Connect with us

CyberSecurity

Employee Data Breaches Reach Seven-Year Peak as Hybrid Work Creates New Security Challenges

Published

on

The landscape of employee data breaches has shifted dramatically, with incidents reaching unprecedented levels across the United Kingdom. Recent analysis reveals a troubling trend that puts thousands of workers’ personal information at risk daily.

Record-Breaking Rise in Employee Data Breaches

According to legal experts at Nockolds, employee data breaches reported to the Information Commissioner’s Office (ICO) climbed to 3,872 incidents in 2025. This represents a 5% increase from the previous year and marks the highest figure recorded since monitoring began in 2019.

The statistics paint a concerning picture for workplace security. Compared to 2019’s baseline of 3,010 reported incidents, the current figures show a staggering 29% increase over six years. However, the nature of these breaches tells an unexpected story.

Non-Cyber Incidents Drive Employee Data Breach Growth

Surprisingly, traditional cyber-related employee data breaches actually decreased by 6% to 1,568 incidents. Instead, non-technological security failures surged by 15% to reach 2,304 cases. This shift highlights how modern workplace practices have created entirely new vulnerabilities.

As a result, organizations face threats they might never have anticipated. Physical security lapses now account for the majority of employee data breaches, ranging from lost devices to misdirected communications.

Common non-cyber incidents include:

  • Misplaced laptops, smartphones, or storage devices
  • Documents abandoned in public transport or vehicles
  • Correspondence delivered to incorrect recipients
  • Improper disposal of confidential paperwork
  • Unsecured file transfers between locations

Hybrid Work Model Amplifies Security Risks

The evolution toward flexible working arrangements has fundamentally changed how employee data breaches occur. Joanna Sutton, principal associate at Nockolds, attributes this trend directly to hybrid work environments.

“Organizations have strengthened their digital defenses, but many have not adapted their physical and procedural safeguards to match,” Sutton explains. The constant movement of sensitive materials between home offices and corporate locations creates security gaps that technology alone cannot address.

Furthermore, the types of information now handled in domestic settings include highly sensitive employee records. HR documentation, payroll details, disciplinary files, medical records, and identity verification documents regularly travel beyond controlled office environments.

Legal Implications and Employee Rights

Even when employee data breaches result from genuine accidents, legal consequences remain significant. Workers retain the right to pursue compensation claims if incidents cause psychological distress or anxiety, regardless of intent.

This reality places enormous responsibility on employers to implement comprehensive data protection measures. Organizations must safeguard vast quantities of personally identifiable information while accommodating modern work patterns.

“Even if an employee accidentally causes a breach, organizations may still be liable if policies are outdated or staff have not been properly trained,” Sutton warns. This emphasizes the critical partnership required between human resources and security teams.

Prevention Strategies for Modern Workplaces

Addressing the surge in employee data breaches requires a fundamental shift in organizational thinking. Companies must recognize that effective data security depends equally on employee awareness and robust technical systems.

Regular, practical training programs become essential components of modern security frameworks. Policies must evolve to reflect the realities of hybrid working, addressing scenarios that traditional office-based guidelines never considered.

Building on this foundation, organizations need comprehensive approaches that combine technological solutions with human-centered security practices. The rise in non-cyber incidents demonstrates that investing solely in digital defenses leaves critical vulnerabilities unaddressed.

Recent research from Mimecast supports these concerns, revealing that 42% of global organizations experienced increased cybersecurity incidents due to employee negligence. The same percentage reported problems from malicious insiders, highlighting the complex human elements in data protection.

As workplace flexibility continues expanding, preventing employee data breaches demands innovative strategies that protect sensitive information across multiple environments while maintaining operational efficiency.

CyberSecurity

North Korean Cyber Group Launches Supply Chain Attack Against Axios JavaScript Library

Published

on

Cybersecurity experts have uncovered a sophisticated supply chain attack orchestrated by North Korean threat actors targeting the widely-used Axios JavaScript library. This incident highlights the growing vulnerability of open-source software ecosystems to state-sponsored cyber operations.

How the Supply Chain Attack Unfolded

On Monday evening, security researchers detected malicious modifications to the Axios library hosted on npm, the world’s largest software registry. The attackers successfully compromised a developer account with publishing privileges, allowing them to inject harmful code into what millions of developers trust as legitimate software.

The breach lasted approximately three hours before security firm StepSecurity identified and reported the compromise. During this window, the malicious versions were available for download by unsuspecting developers worldwide.

However, the true scope of impact remains uncertain. Security company Aikido issued a stark warning: any developer who downloaded the compromised package during the attack window should consider their systems potentially breached.

North Korean Attribution and Advanced Tactics

Google’s Threat Intelligence Group has attributed this supply chain attack to UNC1069, a suspected North Korean cyber group with extensive experience in similar operations. John Hultquist, Google’s chief threat analyst, emphasized the group’s historical focus on cryptocurrency theft through supply chain compromises.

The attackers demonstrated sophisticated operational security by replacing the legitimate developer’s email address with their own. This tactic not only maintained access but also prevented the original account holder from quickly regaining control of their compromised credentials.

Additionally, the malicious payload was designed as a remote access trojan (RAT), potentially granting attackers complete control over infected systems. The malware included self-deletion capabilities to evade detection by security tools and forensic analysis.

Growing Threat to Open Source Ecosystems

This incident represents part of a broader trend targeting open-source software infrastructure. Previous supply chain attacks have compromised major platforms including SolarWinds, 3CX, and Kaseya, affecting thousands of organizations globally.

The popularity of Axios, which receives tens of millions of weekly downloads, made it an attractive target for malicious actors seeking maximum impact. Such widespread distribution channels allow attackers to potentially compromise vast networks of systems through a single breach point.

Open-source maintainers face increasing pressure to secure their projects against these sophisticated threats. Traditional security measures often prove insufficient against state-sponsored groups with advanced capabilities and resources.

Implications for Developer Security

This supply chain attack underscores critical vulnerabilities in modern software development practices. Developers routinely install thousands of dependencies, often without thorough security verification of each component.

Organizations must now reassess their security protocols for managing third-party dependencies. This includes implementing automated scanning tools, maintaining software bills of materials, and establishing incident response procedures for supply chain compromises.

Furthermore, the incident highlights the importance of multi-factor authentication and account monitoring for maintainers of popular open-source projects. Even brief compromises can have far-reaching consequences across the entire software ecosystem.

Preventing Future Supply Chain Attacks

Security experts recommend several strategies to mitigate supply chain attack risks. First, developers should implement dependency pinning to prevent automatic updates from untrusted sources. Regular security audits of third-party libraries can also identify potential vulnerabilities before they become active threats.

Package repositories like npm are enhancing their security measures, including improved account verification and anomaly detection systems. Nevertheless, the responsibility for security ultimately rests with individual developers and organizations consuming open-source software.

As cyber threats continue evolving, the software development community must adapt its practices to address these emerging risks. The Axios incident serves as a wake-up call for stronger security measures throughout the open-source ecosystem.

Continue Reading

CyberSecurity

Tax Season Phishing: How Cybercriminals Are Targeting You in 2026

Published

on

Tax Season Phishing: How Cybercriminals Are Targeting You in 2026

The annual tax filing rush isn’t just stressful for taxpayers. It’s a golden opportunity for cybercriminals. Early 2026 has seen a significant surge in malicious campaigns specifically designed to exploit the anxiety and urgency of tax season.

Cybersecurity firm Proofpoint has identified over a hundred distinct operations. These aren’t just simple spam emails. They’re sophisticated attacks delivering malware, deploying remote access tools, and executing complex fraud schemes aimed squarely at stealing credentials and financial data.

The New Tools in a Hacker’s Arsenal

Attackers are getting creative with their methods. A key trend identified in recent advisories is the weaponization of legitimate Remote Monitoring and Management (RMM) software. These tools, typically used by IT departments for remote support, are being co-opted by threat actors to gain persistent, undetected access to victim systems.

Once installed, this access can be used to siphon data, deploy additional payloads, or lay the groundwork for long-term espionage. It’s a dangerous shift that bypasses many traditional security measures designed to flag known malware.

Global Campaigns and Evolving Threat Actors

The threat is truly global. Researchers have tracked campaigns with distinct geographical focuses. One group, tracked as TA2730, has shown particular interest in organizations across Japan and other Asian markets.

Meanwhile, taxpayers in Canada, Australia, Singapore, and Switzerland have also been in the crosshairs of other coordinated efforts. The scale ranges from broad, opportunistic phishing blasts to highly targeted business email compromise (BEC) attacks.

How the Scams Work: From Fake Forms to Executive Impersonation

The social engineering hooks are varied but consistently effective. In one common scheme, attackers impersonate investment firms. They send emails urgently requesting updates to tax forms like the W-8BEN, directing the target to a flawless but fake login portal that harvests their credentials the moment they’re entered.

Another prevalent tactic involves BEC scams. Here, cybercriminals pose as company executives—often the CEO or CFO—and send internal requests for sensitive employee tax documents like W-2 or W-9 forms. An employee thinking they’re complying with a boss’s request can inadvertently expose a treasure trove of personal identification and financial data for the entire workforce.

Why Tax Lures Are So Dangerously Effective

What makes these scams so successful? Timing and psychology. During tax season, people expect communications about filings, penalties, missing documents, and compliance issues. An email with the subject line “ACTION REQUIRED: Correct Your Tax Filing Immediately” is designed to trigger panic and bypass rational scrutiny.

The pressure to avoid penalties or meet deadlines causes even cautious individuals to act first and verify later. Threat actors understand this annual rhythm perfectly. They know that people are using a multitude of apps and services to manage their finances, creating more potential vectors for attack.

Protecting Yourself and Your Organization

Vigilance is your first and best defense. Enterprises must prioritize user education, specifically around the techniques and timely lures that criminals abuse each tax season. Employees should be trained to scrutinize any email requesting sensitive data or tax forms, especially those conveying urgency.

Always verify the sender’s email address carefully—not just the display name. Hover over links to see the true destination URL before clicking. Never download attachments from unsolicited messages about taxes.

For businesses, implementing strict verification protocols for financial and data requests—like a mandatory secondary approval channel—can stop BEC scams in their tracks. Remember, cybercriminals don’t take a break. They simply follow the calendar, and taxes remain one of their most reliable annual themes.

Continue Reading

CyberSecurity

European Commission Data Breach: Hackers Target Cloud Infrastructure

Published

on

European Commission Confirms Cloud Platform Breach

The European Commission has publicly confirmed a significant security incident. Hackers potentially accessed and exfiltrated data from the cloud infrastructure supporting its official Europa.eu platform.

The executive body stated it discovered the cyber-attack on March 24th. Immediate investigative and containment actions were launched. According to the Commission, its rapid response contained the incident and allowed for the implementation of risk mitigation measures. Crucially, this was done without causing downtime for the Europa websites.

“Early findings of our ongoing investigation suggest that data have been taken from those websites,” the Commission’s statement read. The body is now in the process of notifying other EU entities that may have been impacted. A full assessment of the breach’s scope is still underway.

ShinyHunters Claims Responsibility for Massive Data Theft

While the Commission’s statement was measured, claims from a notorious hacking group paint a more severe picture. The extortion group ShinyHunters posted screenshots on social media platform X, asserting responsibility for the breach.

The group claims to have compromised over 350 gigabytes of European Commission data. The alleged haul is extensive, including mail server dumps, databases, confidential documents, contracts, and other sensitive material. Separate screenshots appear to show the personally identifiable information (PII) of employees, a serious privacy violation.

Security researchers corroborate parts of this claim. Analysts at the International Cyber Digest reported that the hackers accessed emails, DKIM signing keys, internal administrative URLs, and data from platforms like NextCloud and the military financing mechanism Athena. A complete single sign-on (SSO) user directory may also have been stolen.

Understanding the Threat Actor: ShinyHunters’ Modus Operandi

Who is behind this attack? ShinyHunters is a prolific and active cybercriminal group with a roster of high-profile victims. Their recent campaigns have targeted major corporations like Google, Chanel, and Pandora, often focusing on stealing SSO credentials and Salesforce data.

The group frequently employs vishing, or voice phishing, as a primary tactic. In some operations, they impersonate corporate IT helpdesks. They call employees directly, tricking them into entering their login credentials on sophisticated phishing sites that perfectly mimic legitimate company portals. This human-centric attack method bypasses many technical security controls.

Potential Fallout and Security Implications

The exact method of intrusion into the Commission’s systems remains unclear, though unconfirmed reports point to its Amazon Web Services (AWS) infrastructure being the initial target. There is also social media chatter, yet to be verified, suggesting the EU’s cybersecurity agency, ENISA, might also be involved.

Security experts warn the repercussions could be severe. Nick Tausek, lead security automation architect at Swimlane, highlighted several risks. “This breach could open the door to identity risk, operational disruption, and secondary spear-phishing attacks,” he stated.

He also noted a concerning twist. “The attacker claiming they will not extort does not make it less serious, it just changes the playbook. A quiet leak can be just as damaging for trust, diplomacy, and ongoing investigations.” This scenario forces defenders into a complex juggling act of containment, digital forensics, and public communications, all while the full extent of the damage is still unknown.

The European Commission has assured the public that its core internal systems were not compromised. It pledged to continue monitoring, analyzing the incident, and using the findings to strengthen its cybersecurity posture. For now, the digital clean-up and investigation continue.

Continue Reading

Trending