<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:media="http://search.yahoo.com/mrss/">
    <channel><title>Consumer Insights</title><description>News, views and insights from the Bitdefender experts</description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/</link><image><url>https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png</url><title>Consumer Insights</title><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/</link></image><generator>Bitdefender Blog</generator><lastBuildDate>Wed, 11 Mar 2026 00:36:19 GMT</lastBuildDate><atom:link href="https://www.bitdefender.com/nuxt/api/en-gb/rss/hotforsecurity/data-breach/" rel="self" type="application/rss+xml"/><ttl>1800</ttl><item><title>Was Your Data Exposed in the Latest Under Armour Breach? Here’s What You Should Do</title><description><![CDATA[If you’ve ever created an Under Armour account, subscribed to emails, or bought gear online, you may want to pay extra attention.

Millions of users recently began receiving breach alerts tied to Under Armour after a massive dataset allegedly linked to the brand was posted online. While the company is still investigating, the leaked data was serious enough for breach notification services to notify affected users directly.

So what actually happened, and what should you do next?


What happened?]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/was-your-data-exposed-in-the-latest-under-armour-breach-heres-what-you-should-do</link><guid isPermaLink="false">698089112fa53a9f2eef30e3</guid><category><![CDATA[Data Breach]]></category><category><![CDATA[Digital Privacy]]></category><dc:creator>Alina BÎZGĂ</dc:creator><pubDate>Mon, 02 Feb 2026 11:27:25 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/Was-Your-Data-Exposed-in-the-Latest-Under-Armour-Breach-Here-s-What-You-Should-Do.png" medium="image"/><content:encoded><![CDATA[If you’ve ever created an Under Armour account, subscribed to emails, or bought gear online, you may want to pay extra attention.

Millions of users recently began receiving breach alerts tied to Under Armour after a massive dataset allegedly linked to the brand was posted online. While the company is still investigating, the leaked data was serious enough for breach notification services to notify affected users directly.

So what actually happened, and what should you do next?


What happened?]]></content:encoded></item><item><title>Breach at Tinder, Hinge and OkCupid parent Match Group exposes user data</title><description><![CDATA[User data linked to Tinder, Hinge and OkCupid was exposed after a breach at their parent company. Here’s what happened and what wasn’t accessed.


Tinder, Hinge and OkCupid user data exposed

Match Group, the parent company of several widely used dating platforms including Tinder, Hinge, OkCupid, Match.com and Meetic, has acknowledged it suffered a cybersecurity incident after criminals claimed to possess internal data tied to multiple services.

The confirmation followed the release of compress]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/breach-at-tinder-hinge-and-okcupid-parent-match-group-exposes-user-data</link><guid isPermaLink="false">697cd1152fa53a9f2eef3041</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Digital Privacy]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Fri, 30 Jan 2026 15:43:23 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/01/love-4888774_1920.jpg" medium="image"/><content:encoded><![CDATA[User data linked to Tinder, Hinge and OkCupid was exposed after a breach at their parent company. Here’s what happened and what wasn’t accessed.


Tinder, Hinge and OkCupid user data exposed

Match Group, the parent company of several widely used dating platforms including Tinder, Hinge, OkCupid, Match.com and Meetic, has acknowledged it suffered a cybersecurity incident after criminals claimed to possess internal data tied to multiple services.

The confirmation followed the release of compress]]></content:encoded></item><item><title>Europe Slaps Tech Sector with €1.2 Billion in Fines under GDPR in 2025</title><description><![CDATA[European data protection regulators levied roughly €1.2 billion in General Data Protection Regulation (GDPR) fines during 2025, as data privacy enforcement remains a key priority for authorities across the EU and European Economic Area (EEA).


Breach reports set new record



The annual DLA Piper GDPR Fines and Data Breach Survey finds that while aggregate fines were little changed from 2024, personal data breach notifications surged, marking a sharp shift from recent years.

