Search Articles

Search through our archive of curated compliance and cybersecurity news.

Found 15 results for "data breach"

Clear search

Dutch mobile carrier Odido disclosed a data breach affecting approximately 6.2 million customers following unauthorized access to a customer contact system on February 7-8. The incident exposed sensitive personal information including names, addre...

My Take: Six million records including ID documents and bank details—this is exactly the kind of breach that turns into years of identity fraud for customers, not just "enhanced monitoring" PR-speak. When a telecom gets popped this badly, the real question isn't what they're doing now, it's how their access controls were so weak that someone walked out with the crown jewels.

From digest: 2026-07

A cyberattack on an Ohio counseling center has exposed personal and health information of approximately 83,000 clients. As a healthcare provider, the organization is subject to HIPAA breach notification requirements and must notify affected indivi...

My Take: Mental health records are the crown jewels for attackers—far more damaging than credit cards—yet counseling centers often run on shoestring budgets with IT security to match. If you're a small healthcare provider handling sensitive data, you can't afford to treat cybersecurity as optional anymore; HHS is running out of patience with the "we're too small to be a target" excuse.

From digest: 2026-06

Flickr disclosed a potential data breach affecting users' personal information (names, emails, IP addresses, account activity) exposed through a vulnerability at a third-party email service provider. The company shut down access to the affected sy...

My Take: Third-party vendor breaches are the compliance equivalent of getting tackled from your blind side—you did everything right in your own house, but you're still on the hook for notification, investigation, and regulatory scrutiny. This is why vendor security questionnaires and contract language around breach notification timelines actually matter (not just the ones your procurement team copy-pastes).

From digest: 2026-06

Cybercriminals set sites on identities

Feb 04, 2026 CSO Online data breach

The article discusses cybercriminals targeting personal identities, indicating a data breach or identity theft campaign. Organizations handling personal data face increased risk of regulatory violations across multiple compliance frameworks. This ...

My Take: If you're still treating identity data like any other PII, you're behind. The regulatory pain from an identity breach is now the least of your problems—credential stuffing, account takeovers, and synthetic identity fraud will cost you more than any GDPR fine.

From digest: 2026-05

AI Coding Assistants Secretly Copying All Code to China

Feb 02, 2026 Schneier on Security data breach

Two AI coding assistants used by 1.5 million developers are reportedly exfiltrating code to China without user consent. This constitutes a significant data breach affecting proprietary code and intellectual property. Organizations using these tool...

My Take: If you're letting developers use AI coding tools without vetting the vendor's data practices, you've got a much bigger third-party risk problem than this one incident. This is your wake-up call to actually enforce that "approved tools only" policy you wrote and promptly ignored.

From digest: 2026-05

A former Booz Allen Hamilton employee leaked tax returns of approximately 400,000 wealthy Americans, including President Trump, to major news outlets. The incident resulted in criminal prosecution of the leaker and has prompted a $10 billion lawsu...

My Take: This is what insider threat programs are supposed to prevent, and it's a stark reminder that your most sensitive data controls need to assume *authorized* users will go rogue. The lawsuit amount is theater, but the underlying failure—a contractor with broad access and apparently weak monitoring—is exactly the scenario that should terrify anyone managing PII or financial data.

From digest: 2026-05

Under Armour is investigating a data breach affecting approximately 72 million customers' email addresses and personal information (names, genders, birthdates, ZIP codes), discovered late last year. The company states no evidence suggests password...

My Take: "Discovered late last year" and we're hearing about it now? The breach itself is garden-variety PII exposure, but the disclosure timeline is the compliance risk that'll actually bite them—especially under GDPR's 72-hour clock.

From digest: 2026-04

Employees of the Department of Government Efficiency shared sensitive Social Security Administration data through an unsecured third-party server in violation of agency security policies. The Justice Department's court filing reveals uncertainty a...

My Take: When government efficiency champions can't follow basic data handling protocols, you get the predictable outcome: sensitive PII sprayed across unsecured servers with no idea of the blast radius. This is what happens when you prioritize speed over security fundamentals—and it's a reminder that compliance frameworks exist precisely to prevent this kind of amateur-hour mess.

