hawaii-cancer-center/
-
Ransomware Breach at University of Hawaii Cancer Center Affects 1.2M People
The University of Hawaii Cancer Centre has confirmed a massive ransomware attack affecting 1.24 million people. Sensitive data, including Social Security numbers and historical voter records dating back to 1993, was compromised. First seen on hackread.com Jump to article: hackread.com/ransomware-breach-university-of-hawaii-cancer-center/
-
Shadow AI: When Everyone Becomes a Data Leak Waiting to Happen
Shadow AI leaks data to uncontrolled external systems and spreads virally across organizations, requiring user training and compliant alternatives rather than prohibition. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/shadow-ai-when-everyone-becomes-a-data-leak-waiting-to-happen/
-
Cyber Defense Magazine – A New Bell Rings For K-12 Cloud Security After the Illuminate Settlement
This article was originally published in Cyber Defense Magazine on 02/09/26 by Charlie Sander. The Illuminate incident serves as a crucial reminder to edtech vendors of the potential backlash that can occur when privacy promises are not upheld In a recent complaint, the FTC addresses Illuminate Education’s need to strengthen its data security after a breach…
-
Shadow AI vs Managed AI: What’s the Difference? FireTail Blog
Tags: access, ai, api, attack, breach, chatgpt, ciso, cloud, computer, control, credentials, credit-card, data, data-breach, framework, google, injection, intelligence, Internet, law, LLM, malicious, mitre, monitoring, network, password, phishing, phone, risk, software, switch, threat, tool, training, vulnerabilityMar 04, 2026 – – Quick Facts: Shadow AI vs. Managed AIShadow AI is a visibility gap: It refers to any AI tool used by employees that the IT department doesn’t know about. Most companies have 10x more AI tools in use than they realize.Managed AI is a “Paved Path”: It uses approved, secure versions…
-
Anthropic AI ultimatums and IP theft: The unspoken risk
Tags: ai, ceo, china, ciso, data, data-breach, defense, google, government, intelligence, monitoring, network, openai, risk, service, theft, toolChina’s extraction campaign: A targeting operation, not a curiosity: Anthropic’s disclosure that three China”‘based AI companies (DeepSeek, Moonshot AI, and MiniMax) ran more than 16 million interactions through roughly 24,000 fraudulent accounts is not a story about model misuse. It is a story about targeting. These campaigns went straight at Claude’s most sensitive capabilities: agentic…
-
AzCopy Utility Misused for Data Exfiltration in Ongoing Ransomware Attacks
Ransomware operators are increasingly abusing Microsoft’s trusted Azure data transfer utility, AzCopy, to quietly exfiltrate sensitive data before encryption, turning a routine cloud migration tool into a stealthy theft channel. Instead of relying on obviously malicious tools like Rclone or MegaSync, threat actors are pivoting to native, administrator-approved cloud utilities to blend into normal IT…
-
Data breach at University of Hawaiʻi Cancer Center impacts 1.2 Million individuals
A ransomware attack on the University of HawaiÊ»i Cancer Center exposed personal data of 1.2 million people. A 2025 ransomware attack targeting the University of HawaiÊ»i Cancer Center compromised the personal information of about 1.2 million individuals. The attack hit the University of HawaiÊ»i Cancer Center on August 31, 2025, impacting servers that support research…
-
LexisNexis Faces Data Breach After 2.04 GB of Data Allegedly Stolen
A threat actor known as FulcrumSec has claimed responsibility for a data breach at LexisNexis Legal & Professional, the legal information division of RELX Group. The actor alleges they have stolen 2.04 GB of structured data from the company’s Amazon Web Services (AWS) cloud infrastructure. The incident highlights significant security flaws, particularly concerning access controls…
-
The Worm Turns When the Hunter Becomes the Hunted Mass Surveillance and the Weaponization of the Data We Voluntarily Create
Explore how advancements in surveillance infrastructure and the democratization of intelligence have transformed espionage. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/the-worm-turns-when-the-hunter-becomes-the-hunted-mass-surveillance-and-the-weaponization-of-the-data-we-voluntarily-create/
-
How to know you’re a real-deal CSO, and whether that job opening truly seeks one
Tags: access, ai, breach, business, communications, compliance, control, cyber, data, data-breach, finance, framework, governance, incident response, infosec, insurance, jobs, metric, privacy, radius, risk, skills, strategy, threat, training, vulnerabilityStriking the right balance of experience and responsibility: Mark G. McCreary, partner and chief AI and IT security officer at Boston-based legal firm Fox Rothschild LLP, has seen both extremes: security being completely sidelined and security professionals given excessive, unjustified authority.In some firms, a newly appointed CSO might be positioned as a gatekeeper without the…
-
Cybersecurity professionals are burning out on extra hours every week
Cybersecurity professionals in the U.S. are working an average of 10.8 extra hours per week beyond their contracted schedules, according to survey data collected from 300 … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/04/ciso-cybersecurity-workforce-burnout/
-
Gamers furious as indie studio Cloud Imperium quietly admits to data breach
Slow disclosure and odd reassurance that exposing names and contact details won’t be a problem isn’t going down well First seen on theregister.com Jump to article: www.theregister.com/2026/03/03/brit_games_studio_cloud_imperium/