For the first time]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/europe-tech-sector-eu1-2-billion-fines-gdpr-2025</link><guid isPermaLink="false">69776d332fa53a9f2eef2aa6</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Filip TRUȚĂ</dc:creator><pubDate>Mon, 26 Jan 2026 14:30:50 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/01/header-3.png" medium="image"/><content:encoded><![CDATA[European data protection regulators levied roughly €1.2 billion in General Data Protection Regulation (GDPR) fines during 2025, as data privacy enforcement remains a key priority for authorities across the EU and European Economic Area (EEA).


Breach reports set new record



The annual DLA Piper GDPR Fines and Data Breach Survey finds that while aggregate fines were little changed from 2024, personal data breach notifications surged, marking a sharp shift from recent years.

For the first time]]></content:encoded></item><item><title>European Space Agency's cybersecurity in freefall as yet another breach exposes spacecraft and mission data</title><description><![CDATA[It has just been a few weeks since we reported on the Christmas cyber attack suffered by the European Space Agency (ESA), and the situation has already become worse.

When ESA revealed that it had been hacked over the Christmas period by a hacker known as "888" it was quick to reassure the public that the impact was "limited" to external servers containing unclassified engineering data.

The hacker, however, claimed to have exfiltrated some 200GB of data, including source code, API and access to]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/european-space-agencys-cybersecurity-in-freefall-as-yet-another-breach-exposes-spacecraft-and-mission-data</link><guid isPermaLink="false">6971e1c22fa53a9f2eef28e9</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Graham CLULEY</dc:creator><pubDate>Thu, 22 Jan 2026 08:38:52 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/01/esa-breach.jpeg" medium="image"/><content:encoded><![CDATA[It has just been a few weeks since we reported on the Christmas cyber attack suffered by the European Space Agency (ESA), and the situation has already become worse.

When ESA revealed that it had been hacked over the Christmas period by a hacker known as "888" it was quick to reassure the public that the impact was "limited" to external servers containing unclassified engineering data.

The hacker, however, claimed to have exfiltrated some 200GB of data, including source code, API and access to]]></content:encoded></item><item><title>European Space Agency Confirms New Data Breach; Classified Info May Have Been Stolen</title><description><![CDATA[The European Space Agency (ESA) has confirmed yet another cybersecurity breach — this time affecting external servers used in collaborative engineering. A threat actor claiming responsibility for the attack has allegedly pilfered “classified documents.”

ESA acknowledged that attackers had gained unauthorized access to servers located outside its corporate network. According to the agency, these systems contained information relating to collaborative engineering projects.

“ESA is aware of a rec]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/european-space-agency-data-breach-classified-documents</link><guid isPermaLink="false">69550cb52fa53a9f2eef19f8</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Filip TRUȚĂ</dc:creator><pubDate>Wed, 31 Dec 2025 11:48:23 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/12/astronaut-11080_1920.jpg" medium="image"/><content:encoded><![CDATA[The European Space Agency (ESA) has confirmed yet another cybersecurity breach — this time affecting external servers used in collaborative engineering. A threat actor claiming responsibility for the attack has allegedly pilfered “classified documents.”

ESA acknowledged that attackers had gained unauthorized access to servers located outside its corporate network. According to the agency, these systems contained information relating to collaborative engineering projects.

“ESA is aware of a rec]]></content:encoded></item><item><title>Rainbow Six Siege Servers Offline After Massive Breach Floods Accounts with Billions of R6 Credits</title><description><![CDATA[An internal system failure allowed large-scale abuse of moderation and economy features before Ubisoft intervened.


Internal tools reportedly abused

Rainbow Six Siege players began reporting widespread irregularities affecting the game’s core systems over the weekend. Screenshots and videos circulating online showed accounts being banned and unbanned at will, unusual messages appearing in moderation feeds, and inventories suddenly filling with content that would normally require years or signi]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/rainbow-six-siege-servers-offline-after-massive-breach-floods-accounts-with-billions-of-r6-credits</link><guid isPermaLink="false">69527ed62fa53a9f2eef1949</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Mon, 29 Dec 2025 13:15:32 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/12/toy-4038447_1920.jpg" medium="image"/><content:encoded><![CDATA[An internal system failure allowed large-scale abuse of moderation and economy features before Ubisoft intervened.


