<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/">

<channel>
	<title>data leak | Business Upturn</title>
	<atom:link href="https://www.businessupturn.com/news/topic/data-leak/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.businessupturn.com</link>
	<description>India&#039;s leading business and financial news portal — markets, economy, stocks and corporate news.</description>
	<lastBuildDate>Fri, 23 Feb 2024 17:24:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.businessupturn.com/wp-content/uploads/2023/07/favicon-150x150.jpg</url>
	<title>data leak | Business Upturn</title>
	<link>https://www.businessupturn.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Chinese hacking group data leak exposes global targets</title>
		<link>https://www.businessupturn.com/technology/cyber-security/chinese-hacking-group-data-leak-exposes-global-targets/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Fri, 23 Feb 2024 17:24:08 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[geopolitics]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Julian Assange]]></category>
		<category><![CDATA[Wikileaks]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=402762</guid>

					<description><![CDATA[A large amount of data from a Chinese state-linked hacking group has been leaked online. This leak comes at a time when Julian Assange, the founder of WikiLeaks, is facing extradition to the United States.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:487&quot;&gt;A massive leak of data from a state-linked hacking group in China has sent shockwaves through the cybersecurity world, offering an unprecedented glimpse into the secretive and expansive operations of the nation’s cyber espionage apparatus. The leaked files, attributed to a Shanghai-based group known as iSoon, paint a concerning picture of China’s aggressive tactics, targeting governments, companies, and individuals across the globe with a relentless pursuit of sensitive information.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:423&quot;&gt;The data dump, consisting of over 570 files encompassing contracts, target lists, and internal chat logs, landed on GitHub last week, sparking immediate scrutiny from cybersecurity experts worldwide. While the source of the leak remains shrouded in mystery, the authenticity of the files has been largely confirmed, raising serious questions about China’s cyber activities and their implications for international security.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:422&quot;&gt;The documents reveal a complex web of state-sanctioned hacking, with Chinese intelligence agencies, military, and police outsourcing their cyber operations to private contractors like iSoon. This practice, known as “offensive security,” allows the government to maintain plausible deniability while conducting aggressive cyber campaigns against foreign adversaries and domestic targets deemed threats to national security.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:575&quot;&gt;The leaked information exposes a vast network of targets spanning across 20 countries, including India, Taiwan, South Korea, and even close allies like Cambodia and Pakistan. The hackers sought a diverse range of data, from sensitive government road maps in Taiwan to immigration records in India and call logs from South Korean telecom giants. This insatiable appetite for intelligence highlights the strategic objectives of China’s cyber operations, which appear to go beyond mere espionage and delve into the realms of economic warfare and potential military preparedness.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:504&quot;&gt;Beyond the geopolitical implications, the leak also sheds light on the internal workings of China’s hacking industry. The data reveals complaints from disgruntled iSoon employees regarding low wages and demanding workloads, hinting at a culture of exploitation and pressure within the group. This glimpse into the human cost of cyber warfare adds another layer of complexity to the narrative, raising ethical questions about the individuals who are often instrumentalized in these clandestine operations.&lt;/p&gt;
&lt;p data-sourcepos=&quot;13:1-13:591&quot;&gt;The timing of this leak coincides with the ongoing legal battle surrounding Julian Assange, the founder of WikiLeaks, who faces extradition to the United States for his role in publishing classified information. This case has reignited debates about freedom of speech, press freedom, and the role of whistleblowers in exposing government wrongdoings. While the motivations behind the iSoon leak remain unclear, it undoubtedly raises similar questions about the ethical implications of exposing classified information, even when it pertains to potentially illegal or harmful state activities.&lt;/p&gt;
&lt;p data-sourcepos=&quot;15:1-15:557&quot;&gt;In conclusion, the leak of data from iSoon represents a significant development in the ongoing saga of international cyber espionage. It exposes the vast scale and sophistication of China’s hacking operations, raising concerns about the potential for cyber conflict and the erosion of trust between nations.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Chinese-hacking-group-data-leak-exposes-global-targets.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Chinese hacking group data leak exposes global targets]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Chinese-hacking-group-data-leak-exposes-global-targets.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Leaked documents expose China’s cyber espionage network</title>
		<link>https://www.businessupturn.com/technology/cyber-security/leaked-documents-expose-chinas-cyber-espionage-network/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Fri, 23 Feb 2024 16:44:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Vigilance]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=402350</guid>

