#dataBreach

MindTGapMindTGap
2026-02-15

(immediately dumped discord)

39min
Discord's Disturbing Ties to Global Surveillance | ID Verification, Palantir, & Thiel

Feb 14, 2026

youtube.com/watch?v=qhxsE8dvbs4

2026-02-14

DATE: February 14, 2026 at 11:07AM
SOURCE: HEALTHCARE INFO SECURITY

Direct article link at end of text block below.

Will the #Conduent hack rank as the largest #databreach in U.S. history? t.co/jf9pKntU0X

Here are any URLs found in the article text:

t.co/jf9pKntU0X

Articles can be found by scrolling down the page at healthcareinfosecurity.com/ under the title "Latest"

-------------------------------------------------

Private, vetted email list for mental health professionals: clinicians-exchange.org

Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.

-------------------------------------------------

#security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering

2026-02-14

@XposedOrNot += Under Armour Data Breach

The Under Armour #databreach was reported in November 2025 after the Everest ransomware group claimed the American sportswear brand as a victim in an attempted extortion, alleging access to 343GB of data. Customer data from the incident was later published publicly in January 2026, exposing 73M email addresses, with many records also containing names, dates of birth, genders, geographic locations, and purchase information.

Exposed data: Email addresses, Names, Dates of birth, Genders, Geographic locations, Purchase information

Potential risks: Privacy breaches, Phishing, Identity theft, Targeted scams, Consumer fraud

UnderArmour data breach
2026-02-14

@XposedOrNot += Raaga Data Breach

The Raaga #databreach was reported in December 2025 after a dataset allegedly stolen from the Indian music streaming service was posted for sale on a popular hacking forum. The exposed data contained 10.2M unique email addresses along with names, genders, dates of birth, and passwords stored as unsalted MD5 hashes.

Exposed data: Email addresses, Names, Genders, Dates of birth, Passwords (unsalted MD5)

Potential risks: Account takeover, Credential stuffing, Phishing, Identity theft

Raaga data breach
BeyondMachines :verified:beyondmachines1@infosec.exchange
2026-02-14

Telegram Allegedly Impacted by Massive Data Leak Exposing 200 Million User Records

A threat actor leaked a dataset allegedly containing 200 million Telegram user records, including phone numbers and emails. The company claims the data consists only of public information gathered via contact imports.

****
#cybersecurity #infosec #incident #databreach
beyondmachines.net/event_detai

BeyondMachines :verified:beyondmachines1@infosec.exchange
2026-02-14

Fintech Lender Figure Technology Reports Data Breach Claimed by ShinyHunters

Figure Technology confirmed a data breach caused by a social engineering attack that allegedly allowed the ShinyHunters group to exfiltrate 2.5 GB of customer data.

****
#cybersecurity #infosec #incident #databreach
beyondmachines.net/event_detai

2026-02-14

Romaniaโ€™s pipeline operator Conpet S.A. confirmed the Qilin ransomware gang stole company data in a recent cyberattack. Nearly 1TB of documents were allegedly exfiltrated, including sensitive financial and personal info. #databreach

bleepingcomputer.com/news/secu

2026-02-14

Dutch telecom provider Odido says a cyberattack exposed the personal data of 6.2M customers via its contact system. No passwords or call data were affected.

The #databreach was reported to the Dutch regulator, and impacted users are being notified.

bleepingcomputer.com/news/secu

2026-02-13

DATE: February 13, 2026 at 05:05PM
SOURCE: HEALTHCARE INFO SECURITY

Direct article link at end of text block below.

#TexasAG Investigating #Conduent, #BCBSTexas in Hack t.co/IT1VNCR4h3 #HIPAA @KenPaxtonTX #databreach #BCBS

Here are any URLs found in the article text:

t.co/IT1VNCR4h3

Articles can be found by scrolling down the page at healthcareinfosecurity.com/ under the title "Latest"

-------------------------------------------------

Private, vetted email list for mental health professionals: clinicians-exchange.org

Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.

-------------------------------------------------

#security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering

2026-02-13

It's been a busy 24 hours in the cyber world with significant updates on actively exploited vulnerabilities, recent data breaches, and a deep dive into evolving nation-state tactics. Let's take a look:

