TechDay US - America's technology news network

Data breach stories - Page 2

Untitled design   2026 03 12t164733.768

Is the USB making a comeback?

Last month
#
storage
#
malware
#
firewalls
Once dubbed obsolete, USB drives are booming again, with the market set to hit USD $13.1 billion by 2030 despite mounting security fears.
Dark moody android phone usb shadowy hand crypto security scene

Critical MediaTek flaw lets attackers steal phone crypto

Last month
#
mdm
#
physical security
#
breach prevention
A critical MediaTek boot flaw lets attackers steal PINs and crypto wallets from powered-off Android phones with a 45-second USB attack.
Cinematic laptop deepfake face binary code broken locks quantum ai

IBM warns AI & quantum threats will reshape cybercrime

Last month
#
malware
#
data protection
#
ransomware
IBM warns shadow AI, deepfakes and quantum threats will reshape cyber risk by 2026, as autonomous agents speed breaches and ransomware.
Moody corporate cloud data center breach glowing cubes leaking

Salesforce guest flaws fuel large-scale data harvesting

Last month
#
saas
#
crm
#
firewalls
Misconfigured Salesforce Experience Cloud guest profiles are being exploited for mass data harvesting, with up to 400 firms possibly affected.
Cinematic fortified cloud shields over city ai data protection

Jazz raises USD $61m to reinvent data loss prevention

Last month
#
data protection
#
digital transformation
#
cloud security
Jazz raises USD $61m to launch AI-led data loss prevention platform that slashes alert noise and targets higher-confidence risks.
Hybrid cloud network stolen digital identity glowing key figure

Google report warns identity is weak link in cloud

Last month
#
malware
#
ransomware
#
hybrid cloud
Attackers are ditching malware for stolen identities, misconfigurations and abused AI tools, Google warns in its latest cloud threat report.
Secure sovereign cloud data fortress ai resilient eu canada

Cohesity boosts AI data resilience with new cloud tools

Last month
#
data protection
#
dr
#
ransomware
Cohesity debuts sovereign cloud tie-ups, AI-driven threat tools and midsize bundle to harden data protection as enterprises scale AI.
Doctor anxious at pc patient data leaking into ai clouds scene

GenAI drives patient data policy breaches in healthcare

Last month
#
malware
#
data protection
#
cloud security
GenAI use in healthcare is fuelling patient data policy breaches, with regulated records making up 89% of AI-linked violations, research shows.
Office worker laptop cloud apps ai icons secure access shield

LastPass unveils browser-based Secure Access Essentials

Last month
#
encryption
#
mfa
#
cloud security
LastPass launches Secure Access Essentials, a browser-focused suite to secure access to workplace apps, SaaS and unsanctioned AI tools.
Secure multi cloud data resilience australia new zealand map

Cohesity & Cyera integrate DSPM to boost data security

Last month
#
data protection
#
dr
#
ransomware
Cohesity deepens its Cyera tie-up, embedding DSPM into its data cloud to sharpen discovery, classification and cyber recovery at scale.
Global office night cyber attack hacker shadows cracked cloud

Cyber attacks stay near record high as GenAI risks grow

Last month
#
edutech
#
firewalls
#
data protection
Global cyber attacks hover near record highs as unchecked workplace GenAI use exposes sensitive data in one in 31 corporate prompts.
Meta smart glasses reflecting surveillance grid data leak risk

Sama credential leaks raise fears over Meta glasses data

Last month
#
wearables
#
data protection
#
surveillance
Leaked Sama staff logins tied to stealer malware spark fresh alarm over security of Meta Ray-Ban smart glasses video review pipeline.
Moody server room supply chain breach glowing red lock icon

ShinyHunters claims Woflow breach in supply chain hack

Last month
#
data protection
#
ransomware
#
mfa
ShinyHunters claims it hacked merchant data firm Woflow, raising supply chain fears for major brands despite no confirmed breach yet.
Worried office worker old phone shadow hacker corporate network

Coruna exploit kit exposes risks for outdated iOS users

Last month
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Japan factory night ransomware attack shadow figure network

Ransomware attacks surge 50% as industrial firms hit hardest

Last month
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Heather mahalik  1

Why women can be leaders when it comes to AI

Last month
#
data protection
#
ransomware
#
digital transformation
Women in cybersecurity, long trained to question and validate, are uniquely placed to lead the era of risky, fast‑moving AI tools.
European data center corridor secure doors cloud lit ceiling view

Acre links access control & intrusion in cloud suite

Last month
#
hyperscale
#
cloud security
#
dc
Acre Security links its intrusion controllers with cloud-based access control to give critical sites a single, governed identity workflow.
Moody twenty something american woman screens anxiety dark bedroom

One in four US women face rising tide of online abuse

Last month
#
data protection
#
breach prevention
#
data privacy
More than one in four US women report online abuse, with LGBTQ+ and non-white women hardest hit amid rising fears over data-fuelled harassment.
Overhead office ai tools data streams with glowing security shield

Teramind launches AI governance to tackle shadow AI

Last month
#
firewalls
#
digital transformation
#
network security
Teramind has unveiled an AI governance platform to monitor workplace AI tools and shadow agents, aiming to curb hidden data and security risks.
Hooded cyber figure identity attack breached accounts blue tones

Identity attacks dominate Expel's 2026 threat report

Last month
#
malware
#
endpoint protection
#
mfa
Identity-based attacks drove nearly 70% of incidents in Expel's 2026 threat report, exposing gaps between basic controls and real-world defence.