Trending

#DataLeaks

Latest posts tagged with #DataLeaks on Bluesky

Latest Top
Trending

Posts tagged #DataLeaks

Preview
How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows Learn to audit AI agents and stop data leaks. Join our webinar to find hidden risks and secure your modern agentic workflows.

How to Stop #AI #DataLeaks: A Webinar Guide to Auditing Modern #Agentic #Workflows

thehackernews.com/2026/03/how-...

0 0 0 0

"Fuite de données médicales : la ministre de la Santé révèle une erreur monumentale"

#Data #DataLeaks #PotatoSécurité #DataEngineering #DonnéesMédicales ... Cegedim convoqué à Bercy...

www.01net.com/actualites/f...

1 0 0 0
Preview
Fuite de données médicales : la ministre de la Santé révèle une négligence monumentale La fuite de données de médicales qui a touché des millions de Français découle d'une négligence inouïe. Quelques semaines après la mise en ligne des données sur le dark web, on apprend que l'éditeur C...

"Fuite de données médicales : la ministre de la Santé révèle une erreur monumentale"

#Data #DataLeaks #CyberSécurité #DataEngineering #DonnéesMédicales ... Cegedim convoqué à Bercy...

www.01net.com/actualites/f...

1 1 0 0
Post image

👀👏

#YouTube - www.youtube.com/@SwitchedtoL...

#Odysee - odysee.com/@switchedtol...

#Rumble - rumble.com/c/SwitchedTo...

#Bitchute - www.bitchute.com/channel/uf9h...

PODCAST: podcast.switchedtolinux.com

#Tech #Technology #SocialMedia #ageverification #dataleaks #kyc

0 1 0 0

🔍 Discover why energy data leaks pose a greater risk than outages. Our latest discussion delves into the strategic exposure and long-term intelligence value involved. https://youtu.be/CGK #Energy #CyberSecurity #DataLeaks

0 0 0 0
Preview
Researchers Identify Previously Undocumented Malware Used in World Leaks Intrusions   Cybersecurity researchers have identified a newly developed malicious software tool being used by the extortion-focused cybercrime group World Leaks, marking a pivotal dent the group’s technical capabilities. According to findings published by the cybersecurity research division of Accenture, the malware has not been observed in prior investigations and appears to be custom-built for covert operations within victim networks. The researchers have designated the tool “RustyRocket” to distinguish it from previously documented malware families. Analysts explain that RustyRocket functions as a long-term persistence mechanism. Instead of triggering immediate disruption, the malware is designed to quietly embed itself within compromised systems, allowing attackers to remain present for extended periods without raising alarms. This hidden presence enables threat actors to move through internal networks, quietly extract sensitive information, and route network traffic through compromised machines. Security experts involved in the research noted that the tool had operated unnoticed until its recent discovery, surfacing the challenges organizations face in detecting advanced covert threats. Although World Leaks is commonly categorized as a ransomware group, its operations differ from traditional ransomware campaigns that encrypt files and demand payment for decryption keys. Rather than denying access to data, the group prioritizes unauthorized data collection. Victims are pressured with the threat of having confidential corporate and personal information publicly disclosed if payment demands are not met. This model places reputational damage, regulatory penalties, and legal exposure at the center of the extortion strategy. The group has publicly claimed responsibility for attacks against large international corporations. In one widely reported incident, World Leaks alleged that a major global sportswear company declined to comply with extortion demands, after which a substantial volume of internal documents was released. As with many threat actor statements, independent verification of the full scope of such claims remains limited, underlining the importance of cautious attribution in cyber incident reporting. From a technical perspective, RustyRocket is written in the Rust programming language and engineered to operate across both Microsoft Windows and Linux environments. This cross-platform design allows the malware to function in mixed enterprise infrastructures, increasing its usefulness to attackers. Researchers describe the tool as a combined data extraction and network proxy utility, capable of transferring stolen information through multiple layers of encrypted communication. By masking malicious traffic within normal network activity, the malware makes detection by conventional security tools comparatively more difficult. The tool also incorporates an execution safeguard that requires attackers to supply a pre-encrypted configuration file at runtime. Without this configuration, the malware remains dormant. This feature complicates forensic analysis and reduces the likelihood that automated security systems will successfully analyze or neutralize the tool. Investigators assess that World Leaks has been active since early 2025 and typically gains initial access through social engineering techniques, misuse of compromised credentials, or exploitation of externally exposed systems. Once inside a network, tools like RustyRocket enable attackers to quietly maintain their presence while systematically collecting data for later extortion. Security specialists warn that RustyRocket reflects a broader turn in cybercriminal operations toward stealth-based, intelligence-gathering intrusions rather than overtly disruptive attacks. To reduce exposure, organizations are advised to closely monitor unusual outbound data transfers and enforce strict network segmentation. These measures can limit an attacker’s ability to move across systems and reduce the volume of data that can be silently extracted. The rise of RustyRocket illustrates how extortion groups are increasingly investing in custom malware designed to evade traditional defenses, reinforcing the need for continuous security testing, proactive threat monitoring, and workforce preparedness to counter evolving attack methods.

