News

Get access to our latest news by signing up for our newsletter.

Illustration of cybersecurity breach affecting location data broker Gravy Analytics
cybersecurity

Data Broker Gravy Analytics Hacked: Massive Breach Reported

A major data breach has affected Gravy Analytics, as hackers claim to have stolen sensitive customer information and precise location data. The threat of public data release raises concerns about p...

data breachImage depicting the Volkswagen electric car data leak and privacy issues.

Volkswagen Data Leak Exposes Location of 800,000 Electric Cars

A data leak has exposed location information for nearly 800,000 electric Volkswagen vehicles, allowing potential tracking of drivers. This incident highlights serious privacy concerns in modern veh...

cybersecurityVisual representation of cybersecurity breach and phone hacking.

Salt Typhoon Breach Update: Hackers Target Government Officials' Phones

In the recent Salt Typhoon breach, officials reveal that hackers aimed to identify phone owners, particularly those involved in government or political activities, to eavesdrop on texts and calls. ...

Data BreachMeta logo with a warning about data privacy violations.

Meta Fined $263 Million for 2018 Data Breach Impacting 29 Million Users

The Irish Data Protection Commission imposes a €251 million fine on Meta for a 2018 data breach affecting 29 million Facebook users. The company plans to appeal the decision.

Customer DataT-Mobile stops cyberattack protecting customer data successfully.

T-Mobile Confirms Successful Defense Against Cyber Attack

T-Mobile has verified its response to a cyberattack, confirming that it stopped an incident before sensitive customer data was compromised. This comes amid rising concerns over security threats lik...

cybersecurityT-Mobile office building with a security alert sign.

T-Mobile Foils Cyberattack: A Surprising Turnaround in Data Security

T-Mobile successfully thwarted a recent cyberattack aimed at stealing customer data, marking a notable shift in its cybersecurity efforts. This article explores the details of the incident and T-Mo...