FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ McAfee Blogs

Hackers Trick Staff Into Exposing Major Companies’ Salesforce Data–Find Out if You’re Safe

By: Brooke Seipel — October 17th 2025 at 16:55

Cybercriminals tricked employees at major global companies into handing over Salesforce access and used that access to steal millions of customer records. 

Here’s the McAfee breakdown on what happened, what information was leaked, and what you need to know to keep your data and identity safe: 

What’s Happening 

Hackers claim they’ve stolen customer data from multiple major companies, including household names like Adidas, Cisco, Disney, Google, IKEA, Pandora, Toyota, and Vietnam Airlines. Security Week has reported throughout 2025 on a wave of social-engineering attacks exploiting human – rather than platform – vulnerabilities. 

According to The Wall Street Journal, the hacking group has already released millions of Qantas Airlines customer records and is threatening to expose information from other companies next.  

The data reportedly includes names, email addresses, phone numbers, dates of birth, and loyalty program details. While it doesn’t appear that financial data was included, this kind of personal information can still be exploited in phishing and scam campaigns. 

Salesforce has issued multiple advisories stressing that these attacks stem from credential theft and malicious connected apps – not from a breach of its infrastructure. 

Unfortunately, incidents like this aren’t rare, and they’re not limited to any one platform or industry. Even the most sophisticated companies can fall victim when hackers rely on social engineering and manipulation to breach secure systems. 

How the Hackers Did it 

Hackers reportedly called various companies’ employees pretending to be IT support staff—a tactic known as “vishing”—and convinced them to share login credentials or connect fake third-party tools, essentially handing the criminals the keys to their accounts. Once inside, they accessed customer databases and stole the information stored there. 

Think of it less like a burglar breaking a lock, and more like someone being tricked into opening the door. 

What data was leaked 

So far, leaked data appears to include: 

  • Names and email addresses 
  • Phone numbers 
  • Dates of birth 
  • Home or mailing addresses 
  • Loyalty or frequent-flyer numbers 

There’s no indication of credit card or banking data in the confirmed leaks, but that doesn’t mean you’re in the clear.  

Why this matters to you 

Even if your financial information isn’t exposed in a data breach, personal details like name and address can still be used for targeted scams and phishing.  When that information is stolen and sold online, scammers use it to: 

  • Send realistic phishing emails or texts that reference real details about you. 
  • Try to log into your other accounts if you reuse passwords. 
  • Launch “refund” or “account verification” scams tied to brands you trust. 

Even if your data isn’t part of this specific leak, these attacks highlight how often your information moves through third-party systems you don’t control. 

How to find out if you’ve been affected 

  • Check your email: If you’re a member or customer of one of the named companies, watch for official notifications.  
  • Avoid “dark web lookup” services: Some of these are scams themselves. Stick to legitimate sources. 

What to do now 

1) Change your passwords—today.
Use strong, unique passwords for every account. McAfee’s password manager can help. Try our random password generator here. 

2) Turn on two-factor authentication (2FA).
Even if a hacker has your password, they can’t get in without your code. 

3) Monitor your financial and loyalty accounts.
Watch for strange charges, redemptions, or password reset emails you didn’t request. 

4) Freeze your credit.
It’s free and prevents new accounts from being opened in your name. You can unfreeze it anytime. McAfee users can employ a “security freeze” for extra protection. 

5) Be extra cautious with “breach” emails or calls.
Scammers often pretend to be from affected companies to “help you secure your account.” Don’t click links or give information over the phone. Go directly to the company’s website or app or your own IT team if a breach happens at your workplace. 

6) Consider identity protection.
McAfee’s built-in identity monitoring can monitor your personal info across the dark web, send alerts if your data appears in a breach, and include up to $1 million in coverage for identity recovery expenses. 

 

What scams to expect next 

  • Fake refund or compensation offers. “We noticed your account was impacted. Claim your refund here.” Don’t click. 
  • Loyalty-point phishing. Emails that look like they’re from an airline or retailer asking you to log in to “protect your rewards.” 
  • MFA fatigue scams. Attackers repeatedly send login codes to wear you down, then call pretending to be support asking you to read one aloud. Don’t. 

 

Need ongoing protection? 

Your data could already be out there, but you don’t have to leave it there. 

McAfee helps you take back control. Using advanced artificial intelligence, McAfee’s Scam Detector automatically detects scams across text, email, and video, blocks dangerous links, and identifies deepfakes, stopping harm before it happens. 

And McAfee’s Personal Data Cleanup can help you check which data brokers have your private details and request to have it removed on your behalf. 

Stay ahead of scammers. Check your exposure, clean up your data, and protect your identity, all with McAfee. 

Learn more about McAfee and McAfee Scam Detector 

 

More reading: 

What to do if you’re caught up in a data breach 

How to delete yourself from the internet 

How to spot phishing emails and scams  

The post Hackers Trick Staff Into Exposing Major Companies’ Salesforce Data–Find Out if You’re Safe appeared first on McAfee Blog.

☐ ☆ ✇ WIRED

One Republican Now Controls a Huge Chunk of US Election Infrastructure

By: Kim Zetter — October 16th 2025 at 14:01
Former GOP operative Scott Leiendecker just bought Dominion Voting Systems, giving him ownership of voting systems used in 27 states. Election experts don't know what to think.
☐ ☆ ✇ WIRED

A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

By: Dan Goodin, Ars Technica — October 14th 2025 at 21:40
The malicious app required to make a “Pixnapping” attack work requires no permissions.
☐ ☆ ✇ WIRED

Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire

By: Matt Burgess, Andy Greenberg — October 14th 2025 at 17:34
Officials in the US and UK have taken sweeping action against “one of the largest investment fraud operations in history,” confiscating a historic amount of funds in the process.
☐ ☆ ✇ WIRED

Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

By: Andy Greenberg, Matt Burgess — October 14th 2025 at 01:00
With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users’ calls and texts and even US military communications—sent by satellites unencrypted.
☐ ☆ ✇ WIRED

'Happy Gilmore' Producer Buys Spyware Maker NSO Group

By: Lily Hay Newman — October 11th 2025 at 10:30
Plus: US government cybersecurity staffers get reassigned to do immigration work, a hack exposes sensitive age-verification data of Discord users, and more.
☐ ☆ ✇ WIRED

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

By: Lily Hay Newman — October 10th 2025 at 09:15
With the mercenary spyware industry booming, Apple VP Ivan Krstić tells WIRED that the company is also offering bonuses that could bring the max total reward for iPhone exploits to $5 million.
☐ ☆ ✇ WIRED

North Korean Scammers Are Doing Architectural Design Now

By: Matt Burgess — October 10th 2025 at 09:00
New research shows that North Koreans appear to be trying to trick US companies into hiring them to develop architectural designs using fake profiles, résumés, and Social Security numbers.
☐ ☆ ✇ WIRED

Apple Took Down These ICE-Tracking Apps. The Developers Aren't Giving Up

By: Reece Rogers, Lily Hay Newman — October 9th 2025 at 17:22
“We are going to do everything in our power to fight this,” says ICEBlock developer Joshua Aaron after Apple removed his app from the App Store.
☐ ☆ ✇ WIRED

Vibe Coding Is the New Open Source—in the Worst Way Possible

By: Lily Hay Newman — October 6th 2025 at 10:00
As developers increasingly lean on AI-generated code to build out their software—as they have with open source in the past—they risk introducing critical security failures along the way.
☐ ☆ ✇ WIRED

Apple and Google Pull ICE-Tracking Apps, Bowing to DOJ Pressure

By: Matt Burgess, Andy Greenberg, Andrew Couts — October 4th 2025 at 10:30
Plus: China sentences scam bosses to death, Europe is ramping up its plans to build a “drone wall” to protect against Russian airspace violations, and more.
☐ ☆ ✇ WIRED

ICE Wants to Build Out a 24/7 Social Media Surveillance Team

By: Dell Cameron — October 3rd 2025 at 13:21
Documents show that ICE plans to hire dozens of contractors to scan X, Facebook, TikTok, and other platforms to target people for deportation.
☐ ☆ ✇ WIRED

Google’s Latest AI Ransomware Defense Only Goes So Far

By: Lily Hay Newman — September 30th 2025 at 13:44
Google has launched a new AI-based protection in Drive for desktop that can shut down an attack before it spreads—but its benefits have their limits.
☐ ☆ ✇ WIRED

Tile Tracking Tags Can Be Exploited by Tech-Savvy Stalkers, Researchers Say

By: Kim Zetter — September 29th 2025 at 09:30
A team of researchers found that, by not encrypting the data broadcast by Tile tags, users could be vulnerable to having their location information exposed to malicious actors.
☐ ☆ ✇ WIRED

How a Travel YouTuber Captured Nepal’s Revolution for the World

By: Nicholas Slayton — September 28th 2025 at 14:40
Harry Jackson went into Kathmandu as a tourist. He ended up being one of the main international sources of news on Nepal’s Gen Z protests.
☐ ☆ ✇ WIRED

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead

By: Andy Greenberg, Matt Burgess, Lily Hay Newman — September 27th 2025 at 14:25
Plus: A ransomeware gang steals data on 8,000 preschoolers, Microsoft blocks Israel’s military from using its cloud for surveillance, call-recording app Neon hits pause over security holes, and more.
☐ ☆ ✇ WIRED

‘SIM Farms’ Are a Spam Plague. A Giant One in New York Threatened US Infrastructure, Feds Say

By: Andy Greenberg, Lily Hay Newman, Matt Burgess — September 23rd 2025 at 18:09
The agency says it found a network of some 300 servers and 100,000 SIM cards—enough to knock out cell service in the NYC area. Experts say it mirrors facilities typically used for cybercrime.
☐ ☆ ✇ WIRED

DHS Has Been Collecting US Citizens’ DNA for Years

By: Dell Cameron — September 23rd 2025 at 15:06
Newly released data shows Customs and Border Protection funneled the DNA of nearly 2,000 US citizens—some as young as 14—into an FBI crime database, raising alarms about oversight and legality.
☐ ☆ ✇ WIRED

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster

By: Matt Burgess — September 22nd 2025 at 06:00
The UK-based automaker has been forced to stop vehicle production as a result of the attack—costing JLR tens of millions of dollars and forcing its parts suppliers to lay off workers.
☐ ☆ ✇ WIRED

A Dangerous Worm Is Eating Its Way Through Software Packages

By: Lily Hay Newman, Andy Greenberg — September 20th 2025 at 10:30
Plus: An investigation reveals how US tech companies reportedly helped build China’s sweeping surveillance state, and two more alleged members of the Scattered Spider hacking group were arrested.
☐ ☆ ✇ WIRED

This Microsoft Entra ID Vulnerability Could Have Been Catastrophic

By: Matt Burgess, Lily Hay Newman — September 18th 2025 at 15:09
A pair of flaws in Microsoft's Entra ID identity and access management system could have allowed an attacker to gain access to virtually all Azure customer accounts.
☐ ☆ ✇ WIRED

Cybercriminals Have a Weird New Way to Target You With Scam Texts

By: Matt Burgess — September 18th 2025 at 11:00
Scammers are now using “SMS blasters” to send out up to 100,000 texts per hour to phones that are tricked into thinking the devices are cell towers. Your wireless carrier is powerless to stop them.
☐ ☆ ✇ WIRED

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users

By: Andy Greenberg — September 16th 2025 at 17:07
A misconfigured platform used by the Department of Homeland Security left national security information—including some related to the surveillance of Americans—accessible to thousands of people.
☐ ☆ ✇ WIRED

Russia Tests Hypersonic Missile at NATO’s Doorstep—and Shares the Video

By: Javier Carbajal — September 15th 2025 at 17:49
Russian military exercises near NATO borders follow the recent incursion of Russian drones into the airspace of Poland and Romania, further stoking tensions with the West.
☐ ☆ ✇ WIRED

Jeffrey Epstein’s Yahoo Inbox Revealed

By: Lily Hay Newman, Dell Cameron — September 13th 2025 at 10:30
Plus: ICE deploys secretive phone surveillance tech, officials warn of Chinese surveillance tools in US highway infrastructure, and more.
☐ ☆ ✇ WIRED

Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

By: Lily Hay Newman — September 11th 2025 at 13:59
Alongside new iPhones, Apple released a new security architecture on Tuesday: Memory Integrity Enforcement aims to eliminate the most frequently exploited class of iOS bugs.
☐ ☆ ✇ WIRED

Here’s What to Know About Poland Shooting Down Russian Drones

By: Riccardo Piccolo — September 10th 2025 at 13:58
On Wednesday morning, Poland shot down several Russian drones that entered its airspace—a first since Moscow’s invasion of Ukraine. The incident disrupted air travel and set the region on edge.
☐ ☆ ✇ WIRED

US Investment in Spyware Is Skyrocketing

By: Vas Panagiotopoulos — September 10th 2025 at 11:00
A new report warns that the number of US investors in powerful commercial spyware rose sharply in 2024 and names new countries linked to the dangerous technology.
☐ ☆ ✇ WIRED

Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

By: Dell Cameron — September 9th 2025 at 21:00
After 25 years at the Electronic Frontier Foundation, Cindy Cohn is stepping down as executive director. In a WIRED interview, she reflects on encryption, AI, and why she’s not ready to quit the battle.
☐ ☆ ✇ WIRED

A New Platform Offers Privacy Tools to Millions of Public Servants

By: Dell Cameron — September 9th 2025 at 10:00
From data-removal services to threat monitoring, the Public Service Alliance says its new marketplace will help public servants defend themselves in an era of data brokers and political violence.
☐ ☆ ✇ WIRED

Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World

By: Zeyi Yang — September 9th 2025 at 03:00
Geedge Networks, a company with ties to the founder of China’s mass censorship infrastructure, is selling its censorship and surveillance systems to at least four other countries in Asia and Africa.
☐ ☆ ✇ WIRED

ICE Has Spyware Now

By: Matt Burgess, Andy Greenberg, Lily Hay Newman — September 6th 2025 at 10:30
Plus: An AI chatbot system is linked to a widespread hack, details emerge of a US plan to plant a spy device in North Korea, your job’s security training isn’t working, and more.
☐ ☆ ✇ WIRED

Defense Department Scrambles to Pretend It’s Called the War Department

By: Dell Cameron — September 5th 2025 at 22:22
President Donald Trump said the so-called Department of War branding is to counter the “woke” Department of Defense name.
☐ ☆ ✇ WIRED

US Congressman’s Brother Lands No-Bid Contract to Train DHS Snipers

By: Dell Cameron — September 4th 2025 at 19:50
DHS says retired Marine sniper Dan LaLota’s firm is uniquely qualified to meet the government’s needs. LaLota tells WIRED his brother, GOP congressman Nick LaLota, played no role in the contract.
☐ ☆ ✇ WIRED

Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

By: Andy Greenberg — September 3rd 2025 at 21:04
A new specimen of “infostealer” malware offers a disturbing feature: It monitors a target's browser for NSFW content, then takes simultaneous screenshots and webcam photos of the victim.
☐ ☆ ✇ WIRED

No, Trump Can’t Legally Federalize US Elections

By: Lily Hay Newman — September 2nd 2025 at 10:20
The United States Constitution is clear: President Donald Trump can’t take control of the country’s elections. But he can sow confusion and fear.
☐ ☆ ✇ WIRED

China Is About to Show Off Its New High-Tech Weapons to the World

By: Lorenzo Lamperti — September 1st 2025 at 10:30
On September 3, China will hold a “Victory Day” military parade in Tiananmen Square to celebrate the 80th anniversary of its victory over Japan—and to send the West a message.
☐ ☆ ✇ WIRED

DOGE Put Everyone’s Social Security Data at Risk, Whistleblower Claims

By: Andy Greenberg, Lily Hay Newman, Dell Cameron — August 30th 2025 at 10:30
Plus: China’s Salt Typhoon hackers target 600 companies in 80 countries, Tulsi Gabbard purges CIA agents, hackers knock out Iranian ship communications, and more.
☐ ☆ ✇ WIRED

This Is the Group That's Been Swatting US Universities

By: David Gilbert — August 27th 2025 at 17:09
WIRED spoke to a self-proclaimed leader of an online group called Purgatory, which charged as little as $20 to call in fake threats against schools.
☐ ☆ ✇ WIRED

The Era of AI-Generated Ransomware Has Arrived

By: Lily Hay Newman, Matt Burgess — August 27th 2025 at 12:36
Cybercriminals are increasingly using generative AI tools to fuel their attacks, with new research finding instances of AI being used to develop ransomware.
☐ ☆ ✇ WIRED

The Mysterious Shortwave Radio Station Stoking US-Russia Nuclear Fears

By: Justin Ling — August 25th 2025 at 10:00
A popular shortwave Russian radio station dubbed “UVB-76” has been an enigma for decades. But its recent messages have turned it into a tool for Kremlin saber-rattling.
☐ ☆ ✇ WIRED

US Government Seeks Medical Records of Trans Youth

By: Dell Cameron — August 23rd 2025 at 10:30
Plus: Google wants billions of Chrome users to install an emergency fix, Kristi Noem is on the move, and North Korean IT workers are everywhere.
☐ ☆ ✇ WIRED

Phone Searches at the US Border Hit a Record High

By: Matt Burgess — August 20th 2025 at 16:01
Customs and Border Protection agents searched nearly 15,000 devices from April through June of this year, a nearly 17 percent spike over the previous three-month high in 2022.
☐ ☆ ✇ WIRED

Senate Probe Uncovers Allegations of Widespread Abuse in ICE Custody

By: Dell Cameron — August 19th 2025 at 17:15
Led by US senator Jon Ossoff, the investigation cites hundreds of reports since January, including accounts of miscarriages, child neglect, and sexual abuse at ICE detention centers in dozens of states.
☐ ☆ ✇ WIRED

Highly Sensitive Medical Cannabis Patient Data Exposed by Unsecured Database

By: Lily Hay Newman, Matt Burgess — August 19th 2025 at 16:14
Nearly a million records, which appear to be linked to a medical-cannabis-card company in Ohio, included Social Security numbers, government IDs, health conditions, and more.
☐ ☆ ✇ WIRED

493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds

By: Matt Burgess, Lily Hay Newman — August 19th 2025 at 14:11
Scam compounds in Cambodia, Myanmar, and Laos have conned people out of billions. New research shows they may be linked to child sextortion crimes too.
☐ ☆ ✇ WIRED

Russia Is Cracking Down on End-to-End Encrypted Calls

By: Lily Hay Newman — August 16th 2025 at 10:30
Plus: ICE agents accidentally add a random person to a sensitive group chat, Norwegian intelligence blames the Kremlin for hacking a dam, and new facial recognition vans roam the UK.
☐ ☆ ✇ WIRED

The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived

By: Lily Hay Newman — August 14th 2025 at 10:20
The breach of the US Courts records system came to light more than a month after the attack was discovered. Details about what was exposed—and who’s responsible—remain unclear.
☐ ☆ ✇ WIRED

Data Brokers Face New Pressure for Hiding Opt-Out Pages From Google

By: Dell Cameron — August 13th 2025 at 18:00
After reporters found dozens of firms hiding privacy tools from search results, US senator Maggie Hassan insists the companies explain their practices—and pledge to improve access to privacy controls.
☐ ☆ ✇ WIRED

Data Brokers Are Hiding Their Opt-Out Pages From Google Search

By: Colin Lecher, Tomas Apodaca — August 12th 2025 at 12:30
Dozens of companies are hiding how you can delete your personal data, The Markup and CalMatters found.
☐ ☆ ✇ WIRED

Inside the Multimillion-Dollar Gray Market for Video Game Cheats

By: Matt Burgess — August 11th 2025 at 10:00
Gaming cheats are the bane of the video game industry—and a hot commodity. A recent study found that cheat creators are making a fortune from gamers looking to gain a quick edge.
☐ ☆ ✇ WIRED

A Special Diamond Is the Key to a Fully Open Source Quantum Sensor

By: Lily Hay Newman — August 9th 2025 at 18:40
Quantum sensors can be used in medical technologies, navigation systems, and more, but they’re too expensive for most people. That's where the Uncut Gem open source project comes in.
☐ ☆ ✇ WIRED

The US Court Records System Has Been Hacked

By: Dell Cameron, Andrew Couts — August 9th 2025 at 10:30
Plus: Instagram sparks a privacy backlash over its new map feature, hackers steal data from Google's customer support system, and the true scope of the Columbia University hack comes into focus.
☐ ☆ ✇ WIRED

Ex-NSA Chief Paul Nakasone Has a Warning for the Tech World

By: Lily Hay Newman — August 8th 2025 at 23:21
At the Defcon security conference in Las Vegas on Friday, Nakasone tried to thread the needle in a politically fraught moment while hinting at major changes for the tech community around the corner.
☐ ☆ ✇ WIRED

Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds

By: Andy Greenberg — August 8th 2025 at 20:20
Security researchers found two techniques to crack at least eight brands of electronic safes—used to secure everything from guns to narcotics—that are sold with Securam Prologic locks.
☐ ☆ ✇ WIRED

A Misconfiguration That Haunts Corporate Streaming Platforms Could Expose Sensitive Data

By: Lily Hay Newman — August 8th 2025 at 17:00
A security researcher discovered that flawed API configurations are plaguing corporate livestreaming platforms, potentially exposing internal company meetings—and he's releasing a tool to find them.
☐ ☆ ✇ WIRED

It Looks Like a School Bathroom Smoke Detector. A Teen Hacker Showed It Could Be an Audio Bug

By: Andy Greenberg, Joseph Cox — August 8th 2025 at 13:00
A pair of hackers found that a vape detector often found in high school bathrooms contained microphones—and security weaknesses that could allow someone to turn it into a secret listening device.
☐ ☆ ✇ WIRED

Leak Reveals the Workaday Lives of North Korean IT Scammers

By: Matt Burgess — August 7th 2025 at 23:15
Spreadsheets, Slack messages, and files linked to an alleged group of North Korean IT workers expose their meticulous job-planning and targeting—and the constant surveillance they're under.
☐ ☆ ✇ WIRED

Mysterious Crime Spree Targeted National Guard Equipment Stashes

By: Dell Cameron — August 7th 2025 at 18:21
A string of US armory break-ins, kept quiet by authorities for months, points to a growing security crisis—and signs of an inside job.
☐ ☆ ✇ WIRED

Encryption Made for Police and Military Radios May Be Easily Cracked

By: Kim Zetter — August 7th 2025 at 18:09
Researchers found that an encryption algorithm likely used by law enforcement and special forces can have weaknesses that could allow an attacker to listen in.
❌