Latest news with #databreach


Fox News
2 hours ago
- Business
- Fox News
Massive data breach exposes 184 million passwords and logins
Data breaches are no longer rare events but a persistent problem. We've been seeing regular incidents at public-facing companies across various sectors, including healthcare, retail and finance. While bad actors are certainly to blame, these corporations aren't entirely without fault. They often make it easy for hackers to access user data by failing to protect it properly. A recent example came to light when a cybersecurity researcher discovered an open database containing over 184 million account credentials. Cybersecurity researcher Jeremiah Fowler has revealed the existence of an open database that contains 184,162,718 million account credentials. These include email addresses, passwords, usernames and URLs for platforms such as Google, Microsoft, Apple, Facebook and Snapchat. The information also covers banking services, medical platforms and government accounts. Most shockingly, the entire dataset was left completely unsecured. There was no encryption, no authentication required and no form of access control. It was simply a plain text file sitting online for anyone to find. Fowler located the database during routine scanning of publicly exposed assets. What he found was staggering. The file included hundreds of millions of unique records containing user credentials linked to the world's largest technology and communication platforms. There were also account details for financial services and official portals used by state institutions. The file was not protected in any way. Anyone who discovered the link could open it in a browser and instantly view sensitive personal data. No software exploit was needed. No password was asked for. It was as open as a public document. Fowler believes the data was harvested using an infostealer. These lightweight tools are favored by cybercriminals for their ability to silently extract login credentials and other private information from compromised devices. Once stolen, the data is often sold on dark web forums or used in targeted attacks. After reporting the breach, the hosting provider quickly removed access to the file. However, the owner of the database remains unknown. The provider did not disclose who uploaded it or whether the database was part of a legitimate archive that was accidentally published. Fowler could not determine whether this was the result of negligence or an operation with malicious intent. To verify the data, Fowler contacted some individuals listed in the records. Several confirmed that the information was accurate. This confirmation turns what might seem like abstract statistics into something very real. These were not outdated or irrelevant details. These were live credentials that could allow anyone to hijack personal accounts in seconds. 1. Change your password on every platform: If your login credentials have been exposed, it's not enough to change the password on just one account. Cybercriminals often try the same combinations across multiple platforms, hoping to gain access through reused credentials. Start by updating your most critical accounts, email, banking, cloud storage and social media, then move on to others. Use a new, unique password for each platform and avoid variations of old passwords, as they can still be predictable. Consider using a password manager to generate and store complex passwords. Our top-rated password manager delivers powerful protection to help keep your accounts secure. It features real-time data breach monitoring to alert you if your login details have been exposed, plus a built-in data breach scanner that checks your saved emails, passwords and credit card information against known leak databases. A password health checker also highlights weak, reused or compromised passwords so you can strengthen your online defenses with just a few clicks. Get more details about my best expert-reviewed Password Managers of 2025 here. 2. Enable two-factor authentication: Two-factor authentication, or 2FA, is a critical security feature that drastically reduces the risk of unauthorized access. Even if someone has your password, they won't be able to log in without the second verification step, usually a one-time code sent to your phone or an authenticator app. Enable 2FA on all services that support it, especially your email, financial accounts and any service that stores sensitive personal data. 3. Watch for unusual account activity: After a breach, it's common for compromised accounts to be used for spam, scams, or identity theft. Pay close attention to signs such as login attempts from unfamiliar locations, password reset requests you didn't initiate or unexpected messages sent from your accounts. Most platforms allow you to review login history and connected devices. If you see something off, take action immediately by changing your password and revoking suspicious sessions. 4. Invest in personal data removal services: You should also consider a data removal service. Given the scale and frequency of breaches like the one described above, relying on personal caution alone is no longer enough. Automated data removal services can provide an essential extra layer of defense by continuously scanning for and helping eliminate your exposed information from data broker sites and other online sources. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web. 5. Avoid clicking on suspicious links and use strong antivirus software: One of the most common post-breach threats is phishing. Cybercriminals often use information from leaked databases to craft convincing emails that urge you to verify your account or reset your password. Never click on links or download attachments from unknown or suspicious sources. Instead, visit websites by typing the URL directly into your browser. The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 6. Keep your software and devices up to date: Many cyberattacks exploit known vulnerabilities in outdated software. Operating systems, browsers, antivirus programs and even apps need to be updated regularly to patch security flaws. Turn on automatic updates wherever possible so you're protected as soon as fixes are released. Staying current with your software is one of the easiest and most effective ways to block malware, ransomware and spyware from infiltrating your system. Security is not only the responsibility of companies and hosting providers. Users need to adopt better practices, including unique passwords, multifactor authentication and regular reviews of their digital footprint. The careless exposure of over 184 million credentials is not just a mistake. It is an example of how fragile our systems remain when even basic protection is absent. In an era where artificial intelligence, quantum computing, and global connectivity are reshaping technology, it is unacceptable that plain text files containing financial and governmental credentials are still left sitting online. Do you feel that companies are doing enough to protect your data from hackers and other cyber threats? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels: Answers to the most-asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.
