Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 6
112 résultats taggé Data-Breach  ✕
Exclusive: Tiffany confirms data breach in South Korea following Dior incident https://www.chosun.com/english/industry-en/2025/05/26/ORM5MULB7NEM7EBUFVXHVLSB4A/
27/05/2025 09:07:23
QRCode
archive.org
thumbnail

Tiffany & Co. has confirmed a data breach affecting customers in South Korea, marking the second such incident involving an LVMH Moët Hennessy Louis Vuitton brand after a similar case at Dior. On May 26, Tiffany Korea notified select customers via email of a cybersecurity breach involving unauthorized access to a vendor platform used for managing customer data.
Both Dior and Tiffany operate under LVMH, the world’s largest luxury goods conglomerate, raising broader concerns over data security within the group.

According to the email sent by Tiffany Korea, the breach occurred on Apr. 8. The company said it verified on May 9 that personal data belonging to individuals in South Korea had been compromised. The exposed information includes names, addresses, phone numbers, email addresses, internal customer ID numbers, and purchase history—data considered particularly sensitive from a consumer standpoint, as was the case in the Dior breach.

Tiffany noted that, as of now, there have been no confirmed cases of misuse or exploitation of the compromised data.

When contacted by Chosunilbo, Tiffany Korea’s customer service center said that only those affected had been individually notified. No public notice regarding the breach appeared on the company’s official website at the time of reporting.

LVMH finalized its acquisition of Tiffany & Co., the American luxury jeweler, in January 2021 in a deal valued at approximately 17 trillion won ($12.4 billion). Tiffany Korea generated 377.9 billion won ($276 million) in domestic sales last year, a 7.6% increase from the previous year, with operating profit reaching 21.5 billion won ($15.7 million)

chosun EN 2025 Tiffany Dior LVMH data-breach luxury
480,000 Catholic Health Patients Impacted by Serviceaide Data Leak https://www.securityweek.com/480000-catholic-health-patients-impacted-by-serviceaide-data-leak/
24/05/2025 12:18:58
QRCode
archive.org

Enterprise management solutions provider Serviceaide has informed the Department of Health and Human Services (HHS) that a data leak impacts the personal and medical information of nearly half a million Catholic Health patients.

California-based Serviceaide, whose solutions are used by organizations worldwide, discovered in November 2024 that an Elasticsearch database maintained for one of its customers, Buffalo, New York-based non-profit healthcare system Catholic Health, had been inadvertently made publicly available.

An investigation showed that the database had been exposed between September 19 and November 5, 2024.

While Serviceaide did not find any evidence that the information was exfiltrated, the company said it cannot definitively rule it out.

According to a data breach notice posted on the Serviceaide website, the exposed information varies for each individual, but it can include name, SSN, date of birth, medical record number, patient account number, medical information, health insurance information, prescription and treatment information, clinical information, healthcare provider details, email or username, and password.

Impacted individuals are being notified and offered 12 months of free credit monitoring and identity theft protection services.

Serviceaide informed the HHS, according to the government organization’s incident tracker, that just over 483,000 individuals are impacted by the data breach.

It’s not uncommon for healthcare data breaches to impact hundreds of thousands of individuals, and some incidents affect millions and even tens of millions.

securityweek EN 2025 Data-Breach Serviceaide HHS US Catholic-Health
Legal Aid hack: Names, financial details and criminal histories compromised in cyberattack, Ministry of Justice says https://www.independent.co.uk/news/uk/home-news/ministry-of-justice-cyber-attack-data-legal-aid-b2753560.html
20/05/2025 20:48:48
QRCode
archive.org

The cyberattackers claimed 2.1m pieces of customer data had been stolen from the Legal Aid Agency

Millions of pieces of personal data, including criminal records, have been stolen from legal aid applicants in a massive cyberattack.

The data, including national insurance numbers, employment status and financial data, was breached earlier this year, according to the Ministry of Justice (MoJ).

The cyberattackers claimed they had stolen 2.1 million pieces of data from people who had applied for legal aid since 2010 but the MoJ only said a “significant amount of personal data” had been breached.

An MoJ source put the breach down to the “neglect and mismanagement” of the previous government, saying vulnerabilities in the Legal Aid Agency (LAA) systems have been known for many years.