Researchers Identify Previously Undocumented Malware Used in World Leaks Intrusions #CyberExtortion #DataLeaks #malware

0 0 0 0

Hey, if you don't like what Discord is doing regarding age verification requirements such as giving them an ID, which has a pretty good chance of being leaked, go drop a corresponding review. #discord #ageverification #dataleaks

1 2 0 0
Stalkerware Data Breach: Hacktivist Leaks Over 530,000 Customer Records A hacktivist scraped and leaked the records of over 500,000 stalkerware customers, exposing emails and partial payment data from a major vendor.

Full Article: www.technadu.com/stalkerware-...

💬 What should regulators do about stalkerware security failures? Share your thoughts.
#CyberNews #PrivacyMatters #DataLeaks #Stalkerware #Infosec #CyberAwareness

0 0 0 0
How scammers use ‘ghost students’ to steal millions in financial aid
How scammers use ‘ghost students’ to steal millions in financial aid YouTube video by ABC News

youtu.be/vIgCGDistF4?...
Lock/ Freeze your credit file immediately. I had no idea this was happening, and people need to be aware.

CommunityCollege #GhostStudents #PhoenixArizona #FraudulentStudents #StudentLoans #DataBreaches #breakingnewstoday #dataleaks #TrojanPride

0 0 0 0
Post image

Uninstall now: CityBus, active in Poland & Ukraine, should inform about public transport but instead harvests massive personal data, shares it beyond Google with China ties. Worst: you cannot delete your data. #CityBus #Privacy #Surveillance #DataBrokers #CyberSecurity #DataLeaks

1 0 0 0
Preview
US security chief uploaded sensitive data to ChatGPT, report Acting US Cybersecurity and Infrastructure Security Agency director, Madhu Gottumukkala uploaded documents marked “for official use only” to ChatGPT.

If confirmed, this is a stark reminder about how easy it is to leak organisations' sensitive information when using LLM-based tools, independently from your ranking, cybersecurity background and/or role ...
-
www.computing.co.uk/news/2026/se... #cybersecurity #dataleaks #AI #ChatGPT #LLM

1 0 0 0
Post image

Crunchbase Confirms Data Breach Claims
Read More: buff.ly/AMdZG9i

#DataBreach #Crunchbase #ShinyHunters #CyberCrime #DataLeaks #Privacy #Infosec #BreachAlert #CyberNews #Ransomware

0 0 0 0
Post image

Insider risks are real. Purview helps detect and reduce internal threats.

#MicrosoftPurview #InsiderRisks #DataLeaks #Sabotage #DataTheft #PolicyViolations #DetectThreats #JadexStrategicGroup

Call 1(833)568-3925 or email info@jadexstrategic.com

0 0 0 0
Preview
NordVPN Denies Breach After Hacker Leaks Data www.osintinvestigate.com -  The VPN company has conducted an investigation after a threat actor claimed to have hacked its systems.

📣 New Podcast! "NordVPN Denies Breach After Hacker Leaks Data" on @Spreaker #cyberattack #cybercrime #cybercriminals #cyberinvestigations #cybersecurity #cyberwar #data #databreaches #dataleaks #hacker #hackerattack #hackers #hackersattack #malware #nordvpn #osint #security #securityattack #vpn

1 0 0 0

Allegedly stolen data ranges from GBs to multiple TBs, including defense files, aircraft manuals, health records, network configs, source code, and government contracts—posing serious security, privacy, and national security risks.
#Infosec #CloudSecurity #InitialAccess #Malware #DataLeaks

0 0 0 0
Post image

No free lunch: the internet has become a mass surveillance machine. Free VPNs like UrbanVPN hijack chats, then sell data via brokers like BIScience. If it’s free, you’re the product. #Privacy #Surveillance #DataBrokers #FreeIsntFree #UrbanVPN #BIScience #CyberSecurity #DataLeaks

2 0 0 0
Preview
Nouvelle fuite de données de santé liée à Doctolib : de nombreuses infos de patients français sur le dark web Une fuite de données liée à Doctolib vient d'être publiée sur un forum cybercriminel. Plus de 150 000 informations personnelles de patients de deux établissements français circulent désormais en ligne...

#cybersécurité #dataleaks
Nouvelle fuite de données de santé liée à Doctolib : de nombreuses infos de patients français sur le dark web

1 2 0 1
Post image

Recommended Actions: Uninstall suspicious extensions, enforce allowlists, monitor browser data flows. If you used free VPN or AI extensions since 2025, assume compromise and reset credentials. #InfoSec #CyberHygiene #DarkSpectre #CyberSecurity #Privacy #AI #DataLeaks

1 0 0 0
Post image

Sleeper Agent / ShadyPanda. Sleeper extensions ran clean for 7 years before weaponized via silent updates. 8.8M users compromised worldwide. Audit permissions & remove generic “New Tab” or “Volume Booster.” #ShadyPanda #DarkSpectre #CyberThreats #CyberSecurity #Privacy #DataLeaks

1 0 0 0
Post image

GlassWorm targets macOS Web3 and crypto developers: steals Keychain, cookies, tokens, VPN configs, and wallet apps. Persistence via Solana blockchain makes blocking nearly impossible. #GlassWorm #macOS #Web3Security #CryptoThreats #CyberSecurity #Privacy #DataLeaks

1 0 0 0
Post image

Zoom Stealer / DarkSpectre. Over 2.2M users compromised: malicious extensions steal Zoom, Meet, and Webinar data in real time. Remove “New Tab,” “Emoji keyboard,” “Unlock Discord” immediately. #CyberSecurity #DarkSpectre #ZoomStealer #Privacy #DataLeaks

1 0 0 0
Post image

Uninstall now: PCMag reports Chrome extensions are stealing AI chat logs (Copilot, Claude, Gemini, ChatGPT & more). Urban VPN Proxy tops the list, linked to data broker BIScience. #CyberSecurity #Privacy #AI #DataLeaks

ℹ️ tinyurl.com/2wnv3cd9

1 0 0 0
Post image

A report by KOI shows some browser extensions are stealing chatbot conversations (Copilot, Claude, Gemini, Perplexity, ChatGPT & more). Urban VPN Proxy tops the list, tied to data broker BIScience. #CyberSecurity #Privacy #AI #DataLeaks

ℹ️ tinyurl.com/yzwvcka5

2 1 1 0

Google will end dark web reports that alerted users to leaked data https://arstechni.ca #dataleaks #security #darkweb #privacy #Google #google #Tech

0 0 0 0
Preview
Inside the Underground Market for Corporate Secrets - As digital transformation accelerates, the underground market for corporate secrets is poised to grow more complex. Organizations

Inside the Underground Market for Corporate Secrets wiobs.com/inside-the-u... #CorporateEspionage #DataLeaks #CyberSecurity #UndergroundEconomy #BusinessIntelligence

1 0 0 0

This is one of the biggest data leaks in history. Why does German news not pick it up? #dataleaks #Meta #hacker #Whatsapp

3 0 1 0
Preview
Balancing Data Localization and Global Integration: Pakistan’s Policy Dilemma - World Geostrategic Insights By Mirza Abdul Aleem Baig The digitization of the global economy has transformed data into the 21st century’s most strategic resource, rivaling oil and gas in its significance for productivity, innova...

- Balancing Data Localization and Global Integration: Pakistan's Policy Dilemma

#DigitalTransformation #Fintech #eCommerce #AI #Cybersecurity #Cyberattacks #DataLeaks #OnlineFrauds #DataGovernace #CitizenPrivacy

www.wgi.world/balancing-da...

2 0 0 0
AI Study Uncovers Massive Data Leaks in Preprint Archives

AI Study Uncovers Massive Data Leaks in Preprint Archives

A study of 100,000 preprint submissions, covering over 1.2 TB of LaTeX source, uncovered thousands of personal data, credentials, and confidential files left exposed. Read more: getnews.me/ai-study-uncovers-massiv... #preprints #dataleaks #aisecurity

0 0 0 0
Preview
Une énorme fuite de données touche Discord, la faute à un prestataire externe Une porte s’est entrouverte du côté d’un prestataire, révélant des informations déposées dans des dossiers d’assistance. La plateforme dit avoir colmaté l’accès, tout en prévenant les personnes potent...

#cybersécurité #Dataleaks
Une énorme fuite de données touche Discord, la faute à un prestataire externe

1 0 0 0
Preview
The warning signs are clear: We’re heading toward a digital crisis The warning signs are loud and clear: we’re headed into a crisis, thanks to the growing interdependence of digital and economic systems — with no safety nets.

The warning signs are clear: We’re heading toward a digital crisis #DigitalCrisis #cyberattacks #dataleaks #security #privacy

theconversation.com/the-warning-...

0 0 0 0