<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:media="http://search.yahoo.com/mrss/">
    <channel><title>Consumer Insights</title><description>News, views and insights from the Bitdefender experts</description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/</link><image><url>https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png</url><title>Consumer Insights</title><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/</link></image><generator>Bitdefender Blog</generator><lastBuildDate>Wed, 29 Apr 2026 15:10:12 GMT</lastBuildDate><atom:link href="https://www.bitdefender.com/nuxt/api/en-us/rss/hotforsecurity/data-breach/" rel="self" type="application/rss+xml"/><ttl>1800</ttl><item><title>Hackers claim to have breached Udemy, stealing 1.4 million user records</title><description><![CDATA[Notorious hacking group ShinyHunters recently announced they had breached Udemy’s systems and exfiltrated a large dataset of user information.


Key takeaways:

 * Hackers claim to have stolen 1.4 million Udemy user records
 * The company has not confirmed the breach
 * Stolen information may include personal and internal data
 * Attackers are using a “pay or leak” extortion tactic
 * Users should update passwords, enable 2FA, and watch out for scams


What happened?

On April 24, 2026, the cybe]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/hackers-claim-to-have-breached-udemy</link><guid isPermaLink="false">69ef689f2fa53a9f2eef67e1</guid><category><![CDATA[Data Breach]]></category><category><![CDATA[Digital Privacy]]></category><dc:creator>Alina BÎZGĂ</dc:creator><pubDate>Mon, 27 Apr 2026 13:52:11 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/Hackers-claim-to-have-breached-Udemy--stealing-1.4-million-user-records--2-.jpg" medium="image"/><content:encoded><![CDATA[Notorious hacking group ShinyHunters recently announced they had breached Udemy’s systems and exfiltrated a large dataset of user information.


Key takeaways:

 * Hackers claim to have stolen 1.4 million Udemy user records
 * The company has not confirmed the breach
 * Stolen information may include personal and internal data
 * Attackers are using a “pay or leak” extortion tactic
 * Users should update passwords, enable 2FA, and watch out for scams


What happened?

On April 24, 2026, the cybe]]></content:encoded></item><item><title>Rituals data breach exposes customer details</title><description><![CDATA[Dutch cosmetics brand Rituals has confirmed customer membership records were affected in a data breach. While no passwords or payment details were exposed, the type of data involved raises a different kind of risk that many users underestimate.


Key takeaways

 * Dutch cosmetics giant Rituals suffered a data breach in April 2026 affecting customer membership records
 * Exposed data may include names, emails, phone numbers, birth dates, and home addresses
 * No passwords or payment details were ]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/rituals-cosmetics-data-breach-2026</link><guid isPermaLink="false">69ea01cf2fa53a9f2eef6651</guid><category><![CDATA[Data Breach]]></category><category><![CDATA[Digital Privacy]]></category><dc:creator>Alina BÎZGĂ</dc:creator><pubDate>Thu, 23 Apr 2026 11:36:22 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/Rituals-data-breach-exposes-customer-details.jpg" medium="image"/><content:encoded><![CDATA[Dutch cosmetics brand Rituals has confirmed customer membership records were affected in a data breach. While no passwords or payment details were exposed, the type of data involved raises a different kind of risk that many users underestimate.


Key takeaways

 * Dutch cosmetics giant Rituals suffered a data breach in April 2026 affecting customer membership records
 * Exposed data may include names, emails, phone numbers, birth dates, and home addresses
 * No passwords or payment details were ]]></content:encoded></item><item><title>Booking.com says breach exposed travelers’ data</title><description><![CDATA[Planning a trip soon? You may want to take a closer look at any messages related to your reservation.

Booking.com has confirmed a security incident involving unauthorized access to customer data.


Key takeaways

 * Booking.com confirmed a data breach: Unauthorized parties accessed customer booking information
 * Sensitive travel data may be exposed: Names, contact details, and reservation info could be affected
 * Users have been notified: Customers received alerts and reservation PINs were re]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/booking-com-breach-april-2026</link><guid isPermaLink="false">69e0e15d2fa53a9f2eef6067</guid><category><![CDATA[Data Breach]]></category><dc:creator>Alina BÎZGĂ</dc:creator><pubDate>Thu, 16 Apr 2026 13:25:14 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/booking.png" medium="image"/><content:encoded><![CDATA[Planning a trip soon? You may want to take a closer look at any messages related to your reservation.

Booking.com has confirmed a security incident involving unauthorized access to customer data.


Key takeaways

 * Booking.com confirmed a data breach: Unauthorized parties accessed customer booking information
 * Sensitive travel data may be exposed: Names, contact details, and reservation info could be affected
 * Users have been notified: Customers received alerts and reservation PINs were re]]></content:encoded></item><item><title>Basic-Fit data breach exposes member information across Europe</title><description><![CDATA[Basic-Fit, one of Europe’s largest fitness chains, has confirmed a cyber incident involving unauthorized access to a system containing member data.


Key takeaways

 * Basic-Fit detected and stopped the breach quickly, but some data was downloaded
 * Around 200,000 members in the Netherlands alone are affected, with impact in multiple countries
 * Exposed data includes personal and financial details
 * No passwords or ID documents were compromised, according to the company


What happened in the]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/basic-fit-data-breach</link><guid isPermaLink="false">69df636b2fa53a9f2eef600e</guid><category><![CDATA[Data Breach]]></category><category><![CDATA[Digital Privacy]]></category><dc:creator>Alina BÎZGĂ</dc:creator><pubDate>Wed, 15 Apr 2026 10:12:55 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/Basic-Fit-data-breach-exposes-member-information-across-Europe.jpg" medium="image"/><content:encoded><![CDATA[Basic-Fit, one of Europe’s largest fitness chains, has confirmed a cyber incident involving unauthorized access to a system containing member data.


Key takeaways

 * Basic-Fit detected and stopped the breach quickly, but some data was downloaded
 * Around 200,000 members in the Netherlands alone are affected, with impact in multiple countries
 * Exposed data includes personal and financial details
 * No passwords or ID documents were compromised, according to the company


What happened in the]]></content:encoded></item><item><title>Rockstar Games confirms breach after ShinyHunters leaks stolen analytics data</title><description><![CDATA[Rockstar Games says a third-party breach exposed internal analytics data after ShinyHunters linked the incident to Anodot and Snowflake.]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/rockstar-games-data-breach</link><guid isPermaLink="false">69de05b62fa53a9f2eef5f71</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Tue, 14 Apr 2026 09:23:44 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/Rockstar-Games-confirms-data-breach.jpg" medium="image"/><content:encoded><![CDATA[Rockstar Games says a third-party breach exposed internal analytics data after ShinyHunters linked the incident to Anodot and Snowflake.]]></content:encoded></item><item><title>Lapsus$ claims AstraZeneca breach exposes code and credentials</title><description><![CDATA[Alleged AstraZenea data leak raises concerns over internal access, source code exposure and follow-on cyber risks.


Dark web post sparks breach concerns

The cybercrime group LAPSUS$ claims it hacked AstraZeneca and stole roughly 3 GB of internal data, according to recent cybersecurity reporting. The alleged archive includes credentials, tokens, employee information and source code tied to internal development environments.

The claim surfaced on dark web channels and a leak site linked to the ]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/lapsus-astrazeneca-breach</link><guid isPermaLink="false">69c6389d2fa53a9f2eef5638</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Thu, 26 Mar 2026 08:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/03/AstraZeneca-data-breach.jpg" medium="image"/><content:encoded><![CDATA[Alleged AstraZenea data leak raises concerns over internal access, source code exposure and follow-on cyber risks.


Dark web post sparks breach concerns

The cybercrime group LAPSUS$ claims it hacked AstraZeneca and stole roughly 3 GB of internal data, according to recent cybersecurity reporting. The alleged archive includes credentials, tokens, employee information and source code tied to internal development environments.

The claim surfaced on dark web channels and a leak site linked to the ]]></content:encoded></item><item><title>Aura data breach exposes 900,000 records after phishing attack</title><description><![CDATA[Aura says a phishing attack led to a data breach affecting nearly 900,000 records, including names, emails, addresses and phone numbers.]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/aura-data-breach</link><guid isPermaLink="false">69bbda722fa53a9f2eef51ab</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Thu, 19 Mar 2026 11:17:55 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/03/Aura-data-breach.jpg" medium="image"/><content:encoded><![CDATA[Aura says a phishing attack led to a data breach affecting nearly 900,000 records, including names, emails, addresses and phone numbers.]]></content:encoded></item><item><title>Telus Digital data breach confirmed after ShinyHunters claims 1PB theft</title><description><![CDATA[Telus Digital is probing a confirmed breach as ShinyHunters  claims petabyte-scale data theft tied to compromised cloud credentials.


Telus Digital confirms breach and launches investigation

Telus Digital says it is investigating a cybercrime involving unauthorized access to a limited number of systems after a threat actor claimed it stole nearly 1 petabyte of data.

The company said operations remain fully functional and it has brought in external forensics support and police, adding it will ]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/telus-digital-data-breach</link><guid isPermaLink="false">69b40b602fa53a9f2eef4d60</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Fri, 13 Mar 2026 13:06:06 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/03/towfiqu-barbhuiya-em5w9_xj3uU-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Telus Digital is probing a confirmed breach as ShinyHunters  claims petabyte-scale data theft tied to compromised cloud credentials.


Telus Digital confirms breach and launches investigation

Telus Digital says it is investigating a cybercrime involving unauthorized access to a limited number of systems after a threat actor claimed it stole nearly 1 petabyte of data.

The company said operations remain fully functional and it has brought in external forensics support and police, adding it will ]]></content:encoded></item><item><title>Was Your Data Exposed in the Latest Under Armour Breach? Here’s What You Should Do</title><description><![CDATA[The latest Under Armour breach is a reminder that exposed personal data can still create serious risk even when passwords and payment details are not confirmed as part of the leak. Names, email addresses, birth dates, location data, and purchase-related information may be enough for scammers to launch convincing phishing attacks, account lures, and identity-focused fraud.


Key Takeaways

 * A dataset allegedly linked to Under Armour was posted online after the Everest ransomware group claimed i]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/was-your-data-exposed-in-the-latest-under-armour-breach-heres-what-you-should-do</link><guid isPermaLink="false">698089112fa53a9f2eef30e3</guid><category><![CDATA[Data Breach]]></category><category><![CDATA[Digital Privacy]]></category><dc:creator>Alina BÎZGĂ</dc:creator><pubDate>Mon, 02 Feb 2026 11:27:25 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/Was-Your-Data-Exposed-in-the-Latest-Under-Armour-Breach-Here-s-What-You-Should-Do.png" medium="image"/><content:encoded><![CDATA[The latest Under Armour breach is a reminder that exposed personal data can still create serious risk even when passwords and payment details are not confirmed as part of the leak. Names, email addresses, birth dates, location data, and purchase-related information may be enough for scammers to launch convincing phishing attacks, account lures, and identity-focused fraud.


Key Takeaways

 * A dataset allegedly linked to Under Armour was posted online after the Everest ransomware group claimed i]]></content:encoded></item><item><title>Breach at Tinder, Hinge and OkCupid parent Match Group exposes user data</title><description><![CDATA[Data breaches affecting major dating platforms like Tinder, Hinge, and OkCupid highlight the growing risks of sharing personal information online. When sensitive user data is exposed, it can quickly be weaponized for scams, phishing, and identity theft. Understanding what these breaches mean is essential for protecting your digital identity.


Key Takeaways

 * Dating app breaches expose highly sensitive user data. Information like emails, personal details, and preferences can be leaked and reus]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/breach-at-tinder-hinge-and-okcupid-parent-match-group-exposes-user-data</link><guid isPermaLink="false">697cd1152fa53a9f2eef3041</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Digital Privacy]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Fri, 30 Jan 2026 15:43:23 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/01/love-4888774_1920.jpg" medium="image"/><content:encoded><![CDATA[Data breaches affecting major dating platforms like Tinder, Hinge, and OkCupid highlight the growing risks of sharing personal information online. When sensitive user data is exposed, it can quickly be weaponized for scams, phishing, and identity theft. Understanding what these breaches mean is essential for protecting your digital identity.


Key Takeaways

 * Dating app breaches expose highly sensitive user data. Information like emails, personal details, and preferences can be leaked and reus]]></content:encoded></item><item><title>Europe Slaps Tech Sector with €1.2 Billion in Fines under GDPR in 2025</title><description><![CDATA[European data protection regulators levied roughly €1.2 billion in General Data Protection Regulation (GDPR) fines during 2025, as data privacy enforcement remains a key priority for authorities across the EU and European Economic Area (EEA).


Breach reports set new record



The annual DLA Piper GDPR Fines and Data Breach Survey finds that while aggregate fines were little changed from 2024, personal data breach notifications surged, marking a sharp shift from recent years.

For the first time]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/europe-tech-sector-eu1-2-billion-fines-gdpr-2025</link><guid isPermaLink="false">69776d332fa53a9f2eef2aa6</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Filip TRUȚĂ</dc:creator><pubDate>Mon, 26 Jan 2026 14:30:50 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/01/header-3.png" medium="image"/><content:encoded><![CDATA[European data protection regulators levied roughly €1.2 billion in General Data Protection Regulation (GDPR) fines during 2025, as data privacy enforcement remains a key priority for authorities across the EU and European Economic Area (EEA).


Breach reports set new record



The annual DLA Piper GDPR Fines and Data Breach Survey finds that while aggregate fines were little changed from 2024, personal data breach notifications surged, marking a sharp shift from recent years.

For the first time]]></content:encoded></item><item><title>European Space Agency's cybersecurity in freefall as yet another breach exposes spacecraft and mission data</title><description><![CDATA[It has just been a few weeks since we reported on the Christmas cyber attack suffered by the European Space Agency (ESA), and the situation has already become worse.

When ESA revealed that it had been hacked over the Christmas period by a hacker known as "888" it was quick to reassure the public that the impact was "limited" to external servers containing unclassified engineering data.

The hacker, however, claimed to have exfiltrated some 200GB of data, including source code, API and access to]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/european-space-agencys-cybersecurity-in-freefall-as-yet-another-breach-exposes-spacecraft-and-mission-data</link><guid isPermaLink="false">6971e1c22fa53a9f2eef28e9</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Graham CLULEY</dc:creator><pubDate>Thu, 22 Jan 2026 08:38:52 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/01/esa-breach.jpeg" medium="image"/><content:encoded><![CDATA[It has just been a few weeks since we reported on the Christmas cyber attack suffered by the European Space Agency (ESA), and the situation has already become worse.

When ESA revealed that it had been hacked over the Christmas period by a hacker known as "888" it was quick to reassure the public that the impact was "limited" to external servers containing unclassified engineering data.

The hacker, however, claimed to have exfiltrated some 200GB of data, including source code, API and access to]]></content:encoded></item><item><title>European Space Agency Confirms New Data Breach; Classified Info May Have Been Stolen</title><description><![CDATA[The European Space Agency (ESA) has confirmed yet another cybersecurity breach — this time affecting external servers used in collaborative engineering. A threat actor claiming responsibility for the attack has allegedly pilfered “classified documents.”

ESA acknowledged that attackers had gained unauthorized access to servers located outside its corporate network. According to the agency, these systems contained information relating to collaborative engineering projects.

“ESA is aware of a rec]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/european-space-agency-data-breach-classified-documents</link><guid isPermaLink="false">69550cb52fa53a9f2eef19f8</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Filip TRUȚĂ</dc:creator><pubDate>Wed, 31 Dec 2025 11:48:23 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/12/astronaut-11080_1920.jpg" medium="image"/><content:encoded><![CDATA[The European Space Agency (ESA) has confirmed yet another cybersecurity breach — this time affecting external servers used in collaborative engineering. A threat actor claiming responsibility for the attack has allegedly pilfered “classified documents.”

ESA acknowledged that attackers had gained unauthorized access to servers located outside its corporate network. According to the agency, these systems contained information relating to collaborative engineering projects.

“ESA is aware of a rec]]></content:encoded></item><item><title>Rainbow Six Siege Servers Offline After Massive Breach Floods Accounts with Billions of R6 Credits</title><description><![CDATA[An internal system failure allowed large-scale abuse of moderation and economy features before Ubisoft intervened.


Internal tools reportedly abused

Rainbow Six Siege players began reporting widespread irregularities affecting the game’s core systems over the weekend. Screenshots and videos circulating online showed accounts being banned and unbanned at will, unusual messages appearing in moderation feeds, and inventories suddenly filling with content that would normally require years or signi]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/rainbow-six-siege-servers-offline-after-massive-breach-floods-accounts-with-billions-of-r6-credits</link><guid isPermaLink="false">69527ed62fa53a9f2eef1949</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Mon, 29 Dec 2025 13:15:32 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/12/toy-4038447_1920.jpg" medium="image"/><content:encoded><![CDATA[An internal system failure allowed large-scale abuse of moderation and economy features before Ubisoft intervened.


Internal tools reportedly abused

Rainbow Six Siege players began reporting widespread irregularities affecting the game’s core systems over the weekend. Screenshots and videos circulating online showed accounts being banned and unbanned at will, unusual messages appearing in moderation feeds, and inventories suddenly filling with content that would normally require years or signi]]></content:encoded></item><item><title>21,000 Nissan Customers Exposed After Third-Party Server Breach</title><description><![CDATA[Unauthorized access to a contractor-managed system led to the exposure of contact data for thousands of customers.


Red Hat-managed infrastructure breached

Nissan has disclosed a data breach affecting roughly 21,000 customers linked to a former dealership in Japan, following unauthorized access to a server managed by Red Hat. The intrusion was detected in late September, and Nissan was notified in early October, according to a breach notice published by the automaker in December.

The compromi]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/21-000-nissan-customers-exposed-after-third-party-server-breach</link><guid isPermaLink="false">694bf0a02fa53a9f2eef1875</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Digital Privacy]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Wed, 24 Dec 2025 13:56:06 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/12/tigran-hambardzumyan-B2gmkU2mgqw-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Unauthorized access to a contractor-managed system led to the exposure of contact data for thousands of customers.


Red Hat-managed infrastructure breached

Nissan has disclosed a data breach affecting roughly 21,000 customers linked to a former dealership in Japan, following unauthorized access to a server managed by Red Hat. The intrusion was detected in late September, and Nissan was notified in early October, according to a breach notice published by the automaker in December.

The compromi]]></content:encoded></item></channel>
        </rss>