Indian music streaming platform Raaga suffered a major cybersecurity incident in December 2025, after a threat actor posted a large database of user information for sale on a well-known hacking forum. The breach impacted more than 10 million users, exposing approximately 10.2 million unique email addresses along with extensive personal data. Leaked records included usernames, gender, age, full dates of birth in some cases, location details such as postcodes, and account passwords. Investigations indicate that attackers gained unauthorized access to Raaga’s systems and exfiltrated the data, which was later advertised on underground cybercriminal marketplaces, raising serious concerns about privacy and identity theft. The severity of the incident is amplified by Raaga’s use of unsalted MD5 hashing to store user passwords. MD5 is a deprecated cryptographic algorithm that has been considered insecure for over a decade. Without salting, passwords can be rapidly cracked using rainbow tables and modern computing resources. This significantly increases the risk of credential stuffing attacks, particularly for users who reuse passwords across multiple platforms. The breach highlights potential shortcomings in Raaga’s security controls and its adherence to modern data protection standards. All affected users should immediately change their Raaga passwords and update credentials on any other services where the same password was reused. Enabling Multi-Factor Authentication (MFA) wherever available is strongly advised. Users should remain alert to phishing attempts that may exploit leaked data and consider using password managers to generate strong, unique passwords. Organizations should adopt modern hashing algorithms (bcrypt/Argon2), conduct regular security audits, and strengthen access controls to prevent similar incidents.
Okta has issued a warning about a new wave of highly sophisticated voice-based social engineering (vishing) attacks using custom phishing kits designed to steal Single Sign-On (SSO...
A critical security vulnerability has been disclosed in the GNU InetUtils telnet daemon (telnetd) that allows remote attackers to gain unauthorized root access to affected systems....
Oracle has released its January 2026 Critical Patch Update (CPU), delivering 337 security patches that address around 230 unique CVEs across more than 30 Oracle product families. T...