Tag Salesforce

Almost 1 Billion Records Reportedly Compromised from Salesforce Systems

A clandestine hacking group operating under the name Scattered LAPSUS$ Hunters has reportedly breached the global cloud service provider Salesforce, claiming to have compromised nearly one billion customer records. This revelation heightens concerns about the increasing prevalence of supply chain attacks targeting major corporations. Despite Salesforce’s firm denial of any…

Read MoreAlmost 1 Billion Records Reportedly Compromised from Salesforce Systems

Cybercriminals Compromise Red Hat’s Private GitLab Repositories – Insights on Impacted Customers

John Keeble/Getty Images Stay in touch with ZDNET: Add us as a preferred source on Google. Key Takeaways from ZDNET Red Hat’s private GitLab repositories have been breached by hackers. Confidential information related to several Red Hat Consulting clients appears to have been compromised. The extent of this breach is…

Read MoreCybercriminals Compromise Red Hat’s Private GitLab Repositories – Insights on Impacted Customers

Chinese Hackers Target US Agency with Chopper Attack

Recent cyber activity has revealed significant vulnerabilities and breaches affecting U.S. federal agencies and corporations, highlighting the ongoing threats in the cybersecurity landscape. The Cybersecurity and Infrastructure Security Agency (CISA) reported that hackers exploited a known vulnerability in an open-source geospatial data server, leading to the deployment of a web…

Read MoreChinese Hackers Target US Agency with Chopper Attack

Stellantis Confirms Data Breach Impacting Customer Information

Data Breach at Stellantis Exposes Customer Information Stellantis, a prominent multinational automaker with brands like Chrysler, Jeep, and Fiat, has reported a data breach that implicates customer information following unauthorized access to a third-party service provider. This incident raises significant concerns regarding data security practices within the automotive industry and…

Read MoreStellantis Confirms Data Breach Impacting Customer Information

Google Encourages Relying on AI for Shopping

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development AP2 Protocol Introduces ‘Mandates’ to Ensure Accountability in Agent-Led Transactions Rashmi Ramesh (rashmiramesh_) • September 17, 2025 Image: Shutterstock/ISMG In an innovative move, Google has unveiled a new “agent payments protocol,” enabling artificial intelligence to facilitate consumer shopping while ensuring…

Read MoreGoogle Encourages Relying on AI for Shopping

Hackers Breach Gucci, Balenciaga, and Alexander McQueen, Compromising Millions of Customer Records

Kering, the French luxury conglomerate that owns prestigious brands such as Gucci, Balenciaga, and Alexander McQueen, has reported a significant data breach affecting the personal information of potentially millions of customers globally. This cyber incident has raised serious concerns about the integrity of consumer data in the luxury retail sector.…

Read MoreHackers Breach Gucci, Balenciaga, and Alexander McQueen, Compromising Millions of Customer Records

Gucci, Balenciaga, and Alexander McQueen Linked to Breach Involving ShinyHunters

ShinyHunters has reportedly breached Kering’s systems, compromising customer data from luxury brands including Gucci, Balenciaga, and Alexander McQueen, thereby increasing the risk of scams and spear-phishing attacks. In a recent cyber incident, sensitive customer information from prominent fashion labels such as Gucci, Balenciaga, and Alexander McQueen has been compromised. The…

Read MoreGucci, Balenciaga, and Alexander McQueen Linked to Breach Involving ShinyHunters

Google Confirms Hackers Breached Law Enforcement Request System, But No Data Compromised

In a significant disclosure, Google has confirmed that hackers successfully established a counterfeit account within its Law Enforcement Request System (LERS), a vital channel utilized by authorities globally to submit official data requests. This breach, first reported by BleepingComputer, highlights the increasingly sophisticated methods that cybercriminals employ to penetrate secure…

Read MoreGoogle Confirms Hackers Breached Law Enforcement Request System, But No Data Compromised