Internal tools reportedly abused

Rainbow Six Siege players began reporting widespread irregularities affecting the game’s core systems over the weekend. Screenshots and videos circulating online showed accounts being banned and unbanned at will, unusual messages appearing in moderation feeds, and inventories suddenly filling with content that would normally require years or signi]]></content:encoded></item><item><title>21,000 Nissan Customers Exposed After Third-Party Server Breach</title><description><![CDATA[Unauthorized access to a contractor-managed system led to the exposure of contact data for thousands of customers.


Red Hat-managed infrastructure breached

Nissan has disclosed a data breach affecting roughly 21,000 customers linked to a former dealership in Japan, following unauthorized access to a server managed by Red Hat. The intrusion was detected in late September, and Nissan was notified in early October, according to a breach notice published by the automaker in December.

The compromi]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/21-000-nissan-customers-exposed-after-third-party-server-breach</link><guid isPermaLink="false">694bf0a02fa53a9f2eef1875</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Digital Privacy]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Wed, 24 Dec 2025 13:56:06 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/12/tigran-hambardzumyan-B2gmkU2mgqw-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Unauthorized access to a contractor-managed system led to the exposure of contact data for thousands of customers.


Red Hat-managed infrastructure breached

Nissan has disclosed a data breach affecting roughly 21,000 customers linked to a former dealership in Japan, following unauthorized access to a server managed by Red Hat. The intrusion was detected in late September, and Nissan was notified in early October, according to a breach notice published by the automaker in December.

The compromi]]></content:encoded></item><item><title>Spotify Catalog Scraped, 300TB Music and Metadata Dumped via Torrent</title><description><![CDATA[An unauthorized archival project claims to preserve nearly the entire Spotify music catalog.


From academic texts to music at scale

Anna’s Archive, a shadow library best known for archiving scientific papers and books, has abruptly expanded its scope, with a massive release of data sourced from Spotify. The group says it scraped the streaming platform at scale, resulting in a collection that includes roughly 86 million audio files alongside metadata covering 256 million tracks.

The full datas]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/spotify-catalog-scraped-300tb-music-and-metadata-dumped-via-torrent</link><guid isPermaLink="false">694a81e02fa53a9f2eef17c8</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Tue, 23 Dec 2025 11:51:04 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/12/thibault-penin-vfeSEdi9CuM-unsplash.jpg" medium="image"/><content:encoded><![CDATA[An unauthorized archival project claims to preserve nearly the entire Spotify music catalog.


From academic texts to music at scale

Anna’s Archive, a shadow library best known for archiving scientific papers and books, has abruptly expanded its scope, with a massive release of data sourced from Spotify. The group says it scraped the streaming platform at scale, resulting in a collection that includes roughly 86 million audio files alongside metadata covering 256 million tracks.

The full datas]]></content:encoded></item><item><title>University of Sydney Confirms Data Breach Affecting Thousands</title><description><![CDATA[Unauthorized access to a development system led to the exposure of historical personal records.


Breach discovery and immediate response

Personal information on University of Sydney staff and students was exposed in a cybersecurity incident involving unauthorized access to an internal online coding repository, the university confirmed. The breach was detected last week after suspicious activity was identified within a single IT system used mainly to develop software.

Access was swiftly blocke]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/university-of-sydney-confirms-data-breach-affecting-thousands</link><guid isPermaLink="false">694534612fa53a9f2eef15ab</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><category><![CDATA[Digital Privacy]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Fri, 19 Dec 2025 11:18:58 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/12/eriksson-luo-mX06fUx22SA-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Unauthorized access to a development system led to the exposure of historical personal records.


Breach discovery and immediate response

Personal information on University of Sydney staff and students was exposed in a cybersecurity incident involving unauthorized access to an internal online coding repository, the university confirmed. The breach was detected last week after suspicious activity was identified within a single IT system used mainly to develop software.

