[{"id":"881","link":"https:\/\/cyphtrex.com\/2025\/10\/26\/tiffany-co-data-breach-why-vendor-security-cant-be-overlooked\/","name":"tiffany-co-data-breach-why-vendor-security-cant-be-overlooked","thumbnail":{"url":"https:\/\/i0.wp.com\/cyphtrex.com\/wp-content\/uploads\/2025\/10\/1758301440819.jpeg?fit=1280%2C720&ssl=1","alt":""},"title":"Tiffany & Co. Data Breach: Why Vendor Security Can\u2019t Be Overlooked","author":{"name":"Chaman Gautam","link":"https:\/\/cyphtrex.com\/author\/chamangautam123\/"},"date":"Oct 26, 2025","dateGMT":"2025-10-26 13:21:16","modifiedDate":"2025-12-26 18:56:32","modifiedDateGMT":"2025-12-26 13:26:32","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/cyphtrex.com\/category\/data-breach\/\" rel=\"category tag\">Data Breach<\/a>","space":"<a href=\"https:\/\/cyphtrex.com\/category\/data-breach\/\" rel=\"category tag\">Data Breach<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyphtrex.com\/tag\/customer-data-security\/' rel='post_tag'>customer data security<\/a><a href='https:\/\/cyphtrex.com\/tag\/cybersecurity\/' rel='post_tag'>cybersecurity<\/a><a href='https:\/\/cyphtrex.com\/tag\/data-breach\/' rel='post_tag'>data breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/data-protection\/' rel='post_tag'>data protection<\/a><a href='https:\/\/cyphtrex.com\/tag\/incident-response\/' rel='post_tag'>incident response<\/a><a href='https:\/\/cyphtrex.com\/tag\/risk-management\/' rel='post_tag'>risk management<\/a><a href='https:\/\/cyphtrex.com\/tag\/supply-chain-security\/' rel='post_tag'>supply chain security<\/a><a href='https:\/\/cyphtrex.com\/tag\/third-party-risk\/' rel='post_tag'>third-party risk<\/a><a href='https:\/\/cyphtrex.com\/tag\/tiffany-and-co-data-breach\/' rel='post_tag'>Tiffany and Co data breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/vendor-security\/' rel='post_tag'>vendor security<\/a>"},"readTime":{"min":0,"sec":53},"status":"publish","content":"Tiffany & Co. has confirmed a customer data breach that\u2019s now under active investigation. The incident\u2014traced back to a compromise in May 2025\u2014has exposed customers\u2019"},{"id":"877","link":"https:\/\/cyphtrex.com\/2025\/10\/26\/%f0%9f%9a%a8-medusa-ransomware-targets-comcast-834-gb-of-data-at-risk\/","name":"-medusa-ransomware-targets-comcast-834-gb-of-data-at-risk","thumbnail":{"url":"https:\/\/i0.wp.com\/cyphtrex.com\/wp-content\/uploads\/2025\/10\/1759224604458-3.jpeg?fit=775%2C435&ssl=1","alt":""},"title":"\ud83d\udea8 Medusa Ransomware Targets Comcast: 834 GB of Data at Risk","author":{"name":"Chaman Gautam","link":"https:\/\/cyphtrex.com\/author\/chamangautam123\/"},"date":"Oct 26, 2025","dateGMT":"2025-10-26 13:19:58","modifiedDate":"2025-12-26 18:57:06","modifiedDateGMT":"2025-12-26 13:27:06","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/cyphtrex.com\/category\/malware\/\" rel=\"category tag\">Malware<\/a>","space":"<a href=\"https:\/\/cyphtrex.com\/category\/malware\/\" rel=\"category tag\">Malware<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyphtrex.com\/tag\/comcast-data-breach\/' rel='post_tag'>Comcast data breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/customer-data-at-risk\/' rel='post_tag'>customer data at risk<\/a><a href='https:\/\/cyphtrex.com\/tag\/cyber-risk\/' rel='post_tag'>cyber risk<\/a><a href='https:\/\/cyphtrex.com\/tag\/cybersecurity\/' rel='post_tag'>cybersecurity<\/a><a href='https:\/\/cyphtrex.com\/tag\/data-breach\/' rel='post_tag'>data breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/data-leak\/' rel='post_tag'>data leak<\/a><a href='https:\/\/cyphtrex.com\/tag\/data-protection\/' rel='post_tag'>data protection<\/a><a href='https:\/\/cyphtrex.com\/tag\/incident-response\/' rel='post_tag'>incident response<\/a><a href='https:\/\/cyphtrex.com\/tag\/medusa-ransomware\/' rel='post_tag'>Medusa