Hackers leak Qantas data on 5 million customers after ransom deadline passes

Hacker NewsSaturday, October 11, 2025 at 1:27:42 PM
NegativeTechnology
In a concerning development, hackers have leaked sensitive data belonging to 5 million Qantas customers after the ransom deadline expired. This breach raises significant privacy and security concerns for those affected, as personal information could be misused. It highlights the ongoing threat of cyberattacks in the airline industry and the importance of robust data protection measures.
— Curated by the World Pulse Now AI Editorial System

Was this article worth reading? Share it

Recommended Readings
How malicious party invites target your inbox
NegativeTechnology
Cybercriminals are increasingly using fake invitation emails to deceive users into downloading malware, which can lead to the theft of personal information and sensitive data. This trend is concerning as it highlights the evolving tactics of cyber threats, making it crucial for individuals to be vigilant and cautious about unexpected emails. Understanding these tactics can help users protect themselves from potential attacks.
Europe's largest web hosting company abruptly pushes VPS prices up, blames cPanel, Plesk developers for the huge increase in license fees
NegativeTechnology
Ionos, Europe's largest web hosting company, has raised its VPS prices unexpectedly, attributing the hike to increased license fees from Plesk and cPanel. This sudden change has left many customers outraged, especially since it comes mid-contract and with little notice. Such abrupt price increases can disrupt businesses and lead to a loss of trust in service providers, highlighting the need for clearer communication and stability in pricing.
South Korean government learns it needs a backup the hard way - embarassing fail sees fire destroy over 850TB of data
NegativeTechnology
A recent fire has caused significant disruption in South Korea's government departments, destroying over 850TB of crucial data. This incident highlights the critical need for robust backup systems, as the lack of them has led to operational paralysis. It serves as a stark reminder for organizations everywhere about the importance of data protection and disaster recovery planning.
Hackers leak children’s data in major nursery breach
NegativeTechnology
In a troubling incident, the hacker group Radiant has breached the Kido nursery chain, compromising the personal data of 8,000 children. This breach not only raises serious concerns about data security but also highlights the alarming tactics used by hackers, who have reportedly contacted parents directly to intimidate them into paying a ransom. This situation underscores the urgent need for enhanced cybersecurity measures in institutions that handle sensitive information, especially those involving children.
Hackers leak children’s data in major nursery breach
NegativeTechnology
In a troubling incident, the hacker group Radiant has breached the Kido nursery chain, compromising the personal data of 8,000 children. This breach not only raises serious concerns about data security but also highlights the alarming tactics used by hackers, who have reportedly contacted parents directly to intimidate them into paying a ransom. This situation underscores the urgent need for enhanced cybersecurity measures in institutions that handle sensitive information, especially those involving children.
Google researchers say Oracle EBR hackers have hit dozens of organizations
NegativeTechnology
Recent findings by Google researchers reveal that Oracle EBR hackers have targeted numerous organizations, with attacks beginning much earlier than initially believed. This is concerning as it highlights the sophistication of multiple threat actors involved, raising alarms about the security of sensitive data across various sectors.
Google researchers say Oracle EBR hackers have hit dozens of organizations
NegativeTechnology
Recent findings by Google researchers reveal that Oracle EBR hackers have targeted numerous organizations, with attacks beginning much earlier than initially believed. This is concerning as it highlights the sophistication of multiple threat actors involved, raising alarms about the security of sensitive data across various sectors.
Hundreds of free VPN apps are not fit for purpose - but sadly, we can't tell you which are the naughty ones
NegativeTechnology
A recent report has highlighted significant privacy risks associated with numerous free VPN applications, revealing issues like outdated code and insecure data handling practices. This matters because many users rely on these services for online security, unaware of the potential dangers lurking within these apps. The findings raise concerns about user privacy and the effectiveness of free VPNs, prompting a call for greater transparency and security in the industry.
Discord says hackers stole government IDs of 70,000 users
NegativeTechnology