“This data breach was made possible by the long years of neglect and mismanagement of the justice system under the last government,” the source said.

independent.co.uk UK EN 2025 Data-Breach Legal-Aid-Agency LAA
Protecting Our Customers - Standing Up to Extortionists https://www.coinbase.com/blog/protecting-our-customers-standing-up-to-extortionists
15/05/2025 21:16:37
QRCode
archive.org

Cyber criminals bribed and recruited a group of rogue overseas support agents to steal Coinbase customer data to facilitate social engineering attacks. These insiders abused their access to customer support systems to steal the account data for a small subset of customers. No passwords, private keys, or funds were exposed and Coinbase Prime accounts are untouched. We will reimburse customers who were tricked into sending funds to the attacker. We’re cooperating closely with law enforcement to pursue the harshest penalties possible and will not pay the $20 million ransom demand we received. Instead we are establishing a $20 million reward fund for information leading to the arrest and conviction of the criminals responsible for this attack.

What happened
Criminals targeted our customer support agents overseas. They used cash offers to convince a small group of insiders to copy data in our customer support tools for less than 1% of Coinbase monthly transacting users. Their aim was to gather a customer list they could contact while pretending to be Coinbase—tricking people into handing over their crypto. They then tried to extort Coinbase for $20 million to cover this up. We said no.

What they got

  • Name, address, phone, and email

  • Masked Social Security (last 4 digits only)

  • Masked bank‑account numbers and some bank account identifiers

  • Government‑ID images (e.g., driver’s license, passport)

  • Account data (balance snapshots and transaction history)

  • Limited corporate data (including documents, training material, and communications available to support agents)

coinbase EN 2025 cyberattack extortion theft Data-Breach
Dior’s China data breach exposes elite clients https://jingdaily.com/posts/dior-china-data-breach-tests-brand-trust
13/05/2025 14:36:24
QRCode
archive.org
thumbnail

Dior’s coveted client list of China’s wealthiest and most powerful consumers has been compromised in a major data breach, forcing the French luxury giant to issue an apology as it scrambles to contain potential fallout and limit any damage to its reputation.

The luxury brand under French conglomerate LVMH experienced a customer data breach in China on May 7. According to a text message sent to customers yesterday, the company disclosed that an unauthorized external party had gained access to its database, obtaining sensitive personal information such as customers’ names, gender, phone numbers, email addresses, mailing addresses, purchase amounts, and shopping preferences.

Dior emphasized that the compromised data did not include bank account details, IBANs (International Bank Account Numbers), or credit card information. Nonetheless, the brand urged customers to exercise heightened caution, advising them to beware of phishing messages, unsolicited calls or emails, and to avoid clicking on suspicious links or disclosing personal information.

jingdaily.com EN 2025 Luxury Jing China Dior Data-Breach
LockBit ransomware gang hacked, victim negotiations exposed https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-hacked-victim-negotiations-exposed/
08/05/2025 08:37:55
QRCode
archive.org
thumbnail

The LockBit ransomware gang has suffered a data breach after its dark web affiliate panels were defaced and replaced with a message linking to a MySQL database dump.

All of the ransomware gang's admin panels now state. "Don't do crime CRIME IS BAD xoxo from Prague," with a link to download a "paneldb_dump.zip."

LockBit dark web site defaced with link to database
As first spotted by the threat actor, Rey, this archive contains a SQL file dumped from the site affiliate panel's MySQL database.

From analysis by BleepingComputer, this database contains twenty tables, with some more interesting than others, including:

A 'btc_addresses' table that contains 59,975 unique bitcoin addresses.
A 'builds' table contains the individual builds created by affiliates for attacks. Table rows contain the public keys, but no private keys, unfortunately. The targeted companies' names are also listed for some of the builds.
A 'builds_configurations' table contains the different configurations used for each build, such as which ESXi servers to skip or files to encrypt.
A 'chats' table is very interesting as it contains 4,442 negotiation messages between the ransomware operation and victims from December 19th to April 29th.
Affiliate panel 'chats' table
Affiliate panel 'chats' table
A 'users' table lists 75 admins and affiliates who had access to the affiliate panel, with Michael Gillespie spotting that passwords were stored in plaintext. Examples of some of the plaintext passwords are 'Weekendlover69, 'MovingBricks69420', and 'Lockbitproud231'.
In a Tox conversation with Rey, the LockBit operator known as 'LockBitSupp' confirmed the breach, stating that no private keys were leaked or data lost.

Based on the MySQL dump generation time and the last date record in the negotiation chats table , the database appears to have been dumped at some point on April 29th, 2025.

