
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Researchers say a coordinated campaign combined telephone-based social engineering with browser-resident phishing toolkits to target more than 100 organisations across sectors, manipulating live authentication sessions to bypass MFA and SSO protections. A contemporaneous but separate infostealer disclosure — an unsecured cache of roughly 149 million credential pairs captured from endpoints — heightens the risk of credential-stuffing and targeted vishing, complicating response and containment.

A late‑May 2025 intrusion into ApolloMD’s systems led to the unauthorized access and copying of personally identifiable and clinical information for about 626,540 people, with some files containing Social Security numbers; the incident was later posted to a ransomware-linked leak site. ApolloMD reported the event to federal health authorities, began mailing breach notifications by September 2025 and is offering affected parties complimentary credit monitoring, highlighting broader third‑party risk in health data aggregation.

Security researchers found a publicly exposed collection that listed roughly 3 billion email/password pairs and about 2.7 billion records containing Social Security numbers. The host took the dataset offline after notification, but a sampled review suggests hundreds of millions of SSNs could be valid and at risk of future exploitation.
An FBI cyber official warned the China-linked group Salt Typhoon likely preserved exfiltrated telecom records as a long-term intelligence cache rather than for immediate monetization. Investigators say the intrusion touched dozens of providers and may involve data tied to more than one million U.S. residents, heightening risks from future targeted surveillance and fraud.
A researcher found a publicly accessible collection of roughly 149 million stolen logins harvested by credential-stealing malware, including hundreds of thousands tied to major crypto platforms and numerous government-related accounts. The exposure stems from infected end-user devices rather than platform breaches, but it raises urgent questions about account hygiene, phishing risk, and detection across the crypto and social-media ecosystems.
A July ransomware incident at Ingram Micro led to the theft of employment and applicant records for about 42,521 people and service outages that were largely resolved within a week. A threat actor later published roughly 3.5 TB of claimed data; the company is offering two years of identity protection while facing regulatory notification, legal exposure, and heightened supply‑chain scrutiny.
A prolonged intrusion into Conduent’s systems has revealed personal and medical records tied to Volvo Group employees, with roughly 17,000 staff impacted and broader consumer exposure measured in the millions. State filings show the scope has swollen well beyond initial estimates, forcing a complex third‑party remediation and regulatory reporting challenge for affected companies.

A critical unauthenticated remote-code execution bug (CVE-2026-1731) in BeyondTrust Remote Support and Privileged Remote Access was probed and targeted within 24 hours of a public proof-of-concept, exposing thousands of internet-facing instances. Organizations should treat exposed BeyondTrust deployments as emergency patching and containment priorities, applying access restrictions, WAF/ACL rules, and focused threat-hunting while verifying remediation.