Actively Exploited Vulnerabilities & Zero-Days โš ๏ธ

- A critical pre-authentication RCE (CVE-2026-1731, CVSS 9.9) in BeyondTrust Remote Support and Privileged Remote Access appliances is now being actively exploited. Attackers are using specially crafted client requests to extract `x-ns-company` values and establish WebSocket channels for command execution. On-premise customers must patch immediately.
- A critical SQL injection vulnerability (CVE-2024-43468, CVSS 9.8) in Microsoft Configuration Manager, patched in October 2024, is now under active exploitation. This allows unauthenticated remote attackers to execute commands on the server or underlying database. CISA has added it to their KEV catalog, urging federal agencies to patch by March 5th.
- Apple has disclosed its first actively exploited zero-day of 2026, a memory corruption flaw (CVE-2026-20700) in `dyld` affecting iPhones and iPads running iOS versions prior to 26. This vulnerability was used in "extremely sophisticated attacks against specific targeted individuals," likely for commercial spyware.
- Two critical RCE vulnerabilities (CVE-2026-1281, CVE-2026-1340, CVSS 9.8) in Ivanti Endpoint Manager Mobile (EPMM) are being actively exploited, leading to compromises of several European government agencies, including the European Commission and Dutch and Finnish governments. This highlights the ongoing challenge of securing widely deployed edge devices.
- CISA also added CVE-2025-15556 (Notepad++ download integrity bypass) and CVE-2025-40536 (SolarWinds Web Help Desk security control bypass) to its KEV catalog. The Notepad++ flaw was exploited by the China-linked Lotus Blossom APT to deliver the Chrysalis backdoor via trojanised installers, targeting specific high-value individuals.

๐Ÿค– Bleeping Computer | bleepingcomputer.com/news/secu
๐Ÿ•ต๐Ÿผ The Register | go.theregister.com/feed/www.th
๐Ÿค– Bleeping Computer | bleepingcomputer.com/news/secu
๐Ÿคซ CyberScoop | cyberscoop.com/apple-zero-day-
๐Ÿ“ฐ The Hacker News | thehackernews.com/2026/02/rese
๐Ÿ‘ป Dark Reading | darkreading.com/endpoint-secur

Recent Cyber Attacks & Breaches ๐Ÿšจ

- Louis Vuitton, Christian Dior Couture, and Tiffany have been collectively fined $25 million by South Korea for inadequate security leading to data exposure for over 5.5 million customers. Breaches stemmed from malware on an employee device and phishing attacks compromising a shared cloud-based customer management service.
- The Netherlands' largest mobile network operator, Odido, disclosed a breach of its customer contact system affecting approximately 6.2 million people. Stolen data includes names, addresses, phone numbers, dates of birth, bank account numbers, and ID document details, prompting warnings about potential impersonation and phishing scams.

๐Ÿค– Bleeping Computer | bleepingcomputer.com/news/secu
๐Ÿ•ต๐Ÿผ The Register | go.theregister.com/feed/www.th

New Threat Research & Techniques ๐Ÿ”ฌ

- Google's Threat Intelligence Group (GTIG) has attributed a previously undocumented, possibly Russian intelligence-affiliated threat actor to attacks on Ukrainian defense, military, government, and energy organisations using CANFAIL malware. This group is noted for using Large Language Models (LLMs) for reconnaissance, lure creation, and basic technical questions for C2 setup.
- Threat actors are leveraging Claude LLM artifacts and Google Ads in "ClickFix" campaigns to deliver Mac infostealer malware. Malicious search results lead users to public Claude guides or fake Apple Support pages instructing them to execute shell commands in Terminal, which fetches the MacSync infostealer to exfiltrate sensitive system data.
- Nation-state actors, particularly China and Russia, are aggressively targeting the Defense Industrial Base (DIB), employing zero-day exploits against edge devices (VPNs, security gateways) for initial access and "pre-positioning" in networks. This strategy aims for persistent intelligence collection during peacetime and disruption options during crises, with a focus on devices often slower to patch and less monitored.
- Microsoft faces increasing pressure over Bring-Your-Own-Vulnerable-Driver (BYOVD) attacks, where threat actors exploit legitimate, but vulnerable, drivers to disable security products with kernel-level access. Despite Microsoft's efforts, gaps exist, such as allowing drivers with revoked certificates, and slow blocklist updates, making it a persistent challenge for defenders.
- A security researcher demonstrated multiple techniques to manipulate Windows LNK shortcut files, allowing attackers to display a benign target in file properties while executing a malicious payload. Microsoft's Security Response Center declined to classify these as vulnerabilities, citing user interaction, despite historical exploitation of similar LNK flaws.
- npm has overhauled its authentication, revoking classic tokens and defaulting to short-lived, session-based tokens with MFA for publishing, and encouraging OIDC Trusted Publishing. While a significant step, risks remain as MFA phishing can still yield short-lived tokens, and optional MFA bypass for 90-day tokens leaves a vulnerability similar to previous classic tokens.