It's unclear who carried out the breach and how it was done, but the defacement message matches the one used in a recent breach of Everest ransomware's dark web site, suggesting a possible link.

bleepingcomputer EN 2025 Affiliates Data-Breach Defacement LockBit MySQL
Verisource Services Increases Data Breach Victim Count to 4 Million https://www.hipaajournal.com/verisource-services-data-breach/
04/05/2025 13:15:07
QRCode
archive.org

Verisource Services, an employee benefits administration service provider, has determined that a previously announced data breach was far worse than initially thought and has affected up to 4 million individuals. The Houston, Texas-based company detected a hacking incident on February 28, 2024, that disrupted access to some of its systems. Third-party cybersecurity and incident response experts were engaged to investigate the incident and determine the nature and scope of the unauthorized activity.

The forensic investigation confirmed hackers had access to its network and exfiltrated files on February 27, 2024. At the time of the initial announcement, Verisource Services said names, dates of birth, genders, and Social Security numbers had been stolen. The affected individuals included employees and dependents of clients who used its services, which include HR outsourcing, benefits enrollment, billing, and administrative services.

The data breach was initially reported as affecting 1,382 individuals, but as the investigation progressed, it became clear that the breach was worse than initially thought. In August 2024, the data breach was reported to the HHS’ Office for Civil Rights (OCR) as involving the protected health information of 112,726 individuals. The most recent notification to the Maine Attorney General indicates up to 4 million individuals have been affected, a sizeable increase from previous estimates. The OCR breach portal still lists the incident as affecting 112,726 patients and plan members of its HIPAA-regulated entity clients, although that total may well be updated in the coming days.

Verisource Services explained in the breach notice that the data review was not completed until April 17, 2025, almost 14 months after the security incident was detected. Verisource Services reported the security incident to the Federal Bureau of Investigation, and several additional security measures have been implemented to improve its security posture. Notification letters had previously been sent to some affected individuals; however, the bulk of the notification letters have only recently been mailed. Verisource Services said complimentary credit monitoring and identity theft protection services have been offered to the affected individuals, who will also be protected with a $1,000,000 identity theft insurance policy.

hipaajournal EN 2025 Verisource-Services US forensic investigation Data-Breach Data-Leak
Two Healthcare Orgs Hit by Ransomware Confirm Data Breaches Impacting Over 100,000 https://www.securityweek.com/two-healthcare-orgs-hit-by-ransomware-confirm-data-breaches-impacting-over-100000/
27/04/2025 11:44:48
QRCode
archive.org

Bell Ambulance and Alabama Ophthalmology Associates have suffered data breaches affecting over 100,000 people after being targeted in ransomware attacks.

One of them is Milwaukee, WI-based Bell Ambulance, which provides ambulance services in the area. The company revealed last week in a data security notice that it detected a network intrusion on February 13, 2025.

An investigation showed that hackers gained access to files containing information such as name, date of birth, SSN, and driver’s license number, as well as financial, medical and health insurance information.

Bell Ambulance did not say in its public notice how many individuals are impacted, but the Department of Health and Human Services (HHS) data breach tracker revealed on Monday that 114,000 people are affected.

The Medusa ransomware group announced hacking Bell Ambulance in early March, claiming to have stolen more than 200 Gb of data from its systems.

The second healthcare organization to confirm a data breach impacting more than 100,000 people is Birmingham, AL-based ophthalmology practice Alabama Ophthalmology Associates.

securityweek EN 2025 Data-Breach Bell-Ambulance US Medusa ransomware Alabama-Ophthalmology-Associates health
Ransomware Group Claims Hacking of Oregon Regulator After Data Breach Denial https://www.securityweek.com/ransomware-group-claims-hacking-of-oregon-regulator-after-data-breach-denial/
20/04/2025 12:32:49
QRCode
archive.org

The Rhysida ransomware gang claims to have stolen 2.5 Tb of files from the Oregon Department of Environmental Quality.

securityweek EN 2025 Rhysida Oregon US ransomware Data-Breach
Conduent confirms data breach impact on clients’ details https://cybernews.com/news/conduent-data-breach-impacts-clients-details/?ref=metacurity.com
15/04/2025 20:42:56
QRCode
archive.org

American business service behemoth Conduent has confirmed the January data breach resulted in hackers stealing customer details, although there’s no evidence that the info was leaked online.

The attack hit the company in mid-January this year, Conduent confirmed on a FORM-8K filing with the SEC. Attackers penetrated digital defenses and accessed a “limited portion” of Conduent’s environment.

Several of Conduent’s clients experienced disruption in the initial days of the attack. For example, Wisconsin’s Department of Children and Families said the outage impacted payees who receive their payments via an electronic transfer system.

cybernews EN 2025 Conduent Data-Breach SEC disruption
Oracle privately confirms Cloud breach to customers https://www.bleepingcomputer.com/news/security/oracle-privately-confirms-cloud-breach-to-customers/
04/04/2025 16:34:39
QRCode
archive.org
thumbnail

Oracle has finally acknowledged to some customers that attackers have stolen old client credentials after breaching a

bleepingcomputer EN 2025 Breach Data-Breach Data-Leak Oracle Oracle-Cloud Oracle-Health
Oracle Health breach compromises patient data at US hospitals https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/
28/03/2025 16:22:16
QRCode
archive.org
thumbnail

A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers.

bleepingcomputer EN 2025 Cerner Data-Breach Electronic-Health-Record Hospital Oracle Oracle-Health Patient-Data
Oracle denies breach after hacker claims theft of 6 million data records https://www.bleepingcomputer.com/news/security/oracle-denies-data-breach-after-hacker-claims-theft-of-6-million-data-records/
23/03/2025 17:27:22
QRCode
archive.org
thumbnail

Oracle denies it was breached after a threat actor claimed to be selling 6 million data records allegedly stolen from the company's Oracle Cloud federated SSO login servers

bleepingcomputer EN 2025 Breach BreachForums Data-Breach Data-Leak Oracle SSO
Over 16.8 Billion Records Exposed as Data Breaches Increase 6% https://www.infosecurity-magazine.com/news/168-billion-records-exposed/?ref=metacurity.com
19/03/2025 21:04:34
QRCode
archive.org
thumbnail

Flashpoint data points to a surge in data breaches fueled by compromised credentials, ransomware and exploits

infosecurity-magazine EN 2025 Flashpoint Exposed Data-Breach 2024 Report
Data breach at Japanese telecom giant NTT hits 18,000 companies https://www.bleepingcomputer.com/news/security/data-breach-at-japanese-telecom-giant-ntt-hits-18-000-companies/
07/03/2025 15:37:15
QRCode
archive.org
thumbnail

Japanese telecommunication services provider NTT Communications Corporation (NTT) is warning almost 18,000 corporate customers that their information was compromised during a cybersecurity incident.

bleepingcomputer EN 2025 Customer-Data Data-Breach Japan NTT
HPE Investigating Breach Claims After Hacker Offers to Sell Data - SecurityWeek https://www.securityweek.com/hpe-investigating-breach-claims-after-hacker-offers-to-sell-data/
20/01/2025 13:56:13
QRCode
archive.org

HPE investigating claims by the hacker IntelBroker, who is offering to sell source code and other data allegedly stolen from the tech giant.

securityweek EN 2025 HPE IntelBroker Data-Breach HewlettPackard
Scholastic Hack: Furry Finds 8 Million People Exposed https://www.dailydot.com/debug/furry-hacks-scholastic-8-million-records-stolen/
13/01/2025 08:45:58
QRCode
archive.org
thumbnail

Scholastic hack: A furry breached the education company Scholastic this month and stole data on 8 million people, the Daily Dot has learned.

dailydot EN 2025 Scholastic Hack Data-Breach
Green Bay Packers' online store hacked to steal credit cards https://www.bleepingcomputer.com/news/security/green-bay-packers-online-store-hacked-to-steal-credit-cards/
12/01/2025 20:54:17
QRCode
archive.org
thumbnail

The Green Bay Packers American football team is notifying fans that a threat actor hacked its official online retail store in October and injected a card skimmer script to steal customers' personal and payment information.

bleepingcomputer EN 2025 Breach Credit-Card Data-Breach Football Green-Bay-Packers MageCart NFL Payment-Information Skimmer USA
Hackers Claim Massive Breach of Location Data Giant, Threaten to Leak Data https://www.404media.co/hackers-claim-massive-breach-of-location-data-giant-threaten-to-leak-data/
09/01/2025 16:40:34
QRCode
archive.org
thumbnail

Gravy Analytics has been one of the most important companies in the location data industry for years, collating smartphone location data from around the world selling some to the U.S. government. Hackers say they stole a mountain of data.

404media EN 2025 Gravy-Analytics data-breach data-broker
Thousands of credit cards stolen in Green Bay Packers store breach https://www.bleepingcomputer.com/news/security/thousands-of-credit-cards-stolen-in-green-bay-packers-store-breach/
08/01/2025 16:21:51
QRCode
archive.org
thumbnail

​American football team Green Bay Packers says cybercriminals stole the credit card data of over 8,500 customers after hacking its official Pro Shop online retail store in a September breach.

bleepingcomputer EN 2024 Credit-Card Credit-Card-Stealer Data-Breach Football Green-Bay-Packers MageCart NFL Payment-Information
page 1 / 6
4339 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio