Cybersecurity / Data breaches

Weekly Cybersecurity / Data breaches Insights

Stay ahead with our expertly curated weekly insights on the latest trends, developments, and news in Cybersecurity - Data breaches.

Recent Articles

Sort Options:

MRI scans, X-rays and more leaked online in major breach - over a million healthcare devices affected, here's what we know

MRI scans, X-rays and more leaked online in major breach - over a million healthcare devices affected, here's what we know

Researchers from Modat have identified over 1.2 million misconfigured healthcare devices leaking sensitive patient data, including medical images and personal information. They emphasize the urgent need for proactive cybersecurity measures to protect against identity theft and fraud in the healthcare sector.


How are MRI scanners and other healthcare devices leaking sensitive patient data online?
Many healthcare devices such as MRI scanners, X-ray machines, and blood test systems are misconfigured and connected to the internet without proper security measures. This includes lack of authentication, use of default passwords, and unpatched software vulnerabilities, which allow unauthorized access to sensitive medical images and personal patient information.
Sources: [1], [2], [3]
What are the risks to patients from these healthcare device data breaches?
Leaked medical images and personal health information can lead to identity theft, fraud, phishing attacks, and violations of patient confidentiality and privacy. Additionally, unsecured devices pose risks of network breaches, extortion, and can compromise patient safety by exposing critical healthcare infrastructure to cyberattacks.
Sources: [1], [2], [3]

11 August, 2025
TechRadar

Exposed Without a Breach: The Cost of Data Blindness

Exposed Without a Breach: The Cost of Data Blindness

In 2025, data breaches can occur without traditional attacks, often due to misconfigured systems and overpermissioned users. The article emphasizes the need for continuous data visibility to prevent silent exposures that can lead to significant reputational and legal consequences.


What does 'data blindness' mean in the context of cybersecurity?
Data blindness refers to the lack of continuous visibility and monitoring of data within an organization, which can lead to undetected exposures or leaks even without traditional cyberattacks. This often happens due to misconfigured systems or users having excessive permissions, allowing sensitive data to be exposed silently.
How can data breaches occur without traditional cyberattacks?
Data breaches can occur without traditional attacks when systems are misconfigured or when users have overpermissioned access, leading to accidental or silent data exposures. These vulnerabilities allow sensitive information to be accessed or leaked without the need for hacking or malware.

05 August, 2025
Security Affairs

141 Million-File Data Breach Reveals Bank Statements And Crypto Keys

141 Million-File Data Breach Reveals Bank Statements And Crypto Keys

A staggering 1,297 data breaches, exposing 141 million files, highlight a significant attack risk, with financial documents found in 93% of cases. This alarming trend underscores the urgent need for enhanced cybersecurity measures.


What types of financial documents were exposed in the 141 million-file data breach?
The breach exposed a wide range of financial documents including bank statements, which were present in 49% of incidents, and International Bank Account Numbers (IBANs), found in 36% of breached datasets. These documents can be used for identity fraud, mandate scams, and payment redirection, significantly increasing the risk of financial fraud for both employees and customers.
Sources: [1]
Why is the exposure of crypto keys in data breaches particularly concerning?
Crypto keys are sensitive digital credentials that allow access to cryptocurrency wallets and transactions. Their exposure in data breaches can lead to unauthorized access and theft of cryptocurrencies, which are often irreversible and difficult to recover. This makes the breach of crypto keys a critical security risk, compounding the financial damage beyond traditional banking fraud.
Sources: [1]

28 July, 2025
Forbes - Innovation

New Research Shows Data Breaches Keep Coming. Here's How to Protect Yourself

New Research Shows Data Breaches Keep Coming. Here's How to Protect Yourself

A recent report reveals over 1,000 data breaches in the first half of the year, impacting millions of Americans. This alarming trend highlights the growing need for enhanced cybersecurity measures to protect personal information.


What types of personal information are most commonly exposed in data breaches?
Data breaches often expose sensitive personal information such as names, dates of birth, home addresses, phone numbers, email addresses, Social Security numbers, medical record numbers, and sometimes order histories or account reference numbers. This information can be misused for identity theft or fraud, even if payment details are not compromised.
Why are data breaches becoming more frequent and costly for businesses?
Data breaches are increasing in frequency and cost due to businesses' growing reliance on digital infrastructure and cloud ecosystems. The average global cost of a data breach has risen to $4.76 million, with U.S. companies facing costs exceeding $9.5 million. Industries handling sensitive data, like finance and healthcare, often incur costs between $10 and $11 million per breach. These breaches cause significant disruption to business operations, damage reputation, and erode customer trust.

16 July, 2025
CNET

"No evidence" - here's why the massive 16 billion record data breach may not be as bad as first thought

"No evidence" - here's why the massive 16 billion record data breach may not be as bad as first thought

Recent analysis suggests the alarming 16 billion record data breach may not be as severe as initially feared, potentially comprising previously leaked credentials. Experts emphasize the ongoing risk to individuals and the importance of robust security measures against identity theft.


Why might the 16 billion record data breach not be as severe as initially feared?
The 16 billion records do not come from a single massive breach but rather from 30 different datasets that were briefly exposed. Much of the data appears to be a mixture of previously leaked credentials, infostealer malware collections, and repackaged leaks rather than new, centralized breaches. This means the data may have been circulating for some time and not all credentials are necessarily valid or current.
Sources: [1]
Does this data breach mean that companies like Google, Facebook, and Apple were directly hacked?
No, there was no centralized data breach at companies like Google, Facebook, or Apple. Instead, some leaked credentials include login URLs to these sites, but the data likely originated from various sources such as infostealer malware and credential stuffing attacks. This means the companies themselves were not directly compromised in a single incident.
Sources: [1], [2]

23 June, 2025
TechRadar

An unhandled error has occurred. Reload 🗙