Tag: data
-
Rockstar Games gets a taste of grand theft data
ShinyHunters claims it accessed Snowflake metrics via third-party tool First seen on theregister.com Jump to article: www.theregister.com/2026/04/13/shinyhunters_rockstar_breach/
-
Booking.com confirms hackers accessed customers’ data
The travel giant notified customers that their personal data, including names, emails, physical addresses, phone numbers may have been accessed in a security incident. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/13/booking-com-confirms-hackers-accessed-customers-data/
-
‘Grand Theft Auto’ publisher Rockstar hit by hackers again
The notorious ShinyHunters hacking collective menaces video game publisher Rockstar and says it will leak data on 14 April First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641486/Grand-Theft-Auto-publisher-Rockstar-hit-by-hackers-again
-
Hacker group threatens to release Grand Theft Auto VI data in Rockstar Games attack
The group named ShinyHunters have accessed a third party server and have given the company a deadline of 14 April to enter ransom negotiations Rockstar Games, the studio behind Grand Theft Auto, has been the target of a cyberattack for the second time in three years. A hacker group called ShinyHunters said it would release…
-
18 Growth Marketing Channels That Actually Work in 2026
From agentic AI workflows to product-led growth and GEO pipelines, here’s a data-backed breakdown of 18 growth marketing channels reshaping B2B and B2C in 2026. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/18-growth-marketing-channels-that-actually-work-in-2026/
-
Hack at Anodot leaves over a dozen breached companies facing extortion
The data breach at Anodot, which affects customers like Rockstar Games, is the latest hack aimed at stealing data from a large number of corporate giants. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/13/hack-at-anodot-leaves-over-a-dozen-breached-companies-facing-extortion/
-
Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat
Attackers are abusing Microsoft 365 mailbox rules to hide activity, exfiltrate data and retain access after account compromise, researchers warn First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/mailbox-rule-abuse-stealthy-post/
-
Hackers claim breach of Rockstar Games via cloud analytics platform
The ShinyHunters cybercrime group has claimed responsibility for breaching systems linked to video game developer Rockstar Games, threatening to release stolen data if a ransom is not paid. First seen on therecord.media Jump to article: therecord.media/rockstar-hackers-cyberattack-cloud
-
Booking.com warns reservation data may have checked out with intruders
Travel giant says names, contact details, dates, and hotel messages potentially exposed First seen on theregister.com Jump to article: www.theregister.com/2026/04/13/bookingcom_breach/
-
The silent “Storm”: New infostealer hijacks sessions, decrypts server-side
New “Storm” infostealer skips local decryption, sending browser data to attacker servers. Varonis shows how server-side decryption enables session hijacking, bypassing passwords and MFA. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/the-silent-storm-new-infostealer-hijacks-sessions-decrypts-server-side/
-
Interactive Brokers Phishing Scam: Fake IRS W-8BEN Renewal Alert
The blog describes a phishing campaign identified by Cofense that impersonates Interactive Brokers using a fake IRS W-8BEN renewal email to trick users into clicking a malicious link. The email appears legitimate but uses a suspicious sender address and directs victims to a counterfeit login page designed to steal account credentials. First seen on securityboulevard.com…
-
13th April Threat Intelligence Report
The Los Angeles Police Department has reported a data breach involving a digital storage system used by the L.A. City Attorney’s Office. The exposure included 7.7 terabytes and more than 337,000 files, […] First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2026/13th-april-threat-intelligence-report/
-
Seven IBM WebSphere Liberty flaws can be chained into full takeover
Tags: access, attack, authentication, credentials, cve, data, data-breach, encryption, flaw, ibm, passwordAdminCenter flaws allow further escalation: Beyond initial access, the research outlined critical issues within WebSphere Liberty’s administrative controls. The AdminCenter component, designed to enforce role-based access, contains multiple flaws that allow low-privileged users to access sensitive files and secrets.One issue, tracked under CVE-2025-14915, enables “reader”-level users to retrieve critical server files such as authentication keys,…
-
Hack at Dutch gym chain Basic-Fit exposes customer data in several EU countries
Unknown hackers breached the systems of European gym chain Basic-Fit and downloaded personal data belonging to members across several countries, the company has announced. First seen on therecord.media Jump to article: therecord.media/dutch-gym-chain-basic-fit-hit-by-hackers
-
Gym giant Basic-Fit confirms data on a million members stolen in cyberattack
Names, addresses, dates of birth, and bank details accessed, though not passwords First seen on theregister.com Jump to article: www.theregister.com/2026/04/13/basicfit_breach/
