Conduent Breach Exposes Data for Nearly 17,000 Volvo Group Employees in the U.S.
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

ApolloMD Data Breach Exposes PHI for Over 626,000 Individuals
A late‑May 2025 intrusion into ApolloMD’s systems led to the unauthorized access and copying of personally identifiable and clinical information for about 626,540 people, with some files containing Social Security numbers; the incident was later posted to a ransomware-linked leak site. ApolloMD reported the event to federal health authorities, began mailing breach notifications by September 2025 and is offering affected parties complimentary credit monitoring, highlighting broader third‑party risk in health data aggregation.

LexisNexis breach exposes legacy datasets, raises cloud-hygiene alarm
LexisNexis confirmed an intrusion that exposed legacy files and identifiers, with the attacker alleging exploitation of React2Shell and weak cloud controls. Immediate risks include exposed credentials, roughly 400,000 personal records, and elevated regulatory and insurance scrutiny — a pattern echoed by recent large-scale exfiltrations where fast operational recovery did not eliminate downstream fraud and identity risk.
QualDerm Partners: 3.1M Patient Records Exposed in December Network Intrusion
Healthcare manager QualDerm Partners disclosed a December network intrusion that exposed 3,117,874 patient records after attackers retained access for about two days; the company has added the event to the HHS portal, notified impacted individuals and is offering 12 months of identity monitoring. The incident fits a broader pattern of threat actors targeting aggregator platforms where even short dwell times or archived‑data access produce large, reusable exfiltrations — a trend that is already reshaping insurer underwriting, regulatory attention, and vendor consolidation in health IT.

ManoMano: Support-Portal Breach Exposes Millions of Customer Records
ManoMano confirmed a support‑channel compromise tied to a third‑party supplier that a threat actor claims exposed ~37.8 million accounts and ~43 GB of support data. Corroborating incidents show attackers increasingly combine support‑system intrusions with credential caches and real‑time session orchestration—raising immediate risks from phishing, MFA bypass, and long‑tail credential‑stuffing and intensifying EU cross‑border regulatory exposure.

DHS Data Breach Exposes ICE Contracts and Multi‑Million Awards
A hacktivist collective released procurement records tied to DHS and ICE, revealing contracts with thousands of vendors and multi‑million dollar awards. Related reporting and security research suggests the disclosures extend beyond vendor files to lease lists, embedded GSA activity and exposed admin credentials, increasing operational and legal disruption risks.

U.S. Panera Bread Customer Data Dumped After ShinyHunters Exploit Microsoft Entra SSO
ShinyHunters published a large archive of customer contact data it says was taken from Panera Bread after a failed extortion attempt, claiming about 5.1 million unique email addresses within an asserted 14 million-record haul. Researchers say the Panera intrusion matches a wider, telephone-based social-engineering trend—real-time vishing paired with browser phishing toolkits—and a separate unsecured infostealer cache of roughly 149 million credentials that together amplify risks of credential stuffing and targeted account takeover.
Ransomware strike at Ingram Micro exposes sensitive records of ~42,500 people
A July ransomware incident at Ingram Micro led to the theft of employment and applicant records for about 42,521 people and service outages that were largely resolved within a week. A threat actor later published roughly 3.5 TB of claimed data; the company is offering two years of identity protection while facing regulatory notification, legal exposure, and heightened supply‑chain scrutiny.
CGI Sverige hit by claimed e‑government code leak by ByteToBreach
A threat actor named ByteToBreach says it published files tied to CGI Sverige and Sweden’s e‑government platform, prompting a national incident response. Authorities and the company report two test servers affected; investigators are examining exposed code and documentation for follow‑on exploit risk.