Discord has reported a significant data breach where hackers stole government IDs from 70,000 users. This incident highlights the growing concern over online security, especially as more platforms implement ID checks for age verification. As the demand for such verifications increases, users may face a higher risk of similar breaches in the future, raising questions about the safety of personal information online.
Discord says hackers stole government IDs of 70,000 users
NegativeTechnology
Discord has reported a significant data breach where hackers stole government IDs from 70,000 users. This incident highlights the growing concern over online security, especially as more platforms implement ID checks for age verification. As the demand for such verifications increases, users may face a higher risk of similar breaches in the future, raising questions about the safety of personal information online.
Fake VPN checker tool lets hackers bypass antivirus protections
NegativeTechnology
A new fake VPN checker tool is raising alarms in the cybersecurity community as it enables hackers to bypass antivirus protections. By combining cache smuggling techniques with identity theft and phishing, these cybercriminals are deploying malware more effectively than ever. This development is concerning because it highlights the evolving tactics used by hackers, making it crucial for individuals and organizations to stay vigilant and update their security measures.
Fake VPN checker tool lets hackers bypass antivirus protections
NegativeTechnology
A new fake VPN checker tool is raising alarms in the cybersecurity community as it enables hackers to bypass antivirus protections. By combining cache smuggling techniques with identity theft and phishing, these cybercriminals are deploying malware more effectively than ever. This development is concerning because it highlights the evolving tactics used by hackers, making it crucial for individuals and organizations to stay vigilant and update their security measures.
Latest from Technology
8-core AMD Ryzen Mini PC can power four 8K monitors, has two SSD slots, two Ethernet ports, and even a tiny LCD display - but will you trust a brand you've never heard of?
NeutralTechnology
The TexHoo ZHR mini PC is making waves with its impressive specs, including the ability to power four 8K monitors and featuring two SSD slots and Ethernet ports. While it promises high performance thanks to its AMD Ryzen processor, potential buyers might hesitate due to the brand's lack of recognition. This product could be a game-changer for those needing compact yet powerful computing solutions, but trust in the brand remains a significant factor.
Ask HN: Abandoned/dead projects you think died before their time and why?
NeutralTechnology
A recent discussion on Hacker News has sparked interest in abandoned or dead projects that many believe had potential but didn't succeed. Users are sharing their thoughts on why these projects failed, highlighting the importance of innovation and the challenges faced by creators. This conversation matters as it sheds light on the often-overlooked journeys of startups and projects, encouraging reflection on what could have been done differently.
Datastar response to allegations
NeutralTechnology
Datastar has issued a response to recent allegations that have surfaced, aiming to clarify its position and address concerns raised by the public. This response is significant as it reflects the company's commitment to transparency and accountability, which are crucial in maintaining trust with stakeholders.
ElementaryOS - The thoughtful, capable and ethical replacement for Windows/macOS
PositiveTechnology
ElementaryOS is gaining attention as a thoughtful and capable alternative to Windows and macOS. This operating system stands out for its ethical approach, prioritizing user privacy and a clean, intuitive interface. As more users seek alternatives that respect their data and provide a seamless experience, ElementaryOS could play a significant role in reshaping the landscape of personal computing.
Apple is winding down Clips, its forgotten video-editing app
NegativeTechnology
Apple's decision to wind down its Clips app, a video-editing tool that has seen little attention, highlights the company's shift in focus towards more popular services. This move may disappoint users who enjoyed the app's unique features, but it also reflects Apple's strategy to streamline its offerings and concentrate on more successful products. As the tech landscape evolves, companies must adapt, and this decision underscores the challenges of maintaining relevance in a competitive market.
Japan's summers have lengthened by 3 weeks over 42 years, say resaerchers
NeutralTechnology
Researchers have found that Japan's summers have lengthened by three weeks over the past 42 years, highlighting a significant shift in climate patterns. This change is important as it reflects broader global warming trends that could impact agriculture, health, and ecosystems in the region.