The Breach News

Flock Employs International Gig Workers to Develop Its Surveillance AI

Flock Surveillance Systems Expose Data Handling Practices Flock, a provider of automatic license plate reading and AI-driven camera technologies, has come under scrutiny following revelations about its reliance on overseas workers from Upwork for training its machine learning algorithms. Internal documents, inadvertently disclosed, reveal that these workers review and categorize…

Read MoreFlock Employs International Gig Workers to Develop Its Surveillance AI

Hacker Compromises Data of Over 70% of Bulgarian Citizens via Tax Agency Servers

In a significant cybersecurity incident, Bulgaria has experienced the largest data breach in its history, affecting personal and financial information of approximately 5 million adults. This breach represents a substantial portion of the country’s total population of 7 million. Reports indicate that the breach was executed by an unidentified hacker…

Read MoreHacker Compromises Data of Over 70% of Bulgarian Citizens via Tax Agency Servers

The Challenge of AI Agents in Online Shopping

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development E-Commerce Faces Existential Threat as Autonomous Shoppers Shift Away from Ads Rashmi Ramesh (@rashmiramesh_) • December 1, 2025 Image: Shutterstock The online retail sector has long perfected strategies to drive consumers towards making purchases. However, it now contends with a…

Read MoreThe Challenge of AI Agents in Online Shopping

Minor Breaches, Major Consequences: The Legal Ramifications of Small Cyber Incidents | Constangy, Brooks, Smith & Prophete, LLP

Cyberattacks against high-profile corporations often dominate headlines, casting shadows over more subtle incidents that may not receive as much attention. However, breaches affecting smaller organizations are increasingly drawing legal scrutiny and regulatory attention. Recent trends indicate that no data breach is too insignificant to evade serious legal repercussions, particularly in…

Read MoreMinor Breaches, Major Consequences: The Legal Ramifications of Small Cyber Incidents | Constangy, Brooks, Smith & Prophete, LLP

Discovery of 100+ Malicious AI/ML Models on the Hugging Face Platform

Recent investigations have revealed the presence of up to 100 malicious artificial intelligence and machine learning models hosted on the Hugging Face platform. These models pose significant risks, as they can execute unauthorized code through the loading of specific pickle files, according to software supply chain security firm JFrog. Senior…

Read MoreDiscovery of 100+ Malicious AI/ML Models on the Hugging Face Platform

Coupang Data Breach Impacts All 33.7 Million Accounts in South Korea

Coupang, the largest e-commerce platform in South Korea, has reported a significant data breach that impacts nearly its entire domestic user base. The breach has affected over 33.7 million customers, exposing sensitive information such as names, phone numbers, email addresses, physical addresses, and user order histories. The company first identified…

Read MoreCoupang Data Breach Impacts All 33.7 Million Accounts in South Korea

Slack Resets Passwords for Users Who Haven’t Updated Since 2015 Breach

Recently, Slack, the widely utilized cloud-based team collaboration platform, notified users about a significant security incident. Users who have not updated their passwords since a 2015 data breach have begun receiving password reset emails, prompting concern among the platform’s clientele. The initial breach occurred in 2015 when malicious actors unlawfully…

Read MoreSlack Resets Passwords for Users Who Haven’t Updated Since 2015 Breach

Attention Math Enthusiasts: Cybersecurity Is Calling You!

Encryption & Key Management, Security Operations Securing the World for the Age of Quantum-Resistant Cryptography Brandy Harris • November 26, 2025 Image: Shutterstock The rapid advancements in quantum computing are set to transform the technological landscape, impacting not only hardware but also the cryptographic strategies necessary to secure sensitive systems…

Read MoreAttention Math Enthusiasts: Cybersecurity Is Calling You!