ransomware<\/a><a href='https:\/\/cyphtrex.com\/tag\/medusa-ransomware-attack\/' rel='post_tag'>Medusa ransomware attack<\/a><a href='https:\/\/cyphtrex.com\/tag\/network-security\/' rel='post_tag'>network security<\/a><a href='https:\/\/cyphtrex.com\/tag\/ransomware-attack\/' rel='post_tag'>ransomware attack<\/a><a href='https:\/\/cyphtrex.com\/tag\/ransomware-threats\/' rel='post_tag'>ransomware threats<\/a>"},"readTime":{"min":1,"sec":24},"status":"publish","content":" The cybersecurity world was shaken this week as the Medusa ransomware group claimed responsibility for a massive data breach at Comcast Corporation. According to"},{"id":"874","link":"https:\/\/cyphtrex.com\/2025\/10\/26\/%f0%9f%9a%a8-westjet-data-breach-1-2-million-passengers-affected-%f0%9f%9a%a8\/","name":"-westjet-data-breach-1-2-million-passengers-affected-","thumbnail":{"url":"https:\/\/i0.wp.com\/cyphtrex.com\/wp-content\/uploads\/2025\/10\/1759337128707.png?fit=1024%2C576&ssl=1","alt":""},"title":"\ud83d\udea8 WestJet Data Breach: 1.2 Million Passengers Affected \ud83d\udea8","author":{"name":"Chaman Gautam","link":"https:\/\/cyphtrex.com\/author\/chamangautam123\/"},"date":"Oct 26, 2025","dateGMT":"2025-10-26 13:18:44","modifiedDate":"2025-12-26 18:57:33","modifiedDateGMT":"2025-12-26 13:27:33","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/cyphtrex.com\/category\/data-breach\/\" rel=\"category tag\">Data Breach<\/a>","space":"<a href=\"https:\/\/cyphtrex.com\/category\/data-breach\/\" rel=\"category tag\">Data Breach<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyphtrex.com\/tag\/airline-data-breach\/' rel='post_tag'>airline data breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/aviation-cybersecurity\/' rel='post_tag'>aviation cybersecurity<\/a><a href='https:\/\/cyphtrex.com\/tag\/customer-data-exposure\/' rel='post_tag'>customer data exposure<\/a><a href='https:\/\/cyphtrex.com\/tag\/cyber-attack\/' rel='post_tag'>cyber attack<\/a><a href='https:\/\/cyphtrex.com\/tag\/cybersecurity\/' rel='post_tag'>cybersecurity<\/a><a href='https:\/\/cyphtrex.com\/tag\/data-breach-incident\/' rel='post_tag'>data breach incident<\/a><a href='https:\/\/cyphtrex.com\/tag\/data-protection\/' rel='post_tag'>data protection<\/a><a href='https:\/\/cyphtrex.com\/tag\/incident-response\/' rel='post_tag'>incident response<\/a><a href='https:\/\/cyphtrex.com\/tag\/passenger-data-breach\/' rel='post_tag'>passenger data breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/privacy-breach\/' rel='post_tag'>privacy breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/risk-management\/' rel='post_tag'>risk management<\/a><a href='https:\/\/cyphtrex.com\/tag\/westjet-data-breach\/' rel='post_tag'>WestJet data breach<\/a>"},"readTime":{"min":0,"sec":57},"status":"publish","content":" Canadian airline WestJet has confirmed a massive cybersecurity incident impacting more than 1.2 million passengers. The exposed data reportedly includes names, dates of birth,"},{"id":"871","link":"https:\/\/cyphtrex.com\/2025\/10\/26\/%f0%9f%8e%af-kido-preschool-data-breach-childrens-information-leaked-and-deleted-by-hackers\/","name":"-kido-preschool-data-breach-childrens-information-leaked-and-deleted-by-hackers","thumbnail":{"url":"https:\/\/i0.wp.com\/cyphtrex.com\/wp-content\/uploads\/2025\/10\/1759412359807.png?fit=1240%2C697&ssl=1","alt":""},"title":"\ud83c\udfaf Kido Preschool Data Breach: Children\u2019s Information Leaked and Deleted by Hackers","author":{"name":"Chaman Gautam","link":"https:\/\/cyphtrex.com\/author\/chamangautam123\/"},"date":"Oct 26, 2025","dateGMT":"2025-10-26 13:17:34","modifiedDate":"2025-12-26 18:58:16","modifiedDateGMT":"2025-12-26 13:28:16","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/cyphtrex.com\/category\/data-breach\/\" rel=\"category tag\">Data Breach<\/a>","space":"