Access was swiftly blocke]]></content:encoded></item><item><title>Leroy Merlin Breach Alert: French Customers Notified After Cyberattack Exposes Personal Data</title><description><![CDATA[French retailer Leroy Merlin reports leak of contact and loyalty information but says no financial data was compromised.


Scope of the incident

French home-improvement chain Leroy Merlin is telling customers in France that a recent cyberattack resulted in the exposure of several categories of personal information. The company, which operates stores across Europe, South Africa and Brazil, confirmed that the breach was contained to its French customer base.

According to customer notifications c]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/leroy-merlin-breach-alert-french-customers-notified-after-cyberattack-exposes-personal-data</link><guid isPermaLink="false">6931a03161720986fd7f4985</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><category><![CDATA[Digital Privacy]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Thu, 04 Dec 2025 14:55:18 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/12/philipp-katzenberger-iIJrUoeRoCQ-unsplash.jpg" medium="image"/><content:encoded><![CDATA[French retailer Leroy Merlin reports leak of contact and loyalty information but says no financial data was compromised.


Scope of the incident

French home-improvement chain Leroy Merlin is telling customers in France that a recent cyberattack resulted in the exposure of several categories of personal information. The company, which operates stores across Europe, South Africa and Brazil, confirmed that the breach was contained to its French customer base.

According to customer notifications c]]></content:encoded></item><item><title>CodeRED Emergency Alerts Disrupted Across US After Ransomware Breach</title><description><![CDATA[Multiple US communities scramble for alternatives after a cyberattack cripples a major emergency system.


Widespread outages hit local emergency notifications

A ransomware attack on Crisis24, the vendor behind the CodeRED emergency alert system, has left towns and cities across the United States without a core public-warning tool. CodeRED is widely used to push urgent notifications for severe weather, public safety incidents, missing persons and other critical situations.

In the aftermath of ]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/codered-emergency-alerts-disrupted-across-us-after-ransomware-breach</link><guid isPermaLink="false">69298b1d61720986fd7f4671</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Digital Privacy]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Fri, 28 Nov 2025 11:49:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/11/brian-mcgowan-zPf7zp-aX1A-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Multiple US communities scramble for alternatives after a cyberattack cripples a major emergency system.


Widespread outages hit local emergency notifications

A ransomware attack on Crisis24, the vendor behind the CodeRED emergency alert system, has left towns and cities across the United States without a core public-warning tool. CodeRED is widely used to push urgent notifications for severe weather, public safety incidents, missing persons and other critical situations.

In the aftermath of ]]></content:encoded></item><item><title>Comcast Hit With $1.5 Million Fine After Vendor Data Breach</title><description><![CDATA[The US media conglomerate Comcast has agreed to pay a fine of USD 1.5 million after a breach at one of its former vendors exposed personal information of hundreds of thousands of customers.

The breach stems from a ransomware incident in early 2024 at Financial Business and Consumer Solutions (FBCS), a debt collection agency that handled collections on behalf of Comcast until 2022.

According to the settlement announced by the Federal Communications Commission (FCC) Monday, the breach exposed pe]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/comcast-hit-with-1-5-million-fine-after-vendor-data-breach</link><guid isPermaLink="false">6929744661720986fd7f4652</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Filip TRUȚĂ</dc:creator><pubDate>Fri, 28 Nov 2025 10:09:37 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/11/comcast-building.jpg" medium="image"/><content:encoded><![CDATA[The US media conglomerate Comcast has agreed to pay a fine of USD 1.5 million after a breach at one of its former vendors exposed personal information of hundreds of thousands of customers.

The breach stems from a ransomware incident in early 2024 at Financial Business and Consumer Solutions (FBCS), a debt collection agency that handled collections on behalf of Comcast until 2022.

According to the settlement announced by the Federal Communications Commission (FCC) Monday, the breach exposed pe]]></content:encoded></item><item><title>OpenAI Breach Alert: Mixpanel Incident Exposes Limited API User Data</title><description><![CDATA[Company says no API data or credentials were exposed, but warns users to watch out for phishing attempts.


Third-party breach exposes limited API account metadata

OpenAI is notifying customers about a security incident involving Mixpanel, a third-party analytics provider previously used on the frontend of its API platform. The intrusion occurred entirely within Mixpanel’s systems and affected a subset of analytics data linked to API user accounts, the company says. OpenAI emphasized that its o]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/openai-breach-alert-mixpanel-incident-exposes-limited-api-user-data</link><guid isPermaLink="false">6928276161720986fd7f45aa</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><category><![CDATA[Digital Privacy]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Thu, 27 Nov 2025 10:30:52 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/11/levart_photographer-7q-kE4SZzvQ-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Company says no API data or credentials were exposed, but warns users to watch out for phishing attempts.


Third-party breach exposes limited API account metadata

OpenAI is notifying customers about a security incident involving Mixpanel, a third-party analytics provider previously used on the frontend of its API platform. The intrusion occurred entirely within Mixpanel’s systems and affected a subset of analytics data linked to API user accounts, the company says. OpenAI emphasized that its o]]></content:encoded></item><item><title>Was Your Data Exposed in the Canadian Tire Breach? Here’s What To Do Next</title><description><![CDATA[Early this month, the Canadian Tire Corporation (CTC) confirmed a data breach that exposed customer information from one of its e-commerce databases. While the incident has faded from the headlines, it still serves as a powerful reminder that personal data, even if limited in details, can fuel identity theft and scams long after the breach has been contained.

If you shopped online at Canadian Tire, SportChek, Mark’s/L’Équipeur, or Party City, here’s what you should know — and how to stay protec]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/was-your-data-exposed-in-the-canadian-tire-breach-heres-what-to-do-next</link><guid isPermaLink="false">69036afbd9ea1a4ef3db4de9</guid><category><![CDATA[Data Breach]]></category><category><![CDATA[Digital Privacy]]></category><dc:creator>Alina BÎZGĂ</dc:creator><pubDate>Thu, 30 Oct 2025 14:55:22 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/10/Was-Your-Data-Exposed-in-the-Canadian-Tire-Breach.png" medium="image"/><content:encoded><![CDATA[Early this month, the Canadian Tire Corporation (CTC) confirmed a data breach that exposed customer information from one of its e-commerce databases. While the incident has faded from the headlines, it still serves as a powerful reminder that personal data, even if limited in details, can fuel identity theft and scams long after the breach has been contained.

If you shopped online at Canadian Tire, SportChek, Mark’s/L’Équipeur, or Party City, here’s what you should know — and how to stay protec]]></content:encoded></item><item><title>Everest Ransomware Group Claims Theft of 1.5 Million Passenger Records from Dublin Airport</title><description><![CDATA[The ransomware group Everest claimed responsibility on Oct 26 for a cyberattack that allegedly compromised over 1.5 million passenger records from Dublin Airport.

According to a report from Hackread, the Everest group listed Dublin Airport on its dark-web portal, claiming to have a password-protected archive containing the stolen data.

The data (1,533,900 personal records), posted on the group’s leak site, reportedly includes an exhaustive list of personally identifiable information, some of i]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/everest-ransomware-group-claims-theft-of-1-5-million-passenger-records-from-dublin-airport</link><guid isPermaLink="false">6901e433d9ea1a4ef3db4cc8</guid><category><![CDATA[Digital Privacy]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Alina BÎZGĂ</dc:creator><pubDate>Wed, 29 Oct 2025 10:00:12 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/10/Everest-Ransomware-Group-Claims-Theft-of-1.5-Million-Passenger-Records-from-Dublin-Airport.png" medium="image"/><content:encoded><![CDATA[The ransomware group Everest claimed responsibility on Oct 26 for a cyberattack that allegedly compromised over 1.5 million passenger records from Dublin Airport.

According to a report from Hackread, the Everest group listed Dublin Airport on its dark-web portal, claiming to have a password-protected archive containing the stolen data.

The data (1,533,900 personal records), posted on the group’s leak site, reportedly includes an exhaustive list of personally identifiable information, some of i]]></content:encoded></item></channel>
        </rss>