-
Rockstar Games gets a taste of grand theft data amid ShinyHunters threat of ‘Pay or leak’
Gang claims it accessed Snowflake metrics via third-party tool First seen on theregister.com Jump to article: www.theregister.com/2026/04/13/shinyhunters_rockstar_breach/
-
Citizen Lab: Webloc tracked 500M devices for global law enforcement
Citizen Lab reported that law enforcement used the surveillance tool Webloc to track up to 500M devices via ad data globally. A report by Citizen Lab revealed that law enforcement agencies in the U.S., Hungary, and El Salvador used a surveillance tool called Webloc to track devices via advertising data, potentially affecting up to 500…
-
Basic-Fit Suffers Data Breach Affecting Millions Across Multiple Nations
European fitness operator Basic-Fit has confirmed a significant data breach affecting approximately one million members across its network. The incident heavily impacted users in the Netherlands, which accounted for 200,000 of the compromised accounts. This breach underscores the persistent targeting of consumer lifestyle platforms by threat actors seeking massive datasets. The cyber incident targeted the…
-
Booking.com warns customers of hack that exposed their data
Undisclosed number of names and contact and reservation details accessed in latest cybercrime attempt<ul><li><a href=”https://www.theguardian.com/business/live/2026/apr/13/oil-price-barrel-trump-naval-blockade-strait-of-hormuz-stock-markets-ftse-latest-news-updates”>Business live latest updates</li></ul>The accommodation reservation website Booking.com has suffered a data breach with “unauthorised parties” gaining access to customers’ details.The platform said it “noticed some suspicious activity involving unauthorised third parties being able to access some of our guests’ booking…
-
Iran-linked group Handala claims to have breached three major UAE organizations
Iran-linked group Handala claims to have breached three major UAE organizations, Dubai Courts, Dubai Land Department, and Dubai Roads & Transport Authority The group Handala claimed a major cyberattack against the UAE, targeting Dubai Courts Department, Dubai Land Department, and Dubai Roads and Transport Authority. They alleged destroying 6 petabytes of data and stealing 149 TB…
-
CISOs tackle the AI visibility gap
Tags: ai, business, ciso, control, data, framework, governance, leak, risk, service, software, strategy, technology, tool, vulnerabilityGaining visibility: CISOs say they’re aware of the consequences of having blind spots, with data leaks and problematic AI outputs being common ones.They’re now working to gain the needed visibility to prevent such issues, says Aaron Momin, CISO and chief risk officer for Synechron, a digital consulting and technology services firm.”The business has a mandate…
-
OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident
OpenAI revealed a GitHub Actions workflow used to sign its macOS apps, which downloaded the malicious Axios library on March 31, but noted that no user data or internal system was compromised.”Out of an abundance of caution, we are taking steps to protect the process that certifies our macOS applications are legitimate OpenAI apps,” OpenAI…
-
Fixing vulnerability data quality requires fixing the architecture first
In this Help Net Security interview, Art Manion, Deputy Director at Tharros, examines why vulnerability data across repositories stays inconsistent and hard to trust. The … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/13/art-manion-tharros-vulnerability-data-quality/
-
MITRE releases a shared fraud-cyber framework built from real attack data
Financial fraud losses in the United States reached $16.6 billion in 2024, up from $4.2 billion in 2020. Behind those numbers is a structural problem: the teams responsible … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/13/mitre-fight-fraud-framework-f3/
-
Google Brings EndEnd Encrypted Gmail to Android and iPhone
Google has officially expanded Gmail’s end-to-end encryption (E2EE) feature to Android and iOS devices, empowering organizations and users to protect the confidentiality of email content directly from their mobile devices. This enhancement is part of Gmail’s client-side encryption (CSE) program, enabling stricter compliance controls and preserving data sovereignty across regulated industries. With this new rollout, Gmail users can…
-
What is WUE? A Guide to Data Center Water Efficiency
Water Usage Effectiveness (WUE) measures how efficiently a data center uses water in relation to its IT power consumption. This guide explains how to calculate WUE, its importance for sustainability, and proven strategies to reduce water waste and operational costs in modern data centers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/what-is-wue-a-guide-to-data-center-water-efficiency/
-
Is investing in advanced NHI systems justified
How Can Organizations Justify Investing in Advanced NHI Systems? Is your organization effectively managing Non-Human Identities (NHIs) to safeguard your cloud environments? With a data management expert specializing in cybersecurity, understanding the strategic importance of NHIs is crucial for protecting your digital assets. Let’s delve into why investing in advanced NHI systems is justified for……

