Workflow
Data Breach
icon
Search documents
X @BBC News (World)
BBC News (World)· 2025-07-17 21:11
How bad is Afghan data breach for MI6 and SAS? https://t.co/ZfJdz7AYl7 ...
X @BBC News (World)
BBC News (World)· 2025-07-16 18:49
Security Breach & Data Privacy - Data breach names posted on Facebook by an Afghan individual [1] Government Response - MoD (Ministry of Defence) offered to expedite the resettlement case of the Afghan individual [1]
X @BBC News (World)
BBC News (World)· 2025-07-16 16:06
Data Breach Overview - The report discusses an Afghan data breach and raises questions about what is known and what remains unknown [1] Key Questions - The report focuses on unanswered questions surrounding the Afghan data breach [1]
X @The Wall Street Journal
Geopolitical Risk & Security - The UK initiated a secret project to relocate thousands of Afghans to Britain following a data breach [1] - The data breach involved the personal information of 18,700 Afghans who had requested to flee [1]
X @TechCrunch
TechCrunch· 2025-07-14 19:12
Data Breach Notification - Episource is notifying millions of people about a health data theft [1] Industry Impact - The incident highlights the increasing risks and vulnerabilities associated with health data security in the tech industry [1]
X @Cointelegraph
Cointelegraph· 2025-07-11 17:25
Data Breach - McDonald's AI hiring bot exposed millions of applicants' data [1] - Hackers accessed the system using the weak password "123456" [1] Security Vulnerability - The incident highlights potential security vulnerabilities in AI hiring systems [1] - The use of a simple password ("123456") indicates a lack of robust security measures [1]
X @Cointelegraph
Cointelegraph· 2025-07-04 08:00
⚡ INSIGHT: In June 2025, cybersecurity researchers at Cybernews uncovered a record 16 billion passwords, including for Apple, Facebook, and Google, have been leaked in the largest data breach ever. https://t.co/GaKR5zx3kl ...
Who Owns You? Data, Power, and the Future of Privacy | Rohith Reji | TEDxIMTHyderabad
TEDx Talks· 2025-06-24 16:54
Digital Privacy & Consent - Traditional consent methods (simple yes/no in lengthy terms and conditions) are failing in the hyper-connected age [4] - Algorithms constantly learn, predict behavior, and influence choices, often beyond explicit consent [5] - Individuals often lack the knowledge to understand how their data is being utilized by tech giants, creating a power imbalance [6] - Meaningful consent should be clear, concise, and accessible to all [7] - Users should have granular control over data sharing preferences [8] Data Literacy & Awareness - In India, approximately 70% of people have formal access to social media, but only around 17% have data literacy awareness [9] - Individuals need to understand their privacy rights [12] Regulatory Landscape & Business Responsibility - India's Digital Personal Data Protection (DPDP) Act mandates customer consent for data utilization by corporations [11] - Unauthorized data access can result in a fine starting from 250 crore (25 billion) [12] - Businesses should adopt ethical and clear data collection practices, respecting customer consent [12] Data Breach & Security - India ranks second globally in data breach attacks [15] - Individuals should be proactive in advocating for their privacy rights and staying updated on relevant acts like the DPDP Act [14] - It's crucial to understand how to prevent further data leakage when unauthorized data access is suspected [15]
AT&T's Proposed Settlement of Data Breach Lawsuit Receives Preliminary Approval
PYMNTS.com· 2025-06-23 18:02
Core Viewpoint - AT&T's proposed $177 million settlement for a class action lawsuit related to data breaches has received preliminary approval from a judge, addressing the exposure of personal information of tens of millions of customers [2][3]. Group 1: Settlement Details - The settlement will compensate affected customers with payments of either $2,500 or $5,000, depending on the incident, and remaining funds will be distributed to other customers whose personal information was accessed [3]. - AT&T denies responsibility for the criminal acts leading to the data breaches but agreed to the settlement to avoid the costs and uncertainties of prolonged litigation [3]. Group 2: Data Breach Context - The data breaches occurred in May 2024 and July 2024, exposing personal information of tens of millions of customers [2]. - The stolen records included telephone numbers that interacted with AT&T's wireless network but did not contain the content of calls or texts or personally identifiable information [4]. Group 3: Cybersecurity Incident Background - The data theft is believed to have originated from a prior breach involving Snowflake, a cloud storage and data warehousing vendor [5]. - In September 2024, AT&T settled with the Federal Communications Commission (FCC) for $13 million related to a January 2023 hack that compromised customer information from a vendor's cloud environment [6].
DATA BREACH ALERT: Edelson Lechtzin LLP Is Investigating Claims On Behalf Of Krispy Kreme Doughnut Corporation Customers Whose Data May Have Been Compromised
GlobeNewswire News Room· 2025-06-20 22:04
Core Insights - Krispy Kreme Doughnut Corporation is under investigation for data privacy violations following unauthorized activity detected on its network around November 29, 2024 [1][3] - The company confirmed that certain personal information may have been compromised as a result of this incident, with the investigation concluding on May 22, 2025 [3] Company Overview - Krispy Kreme was founded in 1937 in North Carolina and has grown to operate over 1,400 shops globally [2] Incident Details - Unauthorized activity on Krispy Kreme's information technology systems was first identified on or about November 29, 2024 [3] - The investigation revealed that personal information, including names combined with other personal details, may have been affected [4] Legal Actions - Edelson Lechtzin LLP is investigating a potential class action lawsuit to seek legal remedies for individuals whose sensitive personal data may have been compromised [5]