数据泄露
Search documents
被裁后疯狂下载1.8万份文件、消失无踪,英特尔对前员工紧急起诉,要求索赔25万美元
3 6 Ke· 2025-11-11 03:51
Core Points - A former Intel employee, Jinfeng Luo, allegedly downloaded approximately 18,000 internal files, including "Top Secret" documents, before leaving the company [1][3] - Intel has filed a lawsuit against Luo, seeking at least $250,000 in damages and the return of all stolen materials [1][4] - The incident highlights a broader issue within Intel, as the company is undergoing significant structural challenges and has laid off around 35,000 employees in the past two years [8][7] Summary by Sections Incident Details - Jinfeng Luo received a termination notice on July 7 and downloaded a large volume of sensitive data just before his departure [3] - The downloaded files included critical company assets and proprietary technology, which are vital for Intel's future products and strategies [3][4] Legal Actions - Intel attempted to contact Luo multiple times over three months but received no response, leading to the lawsuit [4] - The lawsuit aims to recover the stolen data and seek financial compensation for the breach [4] Context and Implications - The incident is not isolated; another former Intel engineer, Varun Gupta, was recently sentenced to two years of probation and fined $34,000 for similar actions [5][6] - The ongoing layoffs and economic pressures within the tech industry may increase the risk of data theft as employees face job insecurity [8][7] - The general sentiment in the industry emphasizes that theft cannot be justified, and employees should pursue legal avenues for grievances rather than resorting to data theft [9]
国家安全部:数据泄露危害社会稳定 请牢记三条“密码生存法则”
Yang Shi Wang· 2025-10-28 22:31
Core Viewpoint - The importance of password security in the digital age is emphasized, highlighting that careless habits can compromise communication privacy and security systems [1][2]. Group 1: Bad Habits - Common bad habits include using simple passwords like "123456" and not changing default usernames such as "admin," which can lead to system breaches [2]. - A specific case is mentioned where a company failed to change initial passwords, resulting in a system breach and data leakage [2]. - Another example involves a hospital that did not encrypt patient data, leading to unauthorized access to thousands of medical records [2]. - The use of unapproved or pirated encryption software poses significant security risks, making systems vulnerable to attacks [2]. Group 2: Password Security Guidelines - Individuals are urged to take personal responsibility for password security, as data breaches can have broader implications for public safety [3]. - Passwords should be complex, combining letters, numbers, and symbols, with a minimum length of 12 characters, and should be changed regularly [3]. - It is advised to modify passwords through official channels and to be cautious of unsolicited requests for password changes [3]. - Devices such as routers and office computers should use strong encryption protocols to ensure secure network transmission [3]. Group 3: National Security Agency Recommendations - The National Security Agency stresses that password security is crucial and encourages individuals to be mindful of their password practices [4]. - Citizens are encouraged to report any suspicious activities related to password technology that may threaten national security [4].
外媒爆:澳总理、前总理等多名政界人士私人电话号码被美国网站泄露,相关部门正调查
Huan Qiu Wang· 2025-10-14 05:13
Core Points - The private phone numbers of several Australian political figures, including current Prime Minister Anthony Albanese and former Prime Minister Scott Morrison, have been leaked on a U.S. website, prompting an investigation by Australian authorities [1][3] - The leaked information includes contact details of various high-ranking officials and staff members from the Australian government, raising concerns about data security [3] Group 1 - The Australian government is aware of the situation and has notified relevant departments to address the issue [3] - The leaked data also includes information on other prominent figures, such as French President Macron and UK Prime Minister Starmer, although the authenticity of this information has not been confirmed [3] - The websites involved claim to possess contact information for millions of professionals, which raises questions about how this data was obtained [3]
古驰、巴黎世家等客户数据遭窃取;2025年暑期全国营业性演出票房收入同比增长3.9%
Mei Ri Jing Ji Xin Wen· 2025-09-16 23:17
Group 1: Kering Group Data Breach - Kering Group confirmed a data breach affecting millions of customers from brands like Gucci and Balenciaga, with stolen data including names, email addresses, phone numbers, addresses, and total spending [1] - The company stated that financial information such as credit card details was not compromised and has notified affected customers via email, though the specific number of impacted individuals was not disclosed [1] - This incident is viewed negatively from a financial perspective, as it could undermine consumer trust, potentially leading to customer attrition and a decline in brand value, sales performance, and market share [1] Group 2: ByteDance Employee Departure Posts - ByteDance's Vice President highlighted the emergence of misleading "ByteDance employee departure" posts on social media, which are often fabricated by training institutions to attract attention and sell courses [2] - The company has taken legal action against one particularly aggressive entity, resulting in a court ruling that deemed these actions as misleading advertising and unfair competition [2] - This situation underscores the importance of brand reputation in the capital market, as such false promotions can damage brand value and mislead consumers [2] Group 3: Dairy Industry Regulation - Starting September 16, the production of sterilized milk (long-life milk) is restricted to using only raw milk, prohibiting the use of reconstituted milk [3] - This regulation is expected to benefit the domestic dairy industry by increasing demand for raw milk and enhancing product quality, which could boost consumer confidence and market consumption [3] - The new policy is likely to promote the development of the domestic dairy farming sector and foster a positive cycle within the dairy industry [3] Group 4: Performing Arts Industry Growth - The summer of 2025 saw a 3.9% year-on-year increase in box office revenue for commercial performances in China, with total revenue reaching 15.135 billion yuan [4] - The number of performance sessions and audience attendance also experienced growth, indicating strong cultural consumption demand driven by rising incomes and consumption upgrades [4] - This growth is expected to attract more capital into the performing arts industry, enhancing the industry chain and contributing to economic growth through cultural vitality [4]
投资者避坑宝典:屏前帷慕藏陷阱指尖轻点需谨慎——网络安全特辑
Xin Lang Ji Jin· 2025-09-16 10:20
Group 1 - The article highlights the increasing cybersecurity risks associated with the rapid development of smart technologies, emphasizing the need for vigilance among internet users [9] - It discusses various fraudulent schemes, including high-return investment scams that lure investors into providing personal information, leading to potential financial losses [5][6] - The article warns about malicious investment software that masquerades as legitimate platforms, freezing assets and extorting users for "unfreezing" their funds [6][8] Group 2 - It stresses the importance of understanding new cybersecurity threats, such as AI-driven information leaks and high-yield investment frauds, urging users to protect their personal information [9] - The article recommends implementing multi-layered security strategies, including reliable antivirus software and regular updates of operating systems and applications, to enhance digital defenses [9]
X @外汇交易员
外汇交易员· 2025-09-16 04:04
开云集团确认发生数据泄露事件,影响旗下古驰(Gucci)、巴黎世家(Balenciaga)、Alexander McQueen、YSL等奢侈品牌。开云集团确认本次数据泄露始于6月,有未经授权的第三方临时访问开云集团的系统,获取了旗下品牌的一些客户数据,本次事件中黑客没有获取到信用卡、银行账户信息,但泄露的数据包括客户姓名、电话、电子邮箱、地址及有关品牌门店的消费金额。开云集团并未回应有哪些地区的市场受到此次影响。此次黑客攻击的幕后组织是ShinyHunters(闪亮猎人)。外汇交易员 (@myfxtrader):奢侈品品牌迪奥(DIOR)向用户发布短信称发生数据泄露事件,外部人员获取了部分客户数据,包括客户姓名、性别、手机号码、电子邮箱、邮寄地址以及消费金额和偏好等信息。迪奥客服称,收到短信的客户意味着受到此次数据泄露事件的影响,建议中国客户对任何可疑通信(短信、电话、电子邮件)保持警惕。 https://t.co/aJZw30ou70 ...
2025年上半年互联网黑灰产趋势年度总结报告-威胁猎人
Sou Hu Cai Jing· 2025-09-01 10:49
Group 1 - The report by Threat Hunter analyzes the trends of the internet black and gray industry in the first half of 2025, focusing on attack resources, technologies, and scenarios to provide reference for enterprise risk control [1][10] - Daily active risk IPs reached 13.82 million, a 15.02% increase compared to the previous period, with over 50% of attacks coming from "hijacked shared proxy" IPs [9][62] - The emergence of new "link code" methods for money laundering and a 28.6% increase in laundering bank cards were noted, with gambling-related cards accounting for 70.25% of the total [1][9] Group 2 - AI technology is being heavily misused, enabling minute-level face-swapping and 10-second voice cloning for fraud and authentication bypass [1][9] - Marketing fraud intelligence increased to 580 million entries, a 26% rise, with high risks in e-commerce and local life sectors [2][9] - Financial fraud incidents included 770,000 malicious loan-related entries, a 12% increase, while car loan fraud decreased by 10% and housing loan fraud surged by 63% [2][9] Group 3 - The report highlights the adaptability of the black industry, indicating that after being targeted, it quickly shifts to existing or emerging alternative channels [8][10] - API attacks exceeded 1.49 million times, with consumer finance being the primary target, utilizing methods such as account scanning and database collisions [2][9] - Data breaches reached 57,000 incidents, with e-commerce and finance being the focal points, and loan application information leaks increasing fourfold [2][9]
英伟达推理服务器被曝高危漏洞,云端AI模型被攻击直接裸奔
量子位· 2025-08-06 05:56
Core Viewpoint - The article discusses a critical vulnerability chain in NVIDIA's Triton Inference Server, which could lead to severe consequences such as model theft, data breaches, response manipulation, and system control loss [2][3][5]. Vulnerability Details - The vulnerability chain consists of three interconnected vulnerabilities: 1. CVE-2025-23320 allows attackers to exploit error messages to disclose the unique identifier of the shared memory area [8]. 2. CVE-2025-23319 enables out-of-bounds write operations using the disclosed identifier [10]. 3. CVE-2025-23334 facilitates out-of-bounds read operations, allowing attackers to manipulate server behavior [12][14]. Potential Consequences - The vulnerabilities could lead to: - Model theft, where attackers can steal proprietary AI models [5]. - Data breaches, allowing real-time access to sensitive data [5]. - Response manipulation, resulting in erroneous or biased outputs from AI models [5]. - System control loss, where attackers can pivot to other systems within the organization [6]. Security Implications - The vulnerabilities highlight a significant security risk in Triton's architecture, where a single vulnerability can compromise multiple critical components of an AI platform [7][26]. - The Python backend, while designed for flexibility, becomes a potential security weak point due to its broad usage across different frameworks [18][22]. Remediation Efforts - NVIDIA has released a patch for the vulnerabilities, urging users to update to the latest version of Triton Inference Server (25.07) [4][28]. - The vulnerabilities have not yet been exploited in real-world attacks, remaining confined to laboratory environments [27].
英国国防大臣希利:阿富汗安置计划因数据泄露事件导致成本约4亿英镑。
news flash· 2025-07-15 11:54
Core Points - The UK Defense Secretary, Ben Wallace, stated that the Afghan resettlement program has incurred costs of approximately £400 million due to a data breach incident [1] Group 1 - The Afghan resettlement program's costs have significantly increased as a result of the data leak [1] - The financial impact of the data breach is estimated at around £400 million [1]
给大热的智能体做体检:关键「安全」问题能达标吗?
21世纪经济报道· 2025-07-04 06:55
Core Viewpoint - The article discusses the emergence of "intelligent agents" as a significant commercial anchor and the next generation of human-computer interaction, highlighting the shift from "I say AI responds" to "I say AI does" [1] Group 1: Current State and Industry Perspectives - The concept of intelligent agents is currently the hottest topic in the market, with various definitions leading to confusion [3] - A survey indicates that 67.4% of respondents consider the safety and compliance issues of intelligent agents "very important," with an average score of 4.48 out of 5 [9] - The majority of respondents believe that the industry has not adequately addressed safety compliance, with 48.8% stating that there is some awareness but insufficient investment [9] Group 2: Key Challenges and Concerns - The complexity and novelty of risks associated with intelligent agents are seen as the biggest challenges in governance, with 62.8% of respondents agreeing [11] - The most concerning safety compliance issues identified are AI hallucinations and erroneous decisions (72%) and data leaks (72%) [14] - The industry is particularly worried about user data leaks (81.4%) and unauthorized operations leading to business losses (53.49%) [16] Group 3: Collaboration and Security Risks - The interaction of multiple intelligent agents raises new security risks, necessitating specialized security mechanisms [22] - The industry is working on security solutions for intelligent agent collaboration, such as the ASL (Agent Security Link) technology [22] Group 4: Data Responsibility and Transparency - The responsibility for data handling in intelligent agents is often placed on developers, with platforms maintaining a neutral stance [35] - There is a lack of clarity regarding data flow and responsibility, leading to potential blind spots in user data protection [34] - Many developers are unaware of their legal responsibilities regarding user data, which complicates compliance efforts [36]