{"id":6851,"date":"2025-09-20T07:08:18","date_gmt":"2025-09-20T07:08:18","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=6851"},"modified":"2025-09-20T07:08:18","modified_gmt":"2025-09-20T07:08:18","slug":"in-different-information-600k-hit-by-healthcare-breaches-main-shinyhunters-hacks-deepseeks-coding-bias","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=6851","title":{"rendered":"In Different Information: 600k Hit by Healthcare Breaches, Main ShinyHunters Hacks, DeepSeek&#8217;s Coding Bias"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>SecurityWeek\u2019s cybersecurity information roundup offers a concise compilation of noteworthy tales that may have slipped beneath the radar.<\/strong><\/p>\n<p>We offer a invaluable abstract of tales that will not warrant a whole article, however are nonetheless vital for a complete understanding of the cybersecurity panorama.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/topics\/in-other-news\/\">Every week<\/a>, we curate and current a group of noteworthy developments, starting from the most recent vulnerability discoveries and rising assault methods to vital coverage modifications and trade experiences.\u00a0<\/p>\n<p><strong>Listed below are this week\u2019s tales:<\/strong><\/p>\n<p><strong>ShinyHunters stole knowledge of Gucci, Balenciaga and Alexander McQueen prospects<\/strong><\/p>\n<p>The ShinyHunters group could have stolen the knowledge of tens of millions of consumers of luxurious manufacturers Gucci, Balenciaga and Alexander McQueen, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bbc.com\/news\/articles\/crl5j8ld615o\">BBC<\/a> reported. Guardian firm Kering has confirmed struggling an information breach, however mentioned no monetary data was compromised. The hackers claimed to have stolen knowledge related to 7.4 million distinctive e mail addresses.<\/p>\n<p><strong>Goshen Medical Heart knowledge breach impacts 450,000<\/strong><\/p>\n<p>Goshen Medical Heart, a healthcare group in North Carolina, has disclosed a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.maine.gov\/agviewer\/content\/ag\/985235c7-cb95-4be2-8792-a1252b4f8318\/e541449a-f3e3-4b69-93ed-c3f527fbc3a3.html\">knowledge breach<\/a> impacting greater than 450,000 individuals. The corporate has confirmed that hackers stole private and well being data months after the BianLian ransomware group listed the group on its leak web site. It\u2019s unclear what occurred to the stolen knowledge because the BianLian group has not been lively since March.\u00a0\u00a0<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Commercial. Scroll to proceed studying.<\/span><\/div>\n<p><strong>Retina Group of Florida knowledge breach<\/strong><\/p>\n<p>One other vital healthcare knowledge breach was reported by ophthalmology observe Retina Group of Florida. The group detected an intrusion in November 2024 and its investigation confirmed that the knowledge of over <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.maine.gov\/agviewer\/content\/ag\/985235c7-cb95-4be2-8792-a1252b4f8318\/361c1196-d713-41fc-b9db-7c6c63e7da3d.html\">150,000 individuals<\/a> could have been compromised because of the incident.\u00a0<\/p>\n<p><strong>Crucial Chaos-Mesh vulnerabilities<\/strong><\/p>\n<p>JFrog found 4 vulnerabilities within the Chaos engineering platform Chaos-Mesh, together with three critical-severity flaws that may very well be exploited for code execution on any pod within the cluster. Named <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/jfrog.com\/blog\/chaotic-deputy-critical-vulnerabilities-in-chaos-mesh-lead-to-kubernetes-cluster-takeover\/\">Chaotic Deputy<\/a>, the safety defects are tracked as CVE-2025-59358, CVE-2025-59360, CVE-2025-59361 and CVE-2025-59359 and had been addressed in Chaos-Mesh model 2.7.3.<\/p>\n<p><strong>ShinyHunters claims theft of 1.5 billion information in Salesforce hack<\/strong><\/p>\n<p>The cybercrime group ShinyHunters claims to have stolen 1.5 billion information from 760 firms within the current <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/topics\/salesloft\/\">Salesforce\u2013Salesloft<\/a> assault, Bleeping Pc <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks\/\">reported<\/a>. Many cybersecurity companies have <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/more-cybersecurity-firms-hit-by-salesforce-salesloft-drift-breach\/\">confirmed<\/a> being impacted, however the claims of a lot of these hacking teams have typically been exaggerated.\u00a0<\/p>\n<p><strong>DeepSeek AI generates much less safe code for China dissident teams<\/strong><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/technology\/2025\/09\/16\/deepseek-ai-security\/\">Analysis<\/a> performed by CrowdStrike exhibits that the code generated by the AI of Chinese language agency DeepSeek is much less safe if the request specifies that the code is for dissidents or different teams that could be thought-about delicate by the Chinese language authorities. If the request to DeepSeek specifies that the code is for the banned religious motion Falun Gong or the Islamic State, the AI could refuse to generate code. If it doesn\u2019t refuse, the code is extra prone to include vulnerabilities, and so is within the case of code generated for Tibet and Taiwan. Code for industrial management programs is the almost certainly to include safety flaws.<\/p>\n<p><strong>Claroty publishes International State of CPS Safety report<\/strong><\/p>\n<p>Claroty has revealed a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.claroty.com\/resource-downloads\/2025-survey-report.pdf\">report<\/a> titled \u2018International State of CPS Safety 2025: Navigating Danger in an Unsure Financial Panorama\u2019. Primarily based on a survey of 1,100 cybersecurity professionals, the report exhibits that 49% imagine shifting international financial insurance policies and geopolitical tensions are driving elevated danger throughout cyber-physical system (CPS) belongings and processes. Greater than three-quarters imagine rising laws will power them to overtake their present CPS safety methods.\u00a0<\/p>\n<p><strong>Atlassian, Mozilla, WatchGuard, Nokia patches<\/strong><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/confluence.atlassian.com\/security\/security-bulletin-september-16-2025-1627098357.html\">Atlassian<\/a> launched patches for 4 vulnerabilities in third-party parts utilized in Confluence, Jira, and Jira Service Administration Information Heart and Server. <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/\">Mozilla<\/a> rolled out Thunderbird and Firefox updates that resolve roughly a dozen bugs. <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.watchguard.com\/wgrd-psirt\/advisory\/wgsa-2025-00015\">WatchGuard<\/a> introduced fixes for CVE-2025-9242, a critical-severity flaw in Fireware OS that might result in distant code execution, with out authentication. Nokia knowledgeable prospects about Nokia Container Service (NCS) and CloudBand Infrastructure Software program (CBIS) flaws permitting <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.nokia.com\/about-us\/security-and-privacy\/product-security-advisory\/CVE-2023-49564\">authentication bypass<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.nokia.com\/about-us\/security-and-privacy\/product-security-advisory\/CVE-2023-49565\/\">distant code execution<\/a>.\u00a0\u00a0<\/p>\n<p><strong>Eve Safety raises $3 million in seed funding<\/strong><\/p>\n<p>Austin, Texas-based Eve Safety introduced that it has <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eve.security\/post\/founders-blog-the-dawn-of-agentic-ai-why-we-started-eve-security\">raised $3 million<\/a> in a seed funding spherical from LiveOak Ventures and Tau Ventures. The corporate additionally introduced the launch of its product, EveGuard, an agentic AI observability and coverage enforcement platform. The platform leverages Agent-in-the-Loop (AITL) know-how to make sure the safety of AI brokers interacting with an organization\u2019s important enterprise programs.<\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/in-other-news-900k-for-xss-bugs-hybridpetya-malware-burger-king-censors-research\/\">In Different Information: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Analysis<\/a><\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/in-other-news-scammers-abuse-grok-us-manufacturing-attacks-gmail-security-claims-debunked\/\">In Different Information: Scammers Abuse Grok, US Manufacturing Assaults, Gmail Safety Claims Debunked<\/a>\n\t\t\t<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>SecurityWeek\u2019s cybersecurity information roundup offers a concise compilation of noteworthy tales that may have slipped beneath the radar. We offer a invaluable abstract of tales that will not warrant a whole article, however are nonetheless vital for a complete understanding of the cybersecurity panorama. Every week, we curate and current a group of noteworthy developments, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6853,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[5448,4775,5449,1256,5451,1497,1203,2080,967,121,5450],"class_list":["post-6851","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-600k","tag-bias","tag-breaches","tag-coding","tag-deepseeks","tag-hacks","tag-healthcare","tag-hit","tag-major","tag-news","tag-shinyhunters"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6851"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6851\/revisions"}],"predecessor-version":[{"id":6852,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6851\/revisions\/6852"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/6853"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 18:58:07 UTC -->