					<description><![CDATA[A massive leak of data from I-Soon, a Chinese tech security firm, has exposed details of China&apos;s cyber espionage operations.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:415&quot;&gt;The revelation of a massive data leak from I-Soon, a Chinese tech security firm deeply intertwined with the country’s government agencies. This unprecedented breach offered a startling glimpse into the inner workings of China’s cyber espionage apparatus, raising serious concerns about global security and the extent of state-sponsored hacking activities.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:403&quot;&gt;The leaked data, encompassing contracts, marketing materials, product manuals, and personnel lists, painted a disturbing picture of I-Soon’s involvement in a wide range of activities. From large-scale surveillance of overseas dissidents to targeted hacking campaigns against foreign nations, the documents laid bare the methods employed by Chinese authorities to exert influence and gather intelligence.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:476&quot;&gt;One particularly concerning aspect of the leak was the revelation of I-Soon’s role in hacking networks across Central and Southeast Asia, as well as Hong Kong and Taiwan. The leaked documents detailed sophisticated tools used to unmask users on social media platforms, infiltrate email accounts, and mask the online activities of Chinese agents operating abroad. This ability to operate with near impunity highlights the sophistication and reach of China’s cyber capabilities.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:467&quot;&gt;Furthermore, the leak shed light on the competitive landscape of state-sponsored hacking. Documents revealed how government targeting requirements fueled a marketplace of independent contractor hackers-for-hire, with I-Soon acting as a key player in this ecosystem. This revelation underscores the potential for such activities to become increasingly decentralized and difficult to track, posing a significant challenge for international efforts to combat cybercrime.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:555&quot;&gt;The impact of this leak is multifaceted. On one hand, it has severely damaged I-Soon’s reputation, exposing the company’s close ties to the Chinese government and raising ethical questions about its activities. On another hand, it has provided invaluable insights for the cybersecurity community, offering a rare opportunity to understand the inner workings of a state-affiliated hacking contractor. This knowledge can be used to improve attribution efforts, develop more effective defence strategies, and raise awareness of the evolving threat landscape.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:555&quot;&gt;The source of the leak remains unknown. Regardless of its origin, the leak has sparked a global conversation about the ethical implications of state-sponsored hacking and the need for international cooperation to address this growing threat. While the investigation into the leak’s authenticity continues, its credibility has been widely acknowledged by cybersecurity experts, further amplifying its significance.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Leaked-documents-expose-Chinas-cyber-espionage-network.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Leaked documents expose China’s cyber espionage network]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Leaked-documents-expose-Chinas-cyber-espionage-network.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Here’s why there still may be a data breach risk for more than 2 million Toyota owners</title>
		<link>https://www.businessupturn.com/technology/cyber-security/heres-why-there-still-may-be-a-data-breach-risk-for-more-than-2-million-toyota-owners/</link>
		
		<dc:creator><![CDATA[Avinash Ram]]></dc:creator>
		<pubDate>Fri, 12 May 2023 16:28:34 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[Toyota]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=309691</guid>

					<description><![CDATA[Toyota has disclosed that owing to human mistake, the data of 2.15 million Japanese users who registered for its cloud service platforms since 2012 was made available to the public for ten years.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Toyota has disclosed that owing to human mistake, the data of 2.15 million Japanese users who registered for its cloud service platforms since 2012 was made available to the public for ten years. Almost all of the consumer base is included in this, according to a Reuters report.&lt;/p&gt;
&lt;p&gt;A Toyota representative claimed that a mistake made by a person resulted in an issue that persisted from November 2013 to mid-April. They unintentionally changed a cloud system from private to public, potentially disclosing information such as the whereabouts of automobiles and their licence plates. The business asserts that it has no proof that this information was misused inadvertently.&lt;/p&gt;
&lt;p&gt;Customers of Toyota, particularly those of its upscale Lexus brand, have been compromised. The biggest automaker in the world is now concentrating on cloud-based data management and vehicle connectivity, which are necessary for providing autonomous driving and other AI-powered capabilities.&lt;/p&gt;
&lt;p&gt;Customers who subscribed to the T-Connect service, which provides a range of services including AI voice-enabled driving assistance, automatic connection to call centres for vehicle management, and emergency support for situations like traffic accidents or sudden illness, were impacted. Additionally, G-Link subscribers who own Lexus vehicles were also impacted.&lt;/p&gt;
&lt;p&gt;Toyota claimed that after the problem was identified, it prevented outside access to the data. Additionally, an investigation is being conducted into every cloud environment that the corporation manages.&lt;/p&gt;
&lt;p&gt;The representative claimed that there were not enough “active detection mechanisms, and activities to detect the presence or absence of things that became public.” Toyota stated that it intends to put in place a system for checking cloud settings, create continuing monitoring protocols, and offer thorough employee training on data handling policies.&lt;/p&gt;
&lt;p&gt;A representative of the Personal Information Protection Commission of Japan has stated that they were made aware of the event.&lt;/p&gt;
&lt;p&gt;Koji Sato, the CEO of Toyota, is dealing with issues like testing issues with an affiliate and a shareholder demand for more transparency on lobbying efforts relating to climate change.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2023/05/toyota-company-300x200-1.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Here’s why there still may be a data breach risk for more than 2 million Toyota owners]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2023/05/toyota-company-300x200-1.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Meta and Tiktok acquire user data through web forms without their consent: Report</title>
		<link>https://www.businessupturn.com/technology/meta-and-tiktok-acquire-user-data-through-web-forms-without-their-consent-report/</link>
		
		<dc:creator><![CDATA[Aryan Jakhar]]></dc:creator>
		<pubDate>Tue, 17 May 2022 09:40:08 +0000</pubDate>
				<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[Meta]]></category>
		<category><![CDATA[TikTok]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=222380</guid>

					<description><![CDATA[According to a study, Meta Platforms and TikTok capture hashed personal information from web forms even when the user does not submit the form or grant authorization.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Researchers discovered that when a user clicks any button or link after filling out a form, user data may be leaked to Meta.&lt;/p&gt;
&lt;p&gt;According to a study, Meta Platforms and &lt;a href=&quot;https://www.businessupturn.com/news/topic/tiktok/&quot;&gt;TikTok&lt;/a&gt; capture hashed personal information from web forms even when the user does not submit the form or grant authorization.&lt;/p&gt;
&lt;p&gt;According to researchers from KU Leuven, Radboud University, and the University of Lausanne, both Meta Pixel and &lt;a href=&quot;https://www.businessupturn.com/news/topic/tiktok/&quot;&gt;TikTok&lt;/a&gt; Pixel offer a feature called Automatic Advanced Matching (AAM) that captures hashed personal IDs from web forms in an automated manner.&lt;/p&gt;
&lt;p&gt;Pixels are a type of code that allows platforms to track visitor behaviour. This data can be used to serve adverts to consumers based on their interests, preferences, and online behaviour. It can also track the effectiveness of advertisements.&lt;/p&gt;
&lt;p&gt;The hashed personal identifiers are then used to target adverts on the platforms in question, track conversions, and develop new custom audiences.&lt;/p&gt;
&lt;h3&gt;&lt;em&gt;&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;strong&gt;Meta and Tiktok acquire user data&lt;/strong&gt;&lt;/span&gt;&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;According to Meta’s and &lt;a href=&quot;https://www.businessupturn.com/news/topic/tiktok/&quot;&gt;TikTok’s&lt;/a&gt; instructions, AAM should collect data when a user submits a form.&lt;/p&gt;
&lt;p&gt;Researchers discovered that when a user clicks links. Or buttons that don’t look like submit buttons, both platforms capture hashed personal data.&lt;/p&gt;
&lt;p&gt;The scripts in Meta and &lt;a href=&quot;https://www.businessupturn.com/news/topic/tiktok/&quot;&gt;TikTok&lt;/a&gt; don’t even try to recognise submit buttons. According to the researchers. These sites capture hashed personal information. Even when a user abandons a form and clicks a button or link to go away from the website.&lt;/p&gt;
&lt;p&gt;The researchers also looked at 1 lakh websites to see. Whether there were any data leaks caused by unrelated button or link hits.&lt;/p&gt;
&lt;p&gt;They discovered that when a user clicks any button or link. After filling out a form, 8,438 US and 7,379 EU sites may leak user data to Meta. They also discovered 154 US and 147 EU websites that were leaking user data to &lt;a href=&quot;https://www.businessupturn.com/news/topic/tiktok/&quot;&gt;TikTok&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;According to the researchers. Users’ email addresses are transmitted to tracking, marketing, and analytics domains. Before submitting forms and giving consent.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2022/04/chinese-hack.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Meta and Tiktok acquire user data through web forms without their consent: Report]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2022/04/chinese-hack.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Data of around 92% of LinkedIn users exposed</title>
		<link>https://www.businessupturn.com/business/data-of-around-92-of-linkedin-users-exposed/</link>
		
		<dc:creator><![CDATA[Diya S.]]></dc:creator>
		<pubDate>Wed, 30 Jun 2021 15:14:38 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=118426</guid>

					<description><![CDATA[Employment-oriented online service LinkedIn has experienced a massive data expose for the second time in the year 2021. Reportedly, data...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Employment-oriented online service LinkedIn has experienced a massive data expose for the second time in the year 2021. Reportedly, data of over 700 million users has been put up for an online sale by a hacker. As the social networking site has around 756 million users, data of 92 per cent of such users has been exposed.&lt;/p&gt;
&lt;p&gt;According to Privacy Sharks, the data consists of the personal details of LinkedIn users like phone numbers, physical addresses, geolocation data along with inferred salaries. On 22nd June, the hacker had uploaded a sample of data of a million users on a hacker forum.&lt;/p&gt;
&lt;p&gt;LinkedIn has acknowledged that as a matter of fact, the breach was an “accumulation of data obtained from numerous sources, including some data scraped from LinkedIn.”&lt;/p&gt;
&lt;p&gt;It responded saying that LinkedIn’s teams have investigated a set of alleged LinkedIn data that were posted on sale while assuring that there was no data breach and no data of private LinkedIn member had been exposed.&lt;/p&gt;
&lt;p&gt;Linkedln further added, “Our initial investigation has found that this data was scraped from LinkedIn and other various websites and includes the same data reported earlier this year in our April 2021 scraping update.” It continued with signifying how LinkedIn members trust the site with their data and therefore, any misuse of their data like scraping violates the terms of service of LinkedIn.&lt;/p&gt;
&lt;p&gt;The online service assured, “When anyone tries to take member data and use it for purposes LinkedIn and our members haven’t agreed to, we work to stop them and hold them accountable.”&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2021/06/79F100FF-D08E-45BE-977C-7AB49EDD5D64.jpeg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Data of around 92% of LinkedIn users exposed]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2021/06/79F100FF-D08E-45BE-977C-7AB49EDD5D64.jpeg" width="1200" height="675" />
	</item>
		<item>
		<title>Cambridge Analytica booked by CBI for Facebook data theft</title>
		<link>https://www.businessupturn.com/business/cambridge-analytica-booked-by-cbi-for-facebook-data-theft/</link>
		
		<dc:creator><![CDATA[Sanah Shah]]></dc:creator>
		<pubDate>Fri, 22 Jan 2021 08:18:42 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[Facebook]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=87486</guid>

					<description><![CDATA[The CBI has filed a case against Cambridge Analytica and Global Science Research Ltd based in the UK. The cause...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;The CBI has filed a case against Cambridge Analytica and Global Science Research Ltd based in the UK. The cause is illegally harvesting data of Facebook users in India for commercial purposes, according to officials.&lt;/p&gt;
&lt;p&gt;After an initial inquiry, it was discovered that Global Science Research had designed an app called, “thisisyourdigitallife” which was permitted by Facebook to collect specific datasets of its users for research and academic purposes in 2014, Moneycontrol reported.&lt;/p&gt;
&lt;p&gt;The company set foot into a criminal conspiracy with Cambridge Analytica, allowing it to utilize the data gathered for commercial purposes, said the officials.&lt;/p&gt;
&lt;p&gt;Facebook had collected certificates from the companies in 2016-2017 that the data harvested using “thisisyourdigitallife” was attributed and destroyed. Although the CBI did not find any proof of destruction of data, according to the officials.&lt;/p&gt;
&lt;p&gt;Citing the FIR, an official said, “The enquiry prima facie established that Global Science Research Ltd, UK dishonestly and fraudulently accessed data of app users of “thisisyourdigitallife” and their Facebook friends.”&lt;/p&gt;
&lt;p&gt;The government commanded to have a CBI probe in the issue after US tech giant company, Facebook admitted that 5.62 lakh people in India were “potentially affected” by the global data breach by CA and contended that the consulting firm did not have its consent in hijacking the data.&lt;/p&gt;
&lt;p&gt;The data breach is being investigated by the CBI after the government’s order. They received a reference from the ministry of information and technology.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2021/01/cambrudge-data-breach.jpg" medium="image" width="1200" height="625"><media:title type="html"><![CDATA[Cambridge Analytica booked by CBI for Facebook data theft]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2021/01/cambrudge-data-breach.jpg" width="1200" height="625" />
	</item>
		<item>
		<title>Cognizant Data Leak: Credit card information, personal data of some employees leaked</title>
		<link>https://www.businessupturn.com/technology/cyber-security/cognizant-data-leak-credit-card-information-personal-data-of-some-employees-leaked/</link>
		
		<dc:creator><![CDATA[Anushka Sharma]]></dc:creator>
		<pubDate>Mon, 22 Jun 2020 17:14:20 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cognizant]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[data leak]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=16641</guid>

					<description><![CDATA[Due to ransomware attack, corporate credit card information, personal data of major IT company Cognizant employees leaked. This attack was...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Due to ransomware attack, corporate credit card information, personal data of major IT company Cognizant employees leaked. This attack was from Maze ransomware.&lt;/p&gt;
&lt;p&gt;Cognizant in a mail to employees said, “A limited amount of personal data (of associates) was compromised before the attack was contained on May 1. Vast majority of the information consisted of names and account numbers (and no other personal information) from some American Express cards.”&lt;/p&gt;
&lt;p&gt;The IT major is expected to face loss of $50-$70 million in its revenue of the current quarter. The company told all its employees with corporate credit cards will be given access to credit card monitoring, dark web monitoring and restoration services for free. There are a few employees whose personal data has been compromised as well.&lt;/p&gt;
&lt;p&gt;Becky Schmitt, chief public officer at Cognizant sent an email to the employees stating, “Out of an abundance of caution, we are giving notice to all associates who have an active corporate credit card.”&lt;/p&gt;
&lt;p&gt;“The small number of associates who have had other kinds of personal information exposed will be notified directly by June 24, 2020, and will also receive complimentary identify theft protection,” the company reportedly said.&lt;/p&gt;
&lt;p&gt;In this ransomware attack information like tax IDs, social security numbers, passport data, driver’s licence information, etc has been compromised.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2020/06/fwkhhg.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Cognizant Data Leak: Credit card information, personal data of some employees leaked]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2020/06/fwkhhg.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Cyber leak: More than 1 lakh national IDs including PAN , Passport and Aadhar data for sale on dark net, reported by Cyble</title>
		<link>https://www.businessupturn.com/technology/cyber-security/cyber-leak-more-than-1-lakh-national-ids-including-pan-passport-and-aadhar-data-for-sale-on-dark-net-reported-by-cyble/</link>
		
		<dc:creator><![CDATA[Anushka Sharma]]></dc:creator>
		<pubDate>Wed, 03 Jun 2020 18:31:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[data leak]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=12349</guid>

					<description><![CDATA[Cyble: More than 1 lakh national IDs including PAN, Passport and Aadhar for sale on the dark net According to...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Cyble: More than 1 lakh national IDs including PAN, Passport and Aadhar for sale on the dark net&lt;br /&gt;
According to a cyber intelligence firm, Cyble more than 1 lakh scanned copies of national IDs like PAN card, Aadhar card and Passport have been put up for sale. This data is leaked not leaked from the government systems. It has been leaked from third party systems where people have to comply with Know Your Customers (KYC) norms.&lt;/p&gt;
&lt;p&gt;Today Cyble said, “We came across a non-reputed actor who is currently selling over 1 lakh Indian National IDs on the darknet. With such a low reputation, ideally, we would have skipped this; however, the samples shared by the actor intrigued our interest — and also the volume. The actor is alleged to have access to over 1 lakh IDs from different places in India.”&lt;/p&gt;
&lt;p&gt;Online data leak results in identity theft, scams and corporate espionage. This will result in numerous fraudulent activities. Cyble researchers got around 1,000 IDs from the seller and confirmed that all those IDs belonged to Indians.&lt;/p&gt;
&lt;p&gt;“Preliminary analysis suggests that the data originated from a third party, and no indication or artefact is indicating that it came from a government system. At this point, Cyble researchers are still investigating this further — we are hoping to share an update soon,” Cyble said.&lt;/p&gt;
&lt;p&gt;“Cyble researchers have also learned about a surge in KYC and banking scams — leaks such as this are often used by scammers to target individuals, especially elderlies,” Cyble added.&lt;/p&gt;
&lt;p&gt;The intelligence firm has suggested people to avoid sharing personal and financial information over phones, emails and SMS. It also recommended that people should regularly monitor their financial transactions and report any kind of suspicion to the bank. In previous reports, Cyble has reported incidents where the personal data of 7.65 crore Indians have been put up for sale on the dark web.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2020/06/8-web-courses-supplement-your-hacking-knowledge.1280x600.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Cyber leak: More than 1 lakh national IDs including PAN , Passport and Aadhar data for sale on dark net, reported by Cyble]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2020/06/8-web-courses-supplement-your-hacking-knowledge.1280x600.jpg" width="1200" height="675" />
	</item>
	</channel>
</rss>
