{"id":11104,"date":"2026-01-24T14:40:54","date_gmt":"2026-01-24T14:40:54","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=11104"},"modified":"2026-01-24T14:40:54","modified_gmt":"2026-01-24T14:40:54","slug":"nike-probing-potential-safety-incident-as-hackers-threaten-to-leak-knowledge","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=11104","title":{"rendered":"Nike Probing Potential Safety Incident as Hackers Threaten to Leak Knowledge"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>Nike has launched an investigation after a cybercrime group claimed to have stolen information from its programs.<\/strong><\/p>\n<p>The athletic footwear and attire large was listed as a sufferer on the Tor-based leak web site operated by the WorldLeaks gang on January 22, and a timer signifies that the stolen information will likely be made public on January 24, until a ransom is paid.<\/p>\n<p>The cybercriminals haven&#8217;t specified how a lot or what kind of information they allegedly stole from Nike.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"497\" height=\"199\" src=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2026\/01\/WorldLeaks-Nike.jpg\" alt=\"\" class=\"wp-image-45113\" srcset=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2026\/01\/WorldLeaks-Nike.jpg 497w, https:\/\/www.securityweek.com\/wp-content\/uploads\/2026\/01\/WorldLeaks-Nike-360x144.jpg 360w\" sizes=\"auto, (max-width: 497px) 100vw, 497px\"\/><\/figure>\n<\/div>\n<p>\u201cWe at all times take shopper privateness and information safety very severely,\u201d Nike instructed <em>SecurityWeek<\/em>. \u201cWe&#8217;re investigating a possible cyber safety incident and are actively assessing the scenario.\u201d<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/hunters-international-shuts-down-offers-free-decryptors-as-it-morphs-into-world-leaks\/\">WorldLeaks emerged<\/a> in 2025 following the shutdown of Hunters Worldwide, a ransomware group energetic since late 2023. With the transition to WorldLeaks, the cybercriminals stopped utilizing file-encrypting malware and have concentrated solely on information theft and extortion.\u00a0<\/p>\n<p>On the time of writing, the WorldLeaks web site names almost 120 alleged victims. Certainly one of them is <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/hackers-leak-fake-dell-data\/\">Dell<\/a>, which in July 2025 stated the hackers had solely stolen artificial or publicly obtainable info.\u00a0<\/p>\n<p>Information of a possible intrusion at Nike comes shortly after clothes retailer <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/under-armour-looking-into-data-breach-affecting-customers-email-addresses\/\">Beneath Armour<\/a> introduced that it\u2019s investigating an information breach involving prospects\u2019 electronic mail addresses and different private info.<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Commercial. Scroll to proceed studying.<\/span><\/div>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/analysis-of-6-billion-passwords-shows-stagnant-user-behavior\/\">Evaluation of 6 Billion Passwords Reveals Stagnant Person Habits<\/a><\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/42000-impacted-by-ingram-micro-ransomware-attack\/\">42,000 Impacted by Ingram Micro Ransomware Assault<\/a><\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/750000-impacted-by-data-breach-at-canadian-investment-watchdog\/\">750,000 Impacted by Knowledge Breach at Canadian Funding Watchdog<\/a><\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/central-maine-healthcare-data-breach-impacts-145000-individuals\/\">Central Maine Healthcare Knowledge Breach Impacts 145,000 People<\/a>\n\t\t\t<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Nike has launched an investigation after a cybercrime group claimed to have stolen information from its programs. The athletic footwear and attire large was listed as a sufferer on the Tor-based leak web site operated by the WorldLeaks gang on January 22, and a timer signifies that the stolen information will likely be made public [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":11106,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[157,554,3205,1054,7533,860,7534,211,2831],"class_list":["post-11104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-data","tag-hackers","tag-incident","tag-leak","tag-nike","tag-potential","tag-probing","tag-security","tag-threaten"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11104"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11104\/revisions"}],"predecessor-version":[{"id":11105,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11104\/revisions\/11105"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/11106"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 16:36:20 UTC -->