EN

NEWS

Intel staff records leaked through login flaws, exposing sensitive company information.
A single manipulated portal exposed over 270,000 Intel employee details.
Hardcoded credentials on internal portals raised serious security concerns.

Prosecutors say the ex-TSMC staffer, after joining Tokyo Electron, passed on sensitive expertise from the world’s top chipmaker to help improve the Japanese firm’s etching equipment – key for TSMC’s cutting-edge 2-nanometer chip production. This marks the first time Taiwan has leveraged its national security laws for a technology trade secrets case, with prosecutors pushing for serious prison terms: 14, 9, and 7 years for those involved.

PBS has suffered a data breach exposing the corporate contact information of its employees and those of its affiliates, BleepingComputer has learned.

The Clorox Company filed a major lawsuit against IT services provider Cognizant on July 22, 2025, seeking $380 million in damages over a devastating cyberattack that the cleaning products giant claims was enabled by Cognizant’s security failures.

On July 13, Mr. Elez committed a code script to GitHub called “agent.py” that included a private application programming interface (API) key for xAI.

Switzerland-based multinational investment bank UBS Group AG has confirmed that employee data was stolen and published online following a successful ransomware-style attack on one of its third-party suppliers.

The FBI says he sought to share the material with an unspecified friendly foreign country.

Cybernews recently uncovered that employee monitoring app WorkComposer left over 21 million images exposed in an unsecured Amazon AWS S3 bucket. These images show a frame-by-frame activity log of remote workers.
This is not just bad news for those remote workers, it could be even worse for the WorkComposer customers that can see internal communications, confidential business documents, and log in pages exposed to anyone that stumbled over the unprotected bucket.

The information was shared in a Google Drive folder by General Services Administration (GSA) employees with the whole GSA workforce.