๐Ÿ“ฐ The Hacker News | thehackernews.com/2026/02/goog
๐Ÿค– Bleeping Computer | bleepingcomputer.com/news/secu
๐Ÿ‘ป Dark Reading | darkreading.com/cyber-risk/nat
๐Ÿ‘ป Dark Reading | darkreading.com/application-se
๐Ÿค– Bleeping Computer | bleepingcomputer.com/news/micr
๐Ÿ“ฐ The Hacker News | thehackernews.com/2026/02/npms

Threat Landscape & Geopolitics ๐ŸŒ

- Estonia's foreign intelligence chief urged European governments and industry to invest in homegrown offensive cyber capabilities, arguing that Europe is too reliant on non-European tools and needs to match adversaries' ability to penetrate, disrupt, or manipulate digital systems.
- Taiwan warns that China may be rehearsing a "digital siege" using platforms like "Expedition Cloud" to simulate attacks on critical infrastructure. This suggests a shift from espionage to disruption, with Taiwan serving as a proving ground for new, aggressive cyber tactics.
- NATO's deputy secretary general stated that the alliance must be ready to impose costs on Russia and China for cyber and hybrid attacks, which increasingly target critical infrastructure and government services. This includes strengthening defense, boosting innovation, and integrating military, civilian, and industry efforts.
- The EU's top tech official warned that Europe can no longer be "naive" about adversaries' ability to shut down critical infrastructure. She called for tougher rules, more investment, and phasing out high-risk suppliers (like Huawei/ZTE) to protect against coordinated cyber and physical threats.
- Officials and executives at the Munich Cyber Security Conference highlighted space as the next arena of great power competition, vulnerable to disruption. Concerns include the reliance of modern life on satellites and the vulnerability of subsea cables, with calls for independent "outernet" satellite networks to ensure resilience.
- Sweden's Ministry of Defence states that cyber and hybrid threats are now a permanent feature of Europe's security environment. Societies must be built to function under sustained pressure, rather than assuming disruptions are rare, emphasising a "total defense" concept with strong public-private cooperation.

๐Ÿ—ž๏ธ The Record | therecord.media/estonia-spy-ch
๐Ÿ—ž๏ธ The Record | therecord.media/china-taiwan-d
๐Ÿ—ž๏ธ The Record | therecord.media/nato-must-impo
๐Ÿ—ž๏ธ The Record | therecord.media/eu-cyber-criti
๐Ÿ—ž๏ธ The Record | therecord.media/space-cybersec
๐Ÿ—ž๏ธ The Record | therecord.media/sweden-cyber-t

Regulatory & Communication Blockades ๐Ÿ”’

- The Russian government is intensifying its crackdown on communication platforms outside its control, attempting to fully block WhatsApp and aggressively throttling Telegram. This move aims to encourage citizens to use the Kremlin-controlled MAX messenger app, which has raised privacy concerns.

๐Ÿค– Bleeping Computer | bleepingcomputer.com/news/secu

Industry News / Acquisitions ๐Ÿค

- Proofpoint has acquired AI security startup Acuvity to address the growing security risks associated with widespread corporate adoption of agentic AI. This move aims to strengthen Proofpoint's capabilities in monitoring and securing AI-powered systems, tackling new attack vectors like prompt injection and model manipulation.

๐Ÿคซ CyberScoop | cyberscoop.com/proofpoint-acuv

#CyberSecurity #ThreatIntelligence #Vulnerabilities #ZeroDay #RCE #DataBreach #NationState #APT #Malware #AI #LLM #SupplyChainSecurity #CriticalInfrastructure #Geopolitics #InfoSec #CyberAttack #IncidentResponse

2026-02-13

The #Odido #databreach was no surprise to me after all the signals of their poor architecture.
Now it seems the attack vector was social engineering of MFA from their customer service agents.
If you trust broad access personal info of millions (inc. DoB and passport numbers) to CSA-level employees... your #CISO, architects, and all managers have brought shame to their houses.
My rediculously naive ideas about proper security in a Dutch comment. tweakers.net/nieuws/244720/nos

2026-02-13

Questa me l'ero persa: #flickr ha subito un #databreach a inizio febbraio...

Occhio alle password!

@sicurezza

Flickr data breach notice
2026-02-13

๐Ÿ‡ฎ๐Ÿ‡ท 641a3 claims data breach on Iran's Government & Defense organization. Leaked ~1.6M Iranian records (first names, last names, and phone numbers). #DataBreach #Government #Iran #ThreatIntel

2026-02-13

โš ๏ธ Odido data breach impacts 6 million customers Dutch telecom provider #Odido disclosed a data breach affecting around 6 million customers after attackers accessed a third-party marketing platform, exposing names, contact details, and partial identification data. #ransomNews #DataBreach #Telecom

Dutch Carrier Odido Discloses ...

BeyondMachines :verified:beyondmachines1@infosec.exchange
2026-02-13

Telecom Provider Odido Data Breach Affects 6.2 Million Customers

Odido confirmed a cyberattack on its customer contact system that exposed the personal data of 6.2 million customers, including names, IBANs, and passport numbers. The Dutch telecom provider has blocked the unauthorized access and is notifying affected individuals.

****
#cybersecurity #infosec #incident #databreach
beyondmachines.net/event_detai

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst