2 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
A hacker named Lovely claims to have accessed a Condé Nast database, leaking over 2.3 million user records and threatening to release an additional 40 million. While Condé Nast has been accused of neglecting security, a counterargument suggests the hacker is a criminal seeking a payoff. This breach adds to a troubling trend of cybersecurity incidents affecting high-profile companies.
If you do, here's more
A hacker known as Lovely claims to have breached a Condé Nast user database, exposing over 2.3 million records containing names, email addresses, street addresses, and phone numbers. Fortunately, no passwords were leaked. The hacker threatens to release an additional 40 million records from other Condé Nast publications, including Vogue and Vanity Fair, in the coming weeks. Lovely criticized Condé Nast for failing to address security vulnerabilities despite a month of attempts to prompt fixes.
DataBreaches.Net disputes Lovely's claims, stating the hacker misrepresented their intentions by pretending to help Condé Nast secure its systems. They argue that Lovely is a cybercriminal seeking financial gain rather than a whistleblower. The breach at Condé Nast is part of a worrying trend of cybersecurity incidents affecting prominent companies. For instance, Coupang, a South Korean eCommerce giant, recently faced a major breach and is offering $1 billion in compensation to affected customers. Similarly, Goldman Sachs reported potential data exposure linked to a cybersecurity incident at a law firm, and Petco revealed that a software flaw made customer information publicly accessible.
Recent research highlights social engineering as a major threat, particularly for companies with revenues between $100 million and $1 billion. Nearly all surveyed businesses reported experiencing at least one social engineering incident in the past year. Many of these attacks originate from compromised third parties, creating vulnerabilities even in organizations with strong defenses. This pattern underscores the complex nature of cybersecurity in today's interconnected business environment.
Questions about this article
No questions yet.