Yahoo
7 hours ago
- Politics
- Yahoo
Russian hackers target Greek company
Nespresso customers in Greece received a notification on 21 May about a possible personal data leak following a cyberattack on its logistics partner, Orphee Beinoglou International Transportation. Source: Ekathimerini, as reported by European Pravda Details: In February 2025, a Russian-speaking ransomware group called Clop claimed responsibility for the attack. The compromised data may include the names, phone numbers, addresses, email addresses, and tax numbers of customers who submit invoices. Nespresso advised customers to be cautious about emails or phone calls asking for personal or financial information. They should also avoid opening links or attachments from unknown sources and use security software on their devices. A representative of Orphee Beinoglou confirmed the breach, stating that the company had notified its partners, ensured that no financial data had been leaked, and strengthened its security measures. The Clop group, which has been active since 2019, was brought to the FBI's attention in 2023 due to attacks on US federal agencies. Experts recorded 384 violations by Clop in 2023. The Greek Data Protection Authority and the National Cybersecurity Authority were informed. Separately, Adidas customers in Greece received similar messages. Background: On 29 May, Polish Prime Minister Donald Tusk announced the extension of the BRAVO and BRAVO–CRP alert levels due to increased hybrid threats from Russia and Belarus ahead of the second round of presidential elections. Krzysztof Gawkowski, Polish Deputy Prime Minister and Minister of Digital Affairs, said Russia was making an unprecedented attempt to interfere in the presidential election. Support Ukrainska Pravda on Patreon!
Yahoo
12 hours ago
- Business
- Yahoo
MSU hosts cybersecurity conference
LANSING, Mich. (WLNS) — Be careful who you talk to online. That's one of the key takeaways from a cybersecurity conference held at Michigan State University Friday. 'Cybercrime is a huge problem that affects virtually everyone in society, whether you know it or not, there is data breaches that you might not even be aware of where your data is compromised, but there's computer hacks that compromise your computer,' Tom Holt, a professor in Criminal Justice at MSU. 'There's cyber stalking, there's harassment, there's all kinds of sexual offenses and interpersonal crimes. Really, anything that happens in physical space.' The goal of the event was to inform and educate business owners, city officials, and law enforcement about the potential dangers they could face online. The event comes after the Ingham County Sheriff's office recently reported an uptick in cyber crimes. 'To talk about different kinds of cybercrime, different strategies for cybersecurity, and to share some of the more cutting-edge research that's happening so people can take things back to their agencies or their organizations and do different work,' said Holt. Holt says criminals online will target anyone. 'As an example, you might see seniors being more susceptible to certain kinds of fraud because they may have a lack of understanding or knowledge, they may be a little more lonely or a little more willing to answer friend requests, but that's true,' said Holt. 'People on dating apps and any other place where you're interacting with people who you don't know.' Participants at today's conference told 6 News they wanted to learn how to protect themselves and the community. 'Cybercrime, the biggest concern is scale, right? Everybody can be accessed through their phone, through their computer, and so whether or not you're careful with your information can be really important, because even if they access your devices, if you have proper encryption or proper safety precautions, then it's a lot harder for them to get at your actual information,' said Dr. Fisher, an associate researcher with a focus on cybersecurity at MSU. To fight back against cybercrime, Dr. Fischer has some tips. 'People know to use strong passwords, they know not to click on links that come from people they don't know. But the important thing is, is not to give over any information, and even if you do find yourself in a conversation with someone that you think is a scam,' says Dr. Fischer. 'Hammer not giving up that personal information or giving any personal details, and it can really help kind of cut them off'. Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.


