CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Lapsus$ Hackers
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Lapsus$ Hackers

T-Mobile mobile phone store showing Lapsus$ hackers stole source code
Cyber SecurityNews

Lapsus$ Hackers Breached T-Mobile Repeatedly and Downloaded Thousands of Source Code Repositories, Leaked Chats Show

April 28, 2022
Lapsus$ hackers repeatedly accessed T-Mobile's internal systems, including Atlas account management system capable of SIM swapping, and downloaded thousands of source code repositories.
Read More
Programming code flowing showing Lapsus$ hackers stole source code in data breach
Cyber SecurityNews

Lapsus$ Hackers Published 70GB of Source Code Stolen in the Globant Data Breach

April 7, 2022
Globant SAS confirmed a data breach affecting a "limited" number of customers after Lapsus$ hackers published 70GB of source code allegedly stolen from the company. Screenshots suggested that the leaked customer source code belonged to companies like Apple, Facebook and DHL.
Read More
Microsoft office building showing source code breach by Lapsus$ hackers
Cyber SecurityNews

Lapsus$ Hackers Accessed and Published Source Code for Microsoft Bing, Cortana, and Maps

March 31, 2022
Lapsus$ hackers compromised Microsoft's Azure DevOps Server, exfiltrated and published source code for the company's web infrastructure, websites, and mobile apps.
Read More
Handcuffs on a keyboard showing arrests for Lapsus$ hackers
Cyber SecurityNews

Suspected Lapsus$ Hackers Arrested; London Group Between the Ages of 16 and 21

March 30, 2022
Lapsus$ hackers appeared to be reckless – posting about their activities on Twitter and other social media sites, and reportedly broke into Zoom conference calls at the companies they had just breached to taunt employees.
Read More

Latest

Yodel delivery Service logo sign showing cyber incident suspected ransomware

Yodel Parcel Delivery Service Disrupted by a Suspected Ransomware Cyber Incident

Hacker exploit vulnerability Log4Shell on VMware servers

CISA and Coast Guard Cyber Command Warn About Hackers Leveraging Log4Shell Vulnerability on VMware Servers

Finger pointing at digital lock showing privacy enhancing technologies (PETs)

What Are Privacy-Enhancing Technologies (PETs) And How You Can Choose the Right One(s)

Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results