Tagged articles
57 articles
Page 1 of 1
Black & White Path
Black & White Path
May 11, 2026 · Information Security

FFBT Hit Again: Credential and Admin Access Data Breach by NormalLeVrai

In May 2026, VECERT flagged threat actor NormalLeVrai for stealing credentials and admin access from France’s Fédération Française de Ball‑Trap (FFBT), selling the data on dark‑web markets; the breach, still under investigation, highlights the actor’s focus on French organizations, low‑price bulk sales, and the need for immediate password resets, MFA, and continuous monitoring.

FFBTNormalLeVraicredential theft
0 likes · 6 min read
FFBT Hit Again: Credential and Admin Access Data Breach by NormalLeVrai
Black & White Path
Black & White Path
Apr 20, 2026 · Information Security

Is Cisco Facing an Epic Leak Crisis? The Triple Threat of Supply Chain, Source Code, and Keys

A high‑risk incident reported by ShinyHunters claims Cisco’s core source code, private keys, API tokens, AWS bucket rights, GitHub repositories, and millions of Salesforce records are being sold for $210,000, highlighting how simultaneous exposure of code and credentials can turn a data breach into an ecosystem‑wide compromise.

CiscoPrivate keysSupply Chain
0 likes · 5 min read
Is Cisco Facing an Epic Leak Crisis? The Triple Threat of Supply Chain, Source Code, and Keys
Black & White Path
Black & White Path
Apr 7, 2026 · Information Security

Ransomware ‘Shaming’ Attacks Surge: Over 2,000 Companies Exposed in 2026

Ransomware groups are increasingly using double‑extortion "shaming" tactics, publicly leaking stolen data to pressure victims, with Breachsense reporting more than 2,000 compromised firms in 2026, a 40% rise projected for the year, prompting new defensive strategies across industries.

cybersecuritydata breachdouble extortion
0 likes · 10 min read
Ransomware ‘Shaming’ Attacks Surge: Over 2,000 Companies Exposed in 2026
Black & White Path
Black & White Path
Apr 3, 2026 · Information Security

Cisco Faces New Data Breach Ultimatum After ShinyHunters Exposes FBI, NASA Records

In March 2026, the ShinyHunters ransomware group claimed to have breached Cisco's Salesforce CRM, GitHub repositories, and AWS S3 buckets, stealing over 3 million records that include personnel data from U.S. agencies such as the FBI, DHS, IRS, NASA, as well as Australian and Indian government entities, and issued an ultimatum for Cisco to respond by April 3.

AWSCiscoOAuth
0 likes · 9 min read
Cisco Faces New Data Breach Ultimatum After ShinyHunters Exposes FBI, NASA Records
Black & White Path
Black & White Path
Apr 1, 2026 · Industry Insights

2026 Global Data Heist: How Salesforce Became Hackers’ Cash Cow

The article breaks down the 2026 ShinyHunters breach list by industry, revealing that Salesforce systems were the primary target, and details massive data exposures across finance, government, retail, and social platforms while urging victims to secure accounts and avoid downloading the leaked files.

2026Industry analysisSalesforce
0 likes · 5 min read
2026 Global Data Heist: How Salesforce Became Hackers’ Cash Cow
Black & White Path
Black & White Path
Mar 31, 2026 · Information Security

ShinyHunters Dumps BreachForums Database, Triggering Massive Trust Collapse

On March 30, 2026, the notorious hacker group ShinyHunters announced its exit from BreachForums and released the forum’s full database of over 324,000 users—including usernames, emails, IPs, login logs, and password salts—sparking a crisis of anonymity, trust, and potential law‑enforcement honeypot exposure.

AI forensicsBreachForumsShinyHunters
0 likes · 4 min read
ShinyHunters Dumps BreachForums Database, Triggering Massive Trust Collapse
Black & White Path
Black & White Path
Mar 25, 2026 · Information Security

Nearly 1 PB of Data Allegedly Stolen from Outsourcing Giant Telus Digital

Telus Digital confirmed a breach in which the ShinyHunters group claims to have exfiltrated close to 1 petabyte of data by leveraging Google Cloud credentials stolen from a prior Salesloft/Drift breach, affecting numerous customers and prompting a $65 million ransom demand.

Google CloudSaaS supply chainShinyHunters
0 likes · 7 min read
Nearly 1 PB of Data Allegedly Stolen from Outsourcing Giant Telus Digital
Black & White Path
Black & White Path
Mar 23, 2026 · Information Security

When Identity Protection Fails: Aura Breaches 900K Records via Vishing Attack

Aura, a provider of identity‑theft protection services, disclosed that a phone‑phishing (vishing) attack in March 2026 exposed roughly 900,000 customer names and email addresses, prompting analysis of the attack vector, MITRE ATT&CK mapping, and lessons on supply‑chain risk and defense‑in‑depth.

AURAMITRE ATT&CKdata breach
0 likes · 7 min read
When Identity Protection Fails: Aura Breaches 900K Records via Vishing Attack
Black & White Path
Black & White Path
Mar 14, 2026 · Information Security

360training Data Breach Exposes 24,594 Customers – What It Means for Online Education Security

A recent breach at the US‑based online vocational training platform 360training exposed personal, payment, and credential data of 24,594 customers, highlighting systemic security gaps in the online education sector and prompting detailed recommendations for both platform operators and users to mitigate identity‑theft and trust risks.

User Privacydata breachinformation security
0 likes · 10 min read
360training Data Breach Exposes 24,594 Customers – What It Means for Online Education Security
Black & White Path
Black & White Path
Feb 19, 2026 · Information Security

FIIG Securities fined over $1.2M for 385 GB customer data breach

Australia’s ASIC fined FIIG Securities AU$2.5 million (≈CNY 12 million) and ordered AU$0.5 million in costs after a 2023 breach exposed 385 GB of client data—including IDs, passports and bank details—highlighting numerous security compliance failures such as missing MFA, weak passwords, and lack of penetration testing.

ALPHVASICAustralia
0 likes · 4 min read
FIIG Securities fined over $1.2M for 385 GB customer data breach
Efficient Ops
Efficient Ops
Oct 12, 2025 · Information Security

What Exposed the AI Companion Apps? A Deep Dive into the Massive Data Leak

A recent breach of the AI companion apps Chattee and GiMe Chat exposed over 40 million private conversations, hundreds of thousands of media files, and transaction records due to publicly accessible Kafka brokers lacking any authentication, putting user privacy and security at serious risk.

AI securityKafkadata breach
0 likes · 3 min read
What Exposed the AI Companion Apps? A Deep Dive into the Massive Data Leak
Efficient Ops
Efficient Ops
Sep 9, 2025 · Information Security

What Dior’s Shanghai Data Breach Reveals About China’s Personal Information Protection Law

In May 2024, Dior Shanghai faced an administrative investigation for illegally transferring user data abroad, failing to obtain explicit consent, and neglecting encryption, highlighting critical compliance gaps under China’s Personal Information Protection Law and prompting a strong security reminder for data handlers.

China cybersecurity lawDiorcross‑border data transfer
0 likes · 3 min read
What Dior’s Shanghai Data Breach Reveals About China’s Personal Information Protection Law
21CTO
21CTO
Apr 11, 2025 · Information Security

Oracle Cloud Breach: What Happened and Why OCI Claims No Impact

Oracle disclosed that attackers stole data from its legacy Cloud Classic servers, posted the breach on security forums, and claimed millions of records were compromised, while the company insists its Oracle Cloud Infrastructure was never breached, prompting widespread criticism and concern.

OCIOraclecloud security
0 likes · 5 min read
Oracle Cloud Breach: What Happened and Why OCI Claims No Impact
21CTO
21CTO
Apr 3, 2025 · Information Security

Why 56% of Open‑Source Packages Trigger Data Leaks – Sonatype’s Q1 2025 Malware Index

Sonatype’s Q1 2025 Open‑Source Malware Index identified 17,954 malicious packages—including hijacked npm crypto modules, a fake Truffle for VS Code extension, and counterfeit Solana packages—revealing that 56% of these components are associated with data breaches, a sharp rise from the 26% reported in Q4 2024, and highlighting the growing prevalence of complex, threat‑laden malware such as droppers and code‑injection threats.

data breachinformation securitymalware
0 likes · 2 min read
Why 56% of Open‑Source Packages Trigger Data Leaks – Sonatype’s Q1 2025 Malware Index
Open Source Linux
Open Source Linux
Apr 3, 2025 · Information Security

What Oracle’s Massive Cloud Data Breach Reveals About Cloud Security Risks

Oracle’s recent cloud security breach, allegedly exposing six million records from dozens of customers worldwide, has sparked FBI investigations, a class‑action lawsuit, and revelations about outdated middleware and evidence‑tampering, highlighting critical risks in cloud infrastructure and the need for stronger data protection.

Oracleclass action lawsuitcloud security
0 likes · 9 min read
What Oracle’s Massive Cloud Data Breach Reveals About Cloud Security Risks
21CTO
21CTO
Mar 7, 2024 · Information Security

What the LINE Data Breach Reveals About Tech‑Stack Security and Governance

In December 2023 a massive data breach exposed over 510,000 LINE users, prompting the Japanese government to order LINE and its parent NAVER to overhaul their shared technology stack, tighten authentication, and separate their cloud infrastructures to prevent future security failures.

Technology Stackcloud securitydata breach
0 likes · 6 min read
What the LINE Data Breach Reveals About Tech‑Stack Security and Governance
php Courses
php Courses
Jul 6, 2023 · Information Security

Anonymous Sudan Claims to Have Stolen Microsoft Customer Database; Microsoft Denies the Allegations

Anonymous Sudan alleges it has breached Microsoft’s servers and obtained a database containing over 30 million customer credentials, while Microsoft firmly denies any such breach, prompting widespread debate over the hacker group’s capabilities, motives, and the broader implications for information security.

Anonymous SudanCyberattackMicrosoft
0 likes · 4 min read
Anonymous Sudan Claims to Have Stolen Microsoft Customer Database; Microsoft Denies the Allegations
ITPUB
ITPUB
Jun 9, 2023 · Information Security

The 70 Largest Data Breaches in History: Impact, Details, and Lessons Learned

This comprehensive list chronicles the 70 biggest data breach incidents ever recorded, detailing dates, affected records, compromised data types, and the security failures that exposed personal information for companies ranging from social networks to financial institutions.

cybersecuritydata breachinformation security
0 likes · 43 min read
The 70 Largest Data Breaches in History: Impact, Details, and Lessons Learned
Programmer DD
Programmer DD
Dec 12, 2022 · Information Security

When a Departing Engineer Locked Down a Company Server: Lessons in InfoSec

A former IT employee in Guangdong’s Nanhai district remotely encrypted his former employer’s server after resigning, causing a complete system shutdown and significant financial loss, prompting police to investigate the incident as a serious information‑security breach and sparking public debate about ethical use of technology.

data breachethical hackinginsider threat
0 likes · 5 min read
When a Departing Engineer Locked Down a Company Server: Lessons in InfoSec
21CTO
21CTO
Jun 20, 2022 · Information Security

How an iCloud Hacker Stole Thousands of Nude Photos and Got 9 Years in Prison

A U.S. hacker known as "icloudripper4you" infiltrated thousands of iCloud accounts, stole massive amounts of nude photos and videos, and was sentenced to nine years in prison, highlighting the severe impact of cyber‑crime and the FBI's commitment to prosecuting such offenses.

cybercrimedata breachiCloud hack
0 likes · 4 min read
How an iCloud Hacker Stole Thousands of Nude Photos and Got 9 Years in Prison
21CTO
21CTO
Apr 18, 2022 · Information Security

How Stolen OAuth Tokens Let Attackers Access Private GitHub Repositories

GitHub revealed that attackers exploited stolen OAuth tokens from third‑party services like Heroku and Travis‑CI to download private repository data, prompting a rapid revocation of tokens and ongoing investigation into the breach.

GitHubHerokuOAuth
0 likes · 3 min read
How Stolen OAuth Tokens Let Attackers Access Private GitHub Repositories
MaGe Linux Operations
MaGe Linux Operations
Aug 22, 2021 · Information Security

What Happens When an Elasticsearch Database Exposes 2 Million Sensitive Records?

In July, security researcher Bob Diachenko uncovered an exposed Elasticsearch cluster leaking nearly two million personal records—including passport details and no‑fly indicators—highlighting the severe impact of unsecured Elasticsearch deployments and offering recommendations to prevent future breaches.

Elasticsearchdata breachinformation security
0 likes · 5 min read
What Happens When an Elasticsearch Database Exposes 2 Million Sensitive Records?
Java Architect Essentials
Java Architect Essentials
Jun 12, 2021 · Information Security

China's First Nationwide Case of Illegal WeChat Data Harvesting via "Clean Fan" Software

In September 2022, Nantong police uncovered China's first nationwide case of illegal WeChat user data harvesting using a "clean fan" application, leading to the arrest of eight suspects who were convicted for illegally obtaining computer system data and controlling systems, highlighting severe information security risks.

ChinaWeChatcybercrime
0 likes · 7 min read
China's First Nationwide Case of Illegal WeChat Data Harvesting via "Clean Fan" Software
ITPUB
ITPUB
May 29, 2021 · Information Security

When a Resigned Developer Deletes Company Data: A Real‑World InfoSec Crime Case

The article recounts a high‑profile Chinese case where a former developer, after a salary dispute, exploited server vulnerabilities to delete critical user data and application files, leading to massive user impact, a court trial, and an eleven‑month prison sentence under computer‑information‑system sabotage laws.

computer crimedata breachdata deletion
0 likes · 6 min read
When a Resigned Developer Deletes Company Data: A Real‑World InfoSec Crime Case
21CTO
21CTO
Mar 15, 2021 · Information Security

How a Rookie SQL Mistake by a Former Facebook CTO Led to a $500K Gab Breach

A former Facebook engineer serving as Gab's CTO introduced a simple SQL injection flaw, which hackers exploited to steal data from 15,000 users, prompting a $500,000 ransom demand, code deletion, and a heated debate over CTO responsibilities and security best practices.

CTOGitSQL injection
0 likes · 8 min read
How a Rookie SQL Mistake by a Former Facebook CTO Led to a $500K Gab Breach
21CTO
21CTO
Mar 3, 2021 · Information Security

9 Real-World Data Breaches Every Developer Should Learn From

This article reviews nine major data breach incidents—from Clearview AI to Yahoo—detailing their scope, compromised data types, and impact, and emphasizes the importance of robust security practices for developers to prevent such losses.

Case Studydata breachinformation security
0 likes · 10 min read
9 Real-World Data Breaches Every Developer Should Learn From
ITPUB
ITPUB
Dec 15, 2020 · Information Security

How Dark‑Web Ransomware Hijacks MySQL Databases and Sells Them for $550

The article explains how ransomware gangs steal MySQL databases, automate ransom‑payment portals on the dark web, auction unsold data, and accept Bitcoin, revealing the scale of over 85,000 databases for sale at roughly $500‑$550 each.

dark webdata breachinformation security
0 likes · 4 min read
How Dark‑Web Ransomware Hijacks MySQL Databases and Sells Them for $550
Architect's Tech Stack
Architect's Tech Stack
Dec 5, 2020 · Information Security

Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences

In February 2020, a core operations engineer at Micro-Alliance maliciously deleted the company's production databases, causing over ten billion yuan in market loss, massive user disruption, and a six‑year prison sentence, while highlighting broader industry risks and the need for stronger security controls.

cybercrimedata breachdatabase deletion
0 likes · 8 min read
Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences
Programmer DD
Programmer DD
Sep 25, 2020 · Information Security

Misconfigured ElasticSearch Server Exposes Millions of Bing Mobile Users' Data

A misconfigured ElasticSearch server owned by Microsoft leaked millions of Bing mobile app search queries, location data, device IDs and other details, exposing users worldwide to phishing, ransomware and even robbery risks, while Microsoft claims the breach affected only a small amount of non‑identifiable data.

bing mobiledata breachelastic search
0 likes · 6 min read
Misconfigured ElasticSearch Server Exposes Millions of Bing Mobile Users' Data
ITPUB
ITPUB
Sep 24, 2020 · Information Security

What Happens When Bing’s Mobile Apps Leak Over 6.5 TB of User Data?

A recent investigation revealed that an unsecured server containing more than 6.5 TB of user data from Bing’s iOS, iPadOS, and Android apps was exposed, allowing attackers to harvest nearly 100 million records and launch destructive “Meow” attacks that nearly wiped the Elasticsearch database.

BingElasticsearchMeow Attack
0 likes · 6 min read
What Happens When Bing’s Mobile Apps Leak Over 6.5 TB of User Data?
ITPUB
ITPUB
Sep 23, 2020 · Information Security

What the Bing Mobile Data Leak Means for Your Privacy

A massive breach exposed over 6.5 TB of Bing mobile app data—including search queries, location coordinates, device identifiers, and URLs—on an unsecured Elasticsearch server, putting iOS and Android users at risk of fraud, phishing, and physical threats, while highlighting common causes of such leaks.

BingElasticsearchUser Privacy
0 likes · 6 min read
What the Bing Mobile Data Leak Means for Your Privacy
Liangxu Linux
Liangxu Linux
Aug 5, 2020 · Information Security

How to Check If Your Accounts Were Sold on the Dark Web and Secure Them

The article lists major 2020 data‑breach incidents worldwide, explains how to use HaveIBeenPwned to discover whether your credentials have been exposed, and offers practical advice on password hygiene and reliable password‑manager tools to protect your online accounts.

cybersecuritydata breachhaveibeenpwned
0 likes · 5 min read
How to Check If Your Accounts Were Sold on the Dark Web and Secure Them
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Mar 25, 2020 · Information Security

Understanding Weibo Data Breaches: Credential Stuffing, Database Dumping, and Data Laundering

The article explains the recent Weibo data breach, describing how attackers used credential‑stuffing (撞库), data leakage (漏水), database dumping (拖库) and data laundering (洗库) to obtain millions of user records, the technical steps involved, and the security implications for both users and platforms.

Weibocredential stuffingdata breach
0 likes · 6 min read
Understanding Weibo Data Breaches: Credential Stuffing, Database Dumping, and Data Laundering
Architecture Digest
Architecture Digest
Feb 28, 2020 · Information Security

Insider Data Deletion Incident at Weimob Causes Over HK$1 Billion Loss

In late February 2023, a core operations engineer at Weimob maliciously accessed the internal network and deleted production data, causing a 24‑hour outage of numerous merchant mini‑programs, leading to over HK$1 billion in market value loss and prompting legal action.

Cloud ServicesWeimobdata breach
0 likes · 5 min read
Insider Data Deletion Incident at Weimob Causes Over HK$1 Billion Loss
21CTO
21CTO
Feb 25, 2020 · Operations

Inside the Massive SaaS Data Deletion: How a Core Engineer Wiped Out Millions

A Chinese SaaS provider suffered a catastrophic data loss when a core operations employee maliciously deleted its production databases, prompting emergency repairs, police involvement, and a multi‑day recovery effort that exposed critical gaps in permission management and backup strategies.

BackupOperationsSaaS
0 likes · 8 min read
Inside the Massive SaaS Data Deletion: How a Core Engineer Wiped Out Millions
ITPUB
ITPUB
Dec 13, 2019 · Information Security

Why ElasticSearch Data Breaches Keep Happening: 2.7 B Emails Exposed

A recent ElasticSearch breach exposed 2.7 billion email addresses, one‑billion plain‑text passwords and hundreds of thousands of birth‑certificate copies, highlighting persistent security gaps in cloud‑based search services despite growing corporate safeguards.

Elasticsearchcloud storagedata breach
0 likes · 4 min read
Why ElasticSearch Data Breaches Keep Happening: 2.7 B Emails Exposed
21CTO
21CTO
Dec 20, 2018 · Information Security

Why Facebook’s Data‑Sharing Deals Are Triggering Legal Battles and Privacy Outrage

Facebook faces a wave of legal and regulatory scrutiny after the DC Attorney General sued the company over alleged privacy violations tied to the Cambridge Analytica scandal, while new reports reveal extensive data‑sharing agreements with over 150 tech firms and multiple recent data breaches affecting tens of millions of users.

Facebookdata breachregulation
0 likes · 9 min read
Why Facebook’s Data‑Sharing Deals Are Triggering Legal Battles and Privacy Outrage
21CTO
21CTO
Aug 28, 2018 · Information Security

500 Million Hotel Records Exposed: How the Massive Data Leak Impacts Your Privacy

A recent dark‑web sale revealed that over 500 million records from dozens of Huazhu hotel brands—including personal IDs, booking details, and login credentials—were compromised, prompting urgent security advice and highlighting the growing risks of large‑scale data breaches.

cybercrimedata breachhotel security
0 likes · 6 min read
500 Million Hotel Records Exposed: How the Massive Data Leak Impacts Your Privacy
Efficient Ops
Efficient Ops
Jun 13, 2018 · Information Security

AcFun Data Breach Exposes Millions – How to Safeguard Your Account

In early June, AcFun announced a massive hack that leaked nearly ten million user records, including IDs, nicknames and encrypted passwords, urging users—especially those who haven’t logged in since July 2017 or use weak passwords—to change them immediately, while noting that the data is already being sold on the dark web.

AcFundark webdata breach
0 likes · 4 min read
AcFun Data Breach Exposes Millions – How to Safeguard Your Account
21CTO
21CTO
Mar 24, 2018 · Information Security

Inside the Facebook‑Cambridge Analytica Scandal: What Went Wrong and Why It Matters

The Facebook‑Cambridge Analytica scandal exposed the illicit harvesting of 50 million users' data, political manipulation allegations, multiple investigations, a sharp stock plunge, executive resignations, and heightened global scrutiny of data‑privacy practices.

Cambridge AnalyticaFacebookdata breach
0 likes · 17 min read
Inside the Facebook‑Cambridge Analytica Scandal: What Went Wrong and Why It Matters
MaGe Linux Operations
MaGe Linux Operations
Dec 28, 2017 · Operations

Top 12 Linux Ops Disasters of 2017 and What They Teach Us

From Hearthstone’s dual‑database crash to Uber’s massive data breach, this 2017 Linux operations roundup chronicles twelve critical incidents—highlighting backup failures, Docker rebranding, ransomware, BGP hijacking, and more—offering key lessons for sysadmins and DevOps professionals.

BGPBackupDocker
0 likes · 14 min read
Top 12 Linux Ops Disasters of 2017 and What They Teach Us
ITPUB
ITPUB
Jan 16, 2017 · Information Security

Why Thousands of MongoDB Databases Were Wiped and Ransomed – What You Must Do

Thousands of MongoDB databases were erased and replaced with ransom demands, yet almost no victims recovered their data, highlighting widespread misconfigurations, public exposure on Shodan, and the urgent need for proper security hardening of MongoDB deployments.

Database SecurityMongoDBShodan
0 likes · 4 min read
Why Thousands of MongoDB Databases Were Wiped and Ransomed – What You Must Do
Efficient Ops
Efficient Ops
May 30, 2016 · Information Security

Why Weak Passwords and Unpatched Redis Threaten Operational Security

The article explains how weak passwords, misconfigured services like Redis, careless port changes, and leaked data enable attackers to compromise servers and internal networks, illustrating each risk with real‑world case studies and offering practical mitigation advice for robust ops security.

Redis vulnerabilitydata breachincident response
0 likes · 11 min read
Why Weak Passwords and Unpatched Redis Threaten Operational Security