-
NCSC Warns UK Organisations to Prepare for Potential Iran-Linked Cyber Activity
Tags: advisory, attack, awareness, breach, business, china, cyber, cybercrime, data, data-breach, espionage, exploit, finance, government, group, incident response, infrastructure, international, Internet, iran, leak, malware, middle-east, military, monitoring, phishing, resilience, risk, russia, service, supply-chain, tactics, threat, tool, update, vulnerability, vulnerability-managementGeopolitical conflict rarely stays confined to physical battlefields. Increasingly, it spills into the digital domain. The latest escalation of tensions in the Middle East has prompted the UK’s National Cyber Security Centre (NCSC) to issue a warning to organisations to review their cyber security posture and prepare for possible cyber activity linked to Iran. While…
-
NCSC Warns UK Organisations to Prepare for Potential Iran-Linked Cyber Activity
Tags: advisory, attack, awareness, breach, business, china, cyber, cybercrime, data, data-breach, espionage, exploit, finance, government, group, incident response, infrastructure, international, Internet, iran, leak, malware, middle-east, military, monitoring, phishing, resilience, risk, russia, service, supply-chain, tactics, threat, tool, update, vulnerability, vulnerability-managementGeopolitical conflict rarely stays confined to physical battlefields. Increasingly, it spills into the digital domain. The latest escalation of tensions in the Middle East has prompted the UK’s National Cyber Security Centre (NCSC) to issue a warning to organisations to review their cyber security posture and prepare for possible cyber activity linked to Iran. While…
-
NCSC Warns UK Organisations to Prepare for Potential Iran-Linked Cyber Activity
Tags: advisory, attack, awareness, breach, business, china, cyber, cybercrime, data, data-breach, espionage, exploit, finance, government, group, incident response, infrastructure, international, Internet, iran, leak, malware, middle-east, military, monitoring, phishing, resilience, risk, russia, service, supply-chain, tactics, threat, tool, update, vulnerability, vulnerability-managementGeopolitical conflict rarely stays confined to physical battlefields. Increasingly, it spills into the digital domain. The latest escalation of tensions in the Middle East has prompted the UK’s National Cyber Security Centre (NCSC) to issue a warning to organisations to review their cyber security posture and prepare for possible cyber activity linked to Iran. While…
-
LexisNexis Investigates Breach, Customer Data Access
LexisNexis confirmed a breach involving legacy servers and limited customer data. The company says there’s no impact to products or services. First seen on crn.com Jump to article: www.crn.com/news/security/2026/lexisnexis-investigates-breach-customer-data-accessed
-
How independent can your AI operate securely
Can Your Organization Truly Trust Machine Identities? Managing Non-Human Identities (NHIs) has become critical for organizations seeking to bolster cybersecurity measures, especially in cloud environments. These identities, representing machine-generated credentials, act as gatekeepers of sensitive data across various systems. But how independent can your AI operate securely without compromising these machine identities? The concept of……
-
Data Sovereignty: What Infrastructure Leaders Must Know
Discover the top DCIM software trends shaping the future of data centers in 2025. From AI-powered predictive maintenance to sustainability-focused tools, hybrid cloud management, and real-time monitoring, these advancements are redefining data center operations. Learn how next-gen DCIM solutions can optimize efficiency, reduce costs, and ensure compliance while driving scalability and innovation. First seen on…
-
Chat at your own risk! Data brokers are selling deeply personal bot transcripts
AI conversations for sale include sensitive health and legal details First seen on theregister.com Jump to article: www.theregister.com/2026/03/03/chatbot_data_harvesting_personal_info/
-
Vehicle Tire Pressure Sensors Enable Silent Tracking
Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat actors. First seen on darkreading.com Jump to article: www.darkreading.com/ics-ot-security/tire-pressure-sensors-silent-tracking
-
Ariomex, Iran-based crypto exchange, suffers data leak
Resecurity says Iran’s Ariomex crypto exchange suffered a data leak exposing user and transaction data from 2022 to 2025. Resecurity (USA) reports that Ariomex’s database, one of Iran’s cryptocurrency exchange platforms, suffered a data leak. The report published by the cybersecurity company presents the findings of a structured analysis of the leaked database, which contains…
-
Fairwinds Insights Release Notes: Kyverno Integration GPU Metrics
<div cla Over the last several months, we’ve expanded Fairwinds Insights to give platform and operations teams deeper visibility into both policy posture and infrastructure metrics and costs. Our releases focused on enhancing the Kyverno integration and introducing GPU”‘aware metrics and cost data to support better scheduling and rightsizing decisions. First seen on securityboulevard.com Jump…
-
California fines national high school ticketing platform $1.1 million for privacy violations
The CPPA alleges that PlayOn Sports collected students’ personal data and delivered targeted advertising by using tracking technologies without providing a “sufficient way to opt out.” First seen on therecord.media Jump to article: therecord.media/california-fines-national-high-school-ticketing-platform-privacy

