Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
17 résultats taggé dataleak  ✕
Confidential health records from UK BioBank project exposed online | Genetics | The Guardian https://www.theguardian.com/science/2026/mar/14/confidential-health-records-exposed-online-uk-biobank
21/03/2026 14:26:19
QRCode
archive.org
thumbnail

theguardian.com
Hannah Devlin and Tom Burgis
Sat 14 Mar 2026 07.00 CET

Exclusive: Guardian investigation finds data from flagship medical research leaked dozens of times

Confidential health data has been exposed online on dozens of occasions, a Guardian investigation can reveal, raising questions about the safeguarding of patient records by one of the UK’s flagship medical research projects.

UK Biobank, which holds the medical records of 500,000 British volunteers, is one of the world’s most comprehensive stores of health information and is credited with driving breakthroughs in cancer, dementia and diabetes research. But scientists approved to access Biobank’s sensitive data appear to have sometimes been cavalier about its security.

The files, which seem to have been inadvertently posted online by researchers using the data, do not include names or addresses, but they may still pose privacy concerns. One dataset found by the Guardian contained millions of hospital diagnoses and associated dates for more than 400,000 participants.

With the consent of a Biobank volunteer, the Guardian was able to pinpoint what appeared to be extensive hospital diagnosis records for the volunteer, using only their month and year of birth and details of a major surgery they had undergone.

"The file was very detailed and it felt like a gross invasion of privacy even to glance at
Data expert"

One data expert said the scale and persistence of the problem was “shocking” at a time when AI and social media were making it ever easier to cross-reference information online.

UK Biobank rejected the concerns, saying that no identifying data, such as names and addresses, were provided to researchers.

In a statement, Prof Sir Rory Collins, the chief executive of UK Biobank, said: “We have never seen any evidence of any UK Biobank participant being re-identified by others.”

’They said they would hold our data securely’
Founded in 2003 by the Department of Health and medical research charities, UK Biobank holds genome sequences, scans, blood samples and lifestyle information of 500,000 volunteers. Last month, the government extended Biobank’s access to volunteers’ GP records.

Scientists at universities and private companies across the world apply for access and, until late 2024, were free to download data directly on to their own computer systems.

Before this point, data had been inadvertently published online and Biobank appears to still be grappling with the problem.

The issue emerged because journals and funders increasingly require researchers to publish the code they have used to analyse large datasets. When intending to upload code, some researchers have also accidentally published partial or entire Biobank datasets to GitHub, a popular online code-sharing platform. UK Biobank prohibits researchers from sharing data outside their systems and says it has introduced further training for all researchers.

In the past year, the data leaks appear to have become a more urgent concern to UK Biobank. Between July and December 2025, it issued 80 legal notices to GitHub, which has complied with requests to remove data from the internet. Yet much still remains available.

Some of the data files contain just patient IDs, or test results for small numbers, others are more extensive. One dataset found online by the Guardian in January contained hospital diagnoses and associated diagnosis dates for about 413,000 participants, along with their sex and month and year of birth.

A data expert, who reviewed the file said: “It sent shivers down my spine to even open. I deleted the file immediately. It was very detailed and felt like a gross invasion of privacy even to glance at.”

To test the risk of re-identification, the Guardian approached several Biobank volunteers, two of whom had undergone medical procedures in the timeframe within the data and agreed to share these details with an external data scientist.

One volunteer, who provided treatment dates for a fracture and seizure, could not be located in the dataset. A second volunteer, a woman in her 70s, shared her month and year of birth and the month and year she had a hysterectomy. Only one person in the dataset matched these details. The apparent match was corroborated by five other diagnoses from the records that the volunteer had not initially disclosed.

“Effectively you were rehearsing the main parts of my medical history to me without me having given you any information at all. I didn’t expect that,” the volunteer said.

The woman said she was not too concerned about her own data being exposed and intended to remain a participant, saying that she viewed UK Biobank’s work as “extremely important”. But, she added: “I’m more concerned about whether Biobank has broken its agreement with people. They said they would hold our data securely … I just feel as though that has to come into the equation.”

UK Biobank said the re-identification scenario tested by the Guardian did not highlight a privacy risk because without additional information it would be impossible to identify individuals.

A Biobank spokesperson said: “As we have communicated to our participants, including on our website: ‘If a participant puts information that reveals something about their health and identity, such as genealogy data, on a public website, this could make it possible for their identity to be discovered by cross-referencing UK Biobank research data.’

“You have simply demonstrated why we tell participants not to do this.”

The spokesperson added that Biobank had taken extensive measures to protect participants’ privacy, including proactively searching GitHub, contacting researchers directly and issuing legal takedown notices, actions which they said had led to about 500 repositories being removed. Many of these, it said, contained only patient IDs, not health data.

"The idea they can rely on volunteers never putting any other information out about themselves is entirely unreasonable
Prof Felix Ritchie"

‘There are tensions between driving research with data and protecting privacy’
Privacy experts said UK Biobank’s approach appeared at odds with the reality that many people, reasonably, shared some health information online and that in an age of AI this could readily be identified and cross-referenced.

“Are these people aware that the internet exists?” asked Prof Felix Ritchie, an economist at the University of the West of England. “The idea that they can rely on their volunteers never putting any other information out there about themselves is an entirely unreasonable thing to expect.”

Dr Luc Rocher, associate professor at the Oxford Internet Institute, who reviewed several Biobank datasets found online, said that removing identifiers often did not guarantee anonymity and that simply knowing a person’s birthday and, say, the date they broke a leg might be enough to pinpoint their record with high confidence.

“Once identified, that record could reveal sensitive information such as a psychiatric diagnosis, an HIV test result, or a history of drug abuse,” they said.

Prof Niels Peek, professor of data science and healthcare improvement at the University of Cambridge, said the scale of the problem was “shocking”. “If it had happened once or 10 times I’d probably say: ‘It’s not great that it’s happened but at the same time zero risk is impossible,’” he said. “Hundreds. That’s a little bit too much.”

In Peek’s view, Biobank’s actions show it has taken the issue seriously and “done everything that one can reasonably expect”. But, he added: “The scale and persistence with which this has happened demonstrates that there are huge tensions between the ambition to drive health research with data at scale and the legal and ethical imperative to protect people’s privacy.”

Experts questioned whether Biobank will be able to fully regain control of the data released online. Despite researchers and GitHub having taken down most of the offending repositories in response to Biobank’s requests, many of the relevant files remained available on a code archive website until shortly before publication.

theguardian.com EN 2026 dataleak medical research health UK BioBank
Canadian Tire Data Breach Impacts 38 Million Accounts https://www.securityweek.com/canadian-tire-data-breach-impacts-38-million-accounts/
08/03/2026 11:44:35
QRCode
archive.org

securityweek.com
ByIonut Arghire| February 28, 2026 (6:50 AM ET)

More than 38 million accounts were affected by an October 2025 data breach at Canadian retail giant Canadian Tire.

The incident was discovered on October 2 and involved unauthorized access to an e-commerce database, the company said.

“The database contained basic personal information for customers who have an e-commerce account with one or more of Canadian Tire, SportChek, Mark’s/L’Équipeur and Party City,” the retail giant announced in October.

Canadian Tire said at the time that the compromised information included names, email addresses, dates of birth, encrypted passwords, and, in some cases, incomplete credit card numbers.

Fewer than 150,000 accounts had date of birth details compromised, the company said.

Canadian Tire also underlined that the password and credit card information could not be used to access users’ accounts or to perform fraudulent transactions and purchases, and that no Canadian Tire Bank information or Triangle Rewards loyalty data was compromised in the incident.

This week, the data set associated with the incident was added to the data breach notification website Have I Been Pwned.

According to the website, roughly 42 million records were compromised in the attack, including 38.3 million email addresses. In addition to the details shared by Canadian Tire, the leaked compromised data also includes addresses, phone numbers, and gender information.

“Passwords were stored as PBKDF2 hashes, and for a subset of records, dates of birth and partial credit card data were also included (card type, expiry, and masked card number),” Have I Been Pwned notes.

Canadian Tire has notified the affected individuals via email but has yet to publicly confirm the number of victims.

securityweek.com EN 2026 Canada Canadian-Tire dataleak
Scale AI exposed sensitive data about clients like Meta and xAI in public Google Docs, BI finds https://africa.businessinsider.com/news/scale-ai-exposed-sensitive-data-about-clients-like-meta-and-xai-in-public-google-docs/8p5f5ex
27/06/2025 15:00:35
QRCode
archive.org
thumbnail

As Scale AI seeks to reassure customers that their data is secure following Meta's $14.3 billion investment, leaked files and the startup's own contractors indicate it has some serious security holes.

  • Scale AI routinely uses public Google Docs for work with Google, Meta, and xAI.
  • BI reviewed thousands of files — some marked confidential, others exposing contractor data.
  • Scale AI says it's conducting a "thorough investigation."

Scale AI routinely uses public Google Docs to track work for high-profile customers like Google, Meta, and xAI, leaving multiple AI training documents labeled "confidential" accessible to anyone with the link, Business Insider found.

Contractors told BI the company relies on public Google Docs to share internal files, a method that's efficient for its vast army of at least 240,000 contractors and presents clear cybersecurity and confidentiality risks.

Scale AI also left public Google Docs with sensitive details about thousands of its contractors, including their private email addresses and whether they were suspected of "cheating." Some of those documents can be viewed and also edited by anyone with the right URL.

businessinsider.com EN 2025 ScaleAI dataleak Meta
Black Basta is latest ransomware group to be hit by leak of chat logs https://therecord.media/black-basta-ransomware-group-chat-logs-leaked
21/02/2025 16:53:01
QRCode
archive.org
thumbnail

Cybersecurity researchers are analyzing about 200,000 messages from inside the high-profile Black Basta ransomware operation that were leaked recently.

therecord EN 2025 BlackBasta ransomware dataleak messages logs
750 000 fichiers et dossiers patients sensibles français en fuite sur le dark web, que se passe-t-il ? https://www.clubic.com/actualite-544139-fichiers-et-dossiers-patients-sensibles-francais-en-fuite-sur-le-dark-web-que-se-passe-t-il.html
21/11/2024 09:50:23
QRCode
archive.org
thumbnail

[Article mis à jour le 19 novembre 2024 à 17h40] Un cybercriminel a mis en ligne, mardi, une base de données contenant les informations hospitalières et personnelles de plus de 750 000 personnes. Celui-ci revendique une fuite de données du logiciel de gestion médicale Mediboard.

clubic FR 2024 santé médicaux hôpitaux near2tlg dataleak Mediboard softway
Enterprise ServiceNow Knowledge Bases at Risk https://appomni.com/ao-labs/servicenow-knowledge-bases-data-exposures-uncovered/
20/09/2024 10:14:35
QRCode
archive.org
thumbnail

Read the blog to learn about ServiceNow’s Knowledge Base data exposure risks and how to mitigate these issues.

appomni EN 2024 ServiceNow dataleak Misconfiguration
All households in Scottish region to get alert about hackers publishing stolen medical data https://therecord.media/all-scottish-households-nhs-hack-alert
19/06/2024 19:37:23
QRCode
archive.org
thumbnail

The residents of Dumfries and Galloway are being warned their data was likely compromised in a February ransomware attack on the National Health Service (NHS).

therecord.media EN 2024 NHS Scotland dataleak medical data ransomware
Andrew Tate’s The Real World exposes 22M user messages https://cybernews.com/security/tates-real-world-exposes-user-messages/?ref=news.risky.biz
20/05/2024 10:06:10
QRCode
archive.org

The Real World, a learning platform from the controversial social media personality Andrew Tate, has leaked nearly a million users and over 22 million messages.

Hundreds of thousands of exposed users, millions of messages, and session tokens – that’s the reality that The Real World finds itself in.

The Cybernews research team has uncovered an exposed MongoDB instance with 88GB from one of The Real World’s servers.

cybernews EN 2024 The-Real-World Andrew-Tate dataleak messages MongoDB
Datasport subi un vol de données: 900’000 Suisses concernés https://www.ictjournal.ch/news/2024-02-05/datasport-subi-un-vol-de-donnees-900000-suisses-concernes
05/02/2024 15:52:29
QRCode
archive.org
thumbnail

Datasport, prestataire de services suisse pour les événements sportifs, a été victime d'une attaque informatiq

ictjournal 2024 FR CH Datasport suisse dataleak cyberattaque
Cybersécurité: plus de trois mois pour colmater une faille https://www.20min.ch/fr/story/cybersecurite-plus-de-trois-mois-pour-colmater-une-faille-543189047687
13/11/2023 15:37:11
QRCode
archive.org
thumbnail

Malgré une alerte lancée en juillet, Berne n’a rebouché qu’en novembre un accès à la maquette d’un portail destiné aux entreprises, EasyGov.

20min FR CH EasyGov dataleak maquette SECO Xplain
Boeing breach: LockBit leaks 50 GB of data https://cybernews.com/news/boeing-data-leak-lockbit-ransomware/
11/11/2023 12:10:19
QRCode
archive.org

The Boeing Company, a jetliner manufacturer and US defense contractor, had the company’s data leaked by the LockBit ransomware gang. So far, around 50 gigabytes of compressed data was uploaded LockBit's dark web blog.

LockBit has allegedly started leaking data that the gang stole from Boeing in late October. The Cybernews research team noted there's around of 50 GB of supposedly Boeing's data. Bulk of the data appears to be various backups.

cybernews EN LockBit Boeing DataLeak ransomware
Nude “before and after” photos stolen from plastic surgeon, posted online, and sent to victims' family and friends https://www.malwarebytes.com/blog/news/2023/11/nude-before-and-after-photos-stolen-from-plastic-surgeon-posted-online-and-sent-to-victims-family-and-friends
10/11/2023 09:49:44
QRCode
archive.org
thumbnail

The FBI is investigating a data breach where cybercriminals were able to steal patients’ records from a Las Vegas plastic surgeon's office and then publish them online.

malwarebytes EN 2023 FBI plastic surgeon DataLeak US photos nudes online
Microsoft AI Employee Accidentally Leaks 38TB of Data https://www.pcmag.com/news/microsoft-ai-employee-accidentally-leaks-38tb-of-data
18/09/2023 20:01:03
QRCode
archive.org
thumbnail

A software repository on GitHub dedicated to supplying open-source code and AI models for image recognition was left open to manipulation by bad actors thanks to an insecure URL.

pcmag EN 2023 DataLeak GitHub Microsoft 38TB
Shell Recharge security lapse exposed EV drivers’ data https://techcrunch.com/2023/06/09/shell-recharge-security-lapse-exposed-drivers-data/
12/06/2023 07:07:56
QRCode
archive.org
thumbnail

Oil giant Shell said it is investigating after a security researcher found an exposed internal database spilling the personal information of drivers who use the company’s electric vehicle charging stations.

techcrunch EN 2023 Leak Shell DataLeak database
Free VPN Service SuperVPN Exposes 360 Million User Records https://www.hackread.com/free-vpn-service-supervpn-leaks-user-records/
25/05/2023 08:21:34
QRCode
archive.org
thumbnail

This time, SuperVPN has exposed a whopping 133 GB of data, including personal details of its unsuspecting users, such as IP addresses.

hackeread EN 2023 SuperVPN DataLeak IP
Hackers leak 190GB of alleged Samsung data, source code https://www.bleepingcomputer.com/news/security/hackers-leak-190gb-of-alleged-samsung-data-source-code/
06/03/2022 20:22:16
QRCode
archive.org
thumbnail

The Lapsus$ data extortion group leaked today a huge collection of confidential data they claim to be from Samsung Electronics, the South Korean giant consumer electronics company.

DataBreach DataLeak Lapsus$ Samsung bleepingcomputer 2022 EN confidential
Ukrainian Researcher Leaks Conti Ransomware Gang Data https://www.bankinfosecurity.com/ukrainian-researcher-leaks-conti-ransomware-gang-data-a-18620
01/03/2022 08:49:19
QRCode
archive.org
thumbnail

A Ukrainian cybersecurity researcher has released a huge batch of data that came from the internal systems of the Conti ransomware gang. The researcher released the

Ukraine bankinfosecurity Conti ransomware dataleak EN 2022 gang chat logs
5028 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn