Nissan Confirms Customer Data Exposure After Red Hat Breach
Nissan has confirmed a Nissan customer data exposure after attackers gained unauthorized access to a Red Hat–hosted development environment. The incident did not impact Nissan’s production systems, yet it still exposed sensitive customer information stored in a third-party cloud setup. The case highlights how non-production environments remain an attractive target for attackers seeking valuable data with fewer defenses. What happened

Askul Data Breach Confirms 740,000 Records Stolen
The Askul data breach has confirmed a significant ransomware incident involving one of Japan’s largest office supply and e-commerce companies. After weeks of investigation, Askul revealed that attackers stole roughly 740,000 customer records during a cyberattack that disrupted internal systems and logistics operations. What initially appeared to be a technical failure later proved to be a coordinated ransomware intrusion linked

700Credit Data Breach Exposes 58 Million Dealership Customers
A large-scale 700Credit data breach has quietly exposed sensitive personal information linked to tens of millions of vehicle dealership customers in the United States. While the incident did not originate inside dealership networks, it still carries serious consequences for consumers whose data passed through a trusted third-party platform. The breach highlights a familiar but persistent problem. As businesses outsource critical

PayPal Subscription Scam Abuses Legitimate Billing Emails
A PayPal subscription scam is circulating that does not rely on fake domains, malicious links, or compromised accounts. Instead, it abuses a legitimate PayPal feature to deliver fraudulent messages directly from PayPal’s own email infrastructure. The result is a scam that bypasses many traditional warning signs and places users at risk through trust rather than technical deception. Security researchers warn

Coupang Data Breach Traced to Former Employee Access
The Coupang data breach did not follow the familiar pattern of modern cyber incidents. There was no ransomware deployment, no phishing campaign, and no external attacker exploiting a technical vulnerability. Instead, the exposure originated inside the company, where a former employee retained access to internal systems after leaving their role. For Coupang, one of South Korea’s largest e-commerce platforms, the

Inotiv Cyberattack Exposes Data after Confirmed Network Intrusion
Inotiv, a US-based contract research organization supporting pharmaceutical development, has confirmed a serious cyber incident. The Inotiv cyberattack involved unauthorized access to internal systems and confirmed data theft. The disclosure adds to growing concerns about ransomware activity targeting healthcare and life sciences companies. What Happened During the Inotiv Cyberattack Inotiv detected the intrusion in early August after attackers gained access

Barts Health NHS Data Breach Tied to Oracle Zero-Day Attack
A major incident unfolded after the Barts Health NHS data breach revealed that attackers exploited an Oracle zero-day flaw to access sensitive information inside one of the UK’s largest healthcare networks. The trust launched an urgent investigation to understand the scope of the compromise. The event highlights growing supply-chain risks as healthcare organizations depend on complex vendor systems for everyday

Freedom Mobile Data Breach Exposes Customer Info
A recent Freedom Mobile data breach has raised concerns across Canada after attackers accessed customer information through a compromised subcontractor account. The telecom provider reported that unknown actors used stolen credentials to enter its customer account management platform. The incident did not disrupt network operations, but it exposed personal information that can support large-scale social engineering attempts. What Freedom Mobile

Dartmouth Data Theft Confirmed in Oracle-Linked Breach
Dartmouth data theft concerns escalated after the college confirmed that attackers stole sensitive employee information through an Oracle system compromise. The incident exposed personal details stored in Oracle’s Human Capital Management environment, which Dartmouth relied on for HR operations. The disclosure adds another victim to a growing list of organizations impacted by the Oracle breach campaign. How Dartmouth Confirmed the

OpenAI Breach: Vendor Hack Exposes API Customer Data
A vendor security failure at Mixpanel exposed API customer metadata and pushed OpenAI to reassess its third-party risk controls. The OpenAI breach originated from unauthorized access within Mixpanel’s systems, where attackers extracted analytics data linked to API accounts. OpenAI confirmed that its own infrastructure remained secure, yet the incident demonstrates how external service providers can still create meaningful exposure for
