As per sources, Toyota Motor Corporation reported a data breach in its cloud environment that led to the exposure of car-location data for 2,015,000 customers for a decade, between November 6, 2013, and April 17, 2023. A security notice published in Toyota newsroom explained that the breach was caused due to database misconfiguration in its cloud environment containing part of the data of Toyota Motor Corporation entrusted to Toyota Connected Corporation (TC) made it publicly available. The investigations of data breach are currently ongoing, including all cloud environments managed by TC. Toyota ensures to take measures to block outside access to the cloud environment following the discovery of a database misconfiguration. Also, Toyota expressed their apologies to customers and related parties for this inconvenience and established a dedicated call center to address their inquiries. This data breach resulted in the exposure of car-location information of customers who used T-Connect G-Link, G-Link Lite, or G-BOOK services between January 2, 2012, and April 17, 2023. The misconfigured database exposed various vehicle-related information, such as the in-vehicle GPS navigation terminal ID number, chassis number, and time-stamped vehicle location data. Although there is no indication that the data was misused or unauthorized third parties could have viewed historical and real-time location information for the 2.15 million Toyota cars. It is worth noting that the compromised data does not include personally identifiable information, meaning that it cannot be used to track individuals unless the attacker had access to their car's VIN (vehicle identification number). Further, Toyota mentions that the incident might raise the possibility of video recordings taken outside the vehicle being exposed.
A large-scale phishing campaign has been identified leveraging RFQ (Request for Quotation) themed emails to distribute credential-stealing malware. Attackers disguise malicious HTM...
Two critical vulnerabilities in Progress ShareFile have been identified that can be chained to achieve pre-authentication remote code execution (RCE). Discovered by watchTowr resea...
The FBI has issued a warning highlighting potential security and privacy risks associated with widely used mobile applications developed by Chinese companies. These applications, a...