From digest: 2026-03

AI-Powered Surveillance in Schools

Jan 19, 2026 Schneier on Security data breach

Beverly Hills High School has implemented extensive AI-powered surveillance systems including facial recognition, behavioral analysis, audio monitoring, and license plate readers. This raises significant privacy concerns regarding the collection a...

My Take: If you're running a school and think "let's add facial recognition" is simpler than "let's write a proper data processing impact assessment," you're about to learn an expensive lesson about GDPR Article 35 and CCPA's sensitive data requirements. This is a compliance nightmare masquerading as a safety solution—minors' biometric data has the highest regulatory bar for a reason.

From digest: 2026-03

Weekly Update 486

Jan 16, 2026 Troy Hunt Blog data breach

A weekly update discussing the WhiteDate data breach, a dating platform that appears to have experienced a security incident affecting user data. The breach involves a platform matching users based on racial criteria, raising potential privacy and...

My Take: A data breach at a platform designed around racial matching is going to make for brutal regulatory optics—expect EU regulators to come down hard not just on the breach itself, but on the lawfulness of the entire processing basis. This is what happens when you build something legally questionable and then fail to secure it.

From digest: 2026-03

Attorney General Bonta Helps Secure $425 Million Capital One Settlement

Jan 13, 2026 California Attorney General News penalty/fine

California Attorney General Rob Bonta secured a $425 million settlement against Capital One for misleading consumers about interest rates on 360 Savings accounts. The settlement, more than double an initial proposal, requires Capital One to provid...

My Take: $425 million for misleading savings account marketing—this isn't a data breach or privacy violation, it's old-fashioned consumer protection enforcement with teeth. The lesson here: your marketing claims are compliance artifacts that *will* get audited, and "we didn't technically lie" won't save you when the AG's office shows up.

From digest: 2026-02

Wegman's Supermarket chain is collecting biometric facial recognition data from customers without apparent explicit consent or transparency. This practice raises significant privacy concerns and potential violations of biometric data protection re...

My Take: If you're deploying facial recognition in retail without explicit consent and clear signage, you're not just risking BIPA fines in Illinois—you're writing checks your legal team will be cashing for years across multiple state laws. The "we'll stay quiet and hope nobody notices" approach stopped working the moment Clearview AI became a cautionary tale.

From digest: 2026-01

Covenant Health Data Breach Impacts 478,000 Individuals

Jan 02, 2026 SecurityWeek data breach

Covenant Health, a Massachusetts-based healthcare provider, disclosed a significant data breach affecting 478,188 individuals after a ransomware attack on May 18, 2025. The breach exposed sensitive personal and health information including names, ...

My Take: Props to Covenant for not paying—refusing to fund criminal operations is the right call even when it hurts. But here's the hard truth: if Qilin got in and exfiltrated 478k records, your HIPAA "compliance" program failed at the only job that actually matters.

From digest: 2026-01

The biggest cybersecurity and cyberattack stories of 2025

Jan 01, 2026 BleepingComputer security incident

This article summarizes major cybersecurity incidents and cyberattacks from 2025, including the PornHub data breach affecting 200+ million subscribers and widespread ClickFix social engineering attacks targeting multiple platforms. The incidents i...

My Take: The PornHub breach is a nightmare scenario for privacy teams—GDPR fines aside, good luck explaining to your board why you're managing *that* kind of sensitive data without defense-in-depth. ClickFix attacks are the reminder that your security awareness training needs to catch up to 2025: users don't click attachments anymore, they're copying malicious commands because a fake CAPTCHA told them to.

From digest: 2026-01

Infosecurity's Top 10 Cybersecurity Stories of 2025

Jan 01, 2026 Infosecurity Magazine security incident

This article is a roundup of major cybersecurity stories from 2025, highlighting multiple high-profile security incidents including IoT device infections, Fortinet firewall credential leaks, and vendor withdrawals from security evaluations. The in...

My Take: If your 2025 incident response plan doesn't account for supply chain compromise and legacy IoT devices, you're planning for last year's threats. The Fortinet credential leak is the headline, but the real pattern here is how quickly "secure by default" vendors become single points of failure.

From digest: 2026-01