Khaleej Times
a day ago
- Business
- Khaleej Times
Netflix password at risk? New report says millions of accounts hacked
When was the last time you changed your Netflix account password or replaced your credentials for Disney+ or Amazon Prime video? Perhaps it is time to revisit the privacy's page to make these changes. In a recent report, Kaspersky, the global cybersecurity and anti-virus company, said that it identified over seven million compromised accounts belonging to various popular streaming services. "These weren't stolen directly from the platforms themselves but were collected as part of broader credential theft campaign s," the company clarified though. The Moscow-based company's Digital Footprint Intelligence team uncovered a total of 7,035,236 breaching cases in 2024. Among those there are 5,632,694 compromised Netflix accounts. Brazil had the highest number of exposed Netflix credentials, followed by Mexico and India, the report went on to say. Netflix Mena did not immediately respond to requests for comment when contacted by Khaleej Times. As of December 2024, Netflix had approximately three million subscribers in the Middle East and North Africa region. As for Disney+, experts detected 680,850 Disney+ accounts in leaked datasets and Brazil again topped the list of affected countries, followed by Mexico and Germany. Subscribers of Amazon Prime Video also fell victim to this hacking scheme, though smaller in volume with 1,607 compromised accounts. The top three countries with compromised accounts on the streaming service were Mexico, Brazil, and France. "As streaming platforms, fandom culture, and social media become deeply woven into Gen-Z's everyday experience, cyberthreats are adapting to target the spaces they trust most", Kaspersky said. Kaspersky safety tips If you feel your account has been compromised, change passwords for the potentially compromised credentials and ensure there has been no suspicious activity associated with these accounts. Always use a legitimate, paid subscription when accessing streaming services and ensure you're using apps from official marketplaces or the official websites. Stick to trusted, official pages when watching or downloading content and double-check URLs and company name spellings to avoid phishing sites. Be cautious about the file extensions you're downloading. Video files should not have .exe or .msi extensions — these are typically associated with harmful programs.


CNA
2 days ago
- Business
- CNA
At least 146 Income Insurance customers hit by ransomware attack on data handling firm
SINGAPORE: A ransomware attack on a Singapore-based data handling service provider has compromised the personal information of at least 146 Income Insurance policy holders. The company in question, DataPost, is in the early stages of investigating the attack, the firm said on Thursday (May 29). DataPost was responsible for the printing and mailing of some of Income Insurance policy holders' documents, the insurer said in a separate statement, adding that affected customers' bonus statements had been compromised. DataPost, which works with government agencies and financial institutions, among others, told CNA its investigations "will take time to complete". In response to queries from CNA, a spokesperson from the Personal Data Protection Commission (PDPC) said that it is aware of the case and is also investigating. A spokesperson from the Cyber Security Agency told CNA that the agency is aware of the incident and has reached out to DataPost to offer assistance. "We are keeping a close watch on developments," they added. In ransomware attacks, threat actors typically use malicious software to encrypt files on servers, then demand a ransom in exchange for unlocking these files. The attack on DataPost was flagged on May 27 by infosecurity blog RedPacket Security and cybersecurity platform HookPhish. The breach led to data exfiltration, or the unauthorised transfer of data, and appeared to involve multiple tools and personnel, suggesting a coordinated attack, according to RedPacket Security. The threat group was identified as "direwolf", and allegedly used various infostealers – or malicious software that breaches computer systems – to gather the data. CNA has contacted DataPost for further comment on the scale and severity of the attack. INCOME INSURANCE COMPROMISED In its statement, Income Insurance said that it was alerted to the incident on Sunday. The compromised data included information such as names, postal addresses, policy numbers and plans, and annual bonuses for the year 2024. Upon being notified, the insurer immediately suspended all printing jobs with DataPost. The company also blocked connections to DataPost and reinforced firewall restrictions. Income Insurance said it was on "heightened alert" to monitor for any suspicious activity, and is reaching out to all policy holders who might have been impacted by the breach, the company said. It added that there is currently no evidence of unauthorised access to any of its digital platforms and that it will "work closely" with both relevant authorities and DataPost to assess the full impact of the incident. The insurer's CEO Andrew Yeo said that protecting the privacy and security of policy holders' personal information was of "utmost importance". "We believe in informing our policy holders promptly and empathise with the concern this incident may cause," he said, adding that the company will continue to provide updates as more information becomes available. DataPost provides e-invoicing services to financial institutions, insurance companies, telecommunication companies and government agencies in Singapore and Malaysia. It handles over 40 million documents per month, according to its website. The company said its facilities are audited annually by banks and third-party auditors to ensure compliance with data security and operational security requirements. Singapore's Infocomm Media Development Authority (IMDA) has accredited DataPost as the service provider for InvoiceNow, a nationwide e-invoicing network. Through InvoiceNow, companies can transmit e-invoices in a standard digital format across different finance systems. DataPost told CNA that it will comply with all regulatory obligations throughout the course of the investigation.