1 million highly sensitive pictures leaked by Korean teen dating app

1 million highly sensitive pictures leaked by Korean teen dating app

Another thing we noticed is that, while the database contains no personally identifiable (written) information, like names, usernames, emails or any other details, the images all seem to contain “user IDs.”.

130k+ extremely NSFW sexual photos, video and audio leaked by ‘private social network’

130k+ extremely NSFW sexual photos, video and audio leaked by ‘private social network’

Given that this bucket belongs to LimitChat, which we believe is a product of FaceChance, then LimitChat users have just had their most sensitive, explicit moments leaked online for anyone who knows where to look.

We found 350 million email adresses on an unsecured server

We found 350 million email adresses on an unsecured server

Here are some examples of how potential attackers can use the data found in the unsecured Amazon S3 bucket against the owners of the exposed email addresses:Spamming 350 million email IDsCarrying out phishing attacksBrute-forcing the passwords of the email accountsAttackers can also combine the leaked email addresses with data from other breaches and build more detailed pictures of their potential targets.

New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data

New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data

CyberNews received information from reader Jake Dixon, a security researcher with Vadix Solutions, who discovered an unsecured Amazon Simple Storage Solution (S3) database containing more than 31,000 images of users’ passports, driver’s licenses, evidence of age documents, and more.

Massive data leak exposes medical records, mugshots and IDs of more than 36,000 US inmates

Massive data leak exposes medical records, mugshots and IDs of more than 36,000 US inmates

JailCore was left unsecure and unencrypted on an Amazon server, impacting locations in Florida, Kentucky, Missouri, Tennessee and West Virginia The bucket was discovered by vpmMentor on January 3rd, but was not closed until nearly two weeks later.

Over 750,000 applications for US birth certificate copies exposed online

Over 750,000 applications for US birth certificate copies exposed online

An online company that allows users to obtain a copy of their birth and death certificates from U.S. state governments has exposed a massive cache of applications — including their personal information.

HIPAA nightmare: An IT vendor’s error left more than 300,000 files with protected health information exposed

HIPAA nightmare: An IT vendor’s error left more than 300,000 files with protected health information exposed

Medico, Inc.’s IT vendor’s error left at least two Amazon buckets unsecured More than 300,000 files contained protected health information related to patient billing, complete with insurance information and treatment codes Leaks were independently discovered by at least three researchers using different search methods It’s been a rough few months in terms of business associates or third parties disclosing breaches of protected health information.

An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet

An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet

According to a new report by the security researchers at UpGuard, a Washington-based ISP by the name of Pocket iNet left 73 gigabytes of essential operational data publicly exposed in a misconfigured Amazon S3 storage bucket for months.