List of data breaches and cyber attacks in June 2021 – 9.8 million records breached
IT Governance
JULY 1, 2021
discloses ransomware incident (unknown). discloses ransomware incident (unknown).
IT Governance
JULY 1, 2021
discloses ransomware incident (unknown). discloses ransomware incident (unknown).
Thales Cloud Protection & Licensing
MARCH 10, 2021
There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Additionally, many auto manufacturers now have the ability to remotely update software to fix vulnerabilities or even upgrade functionality. They have design constraints.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
IT Governance
JANUARY 4, 2021
aw (unknown). Ransomware.
IT Governance
JANUARY 30, 2024
Source (New) Retail USA Yes 2,588,849 Keenan & Associates Source 1 ; source 2 (Update) Insurance USA Yes 1,509,616 AGC Group Source (New) Manufacturing Japan Yes 1.5 TB Four Hands Source (New) Manufacturing USA Yes 1.5 TB Four Hands Source (New) Manufacturing USA Yes 1.5
IT Governance
MARCH 5, 2024
GB dataset on a hacking forum, claiming to still have access to the breached system. TB LDLC Source (New) Retail France Yes 1,500,000 APROA Source (New) Professional services Argentina Yes 1,197,562 Petrus Resources Ltd. Affected information includes users’ names, email addresses, IP addresses and encrypted passwords.
IT Governance
APRIL 29, 2024
Honor, Huawei, iFlytek, OPPO, Samsung Electronics, Tencent, Vivo and Xiaomi Technology. Keyboard app vulnerabilities reveal keystrokes to network eavesdroppers Security researchers have identified critical security vulnerabilities in Cloud-based pinyin keyboard apps from Baidu, Inc., Data breached: <1 billion people’s data.
ForAllSecure
SEPTEMBER 21, 2021
It says that spy phones sold real time access to that information, which could have enabled domestic abusers and stalkers to track their targets. So that person either works with you, lives with you, or otherwise has access. It doesn't take leet hacking skills. There are legitimate apps for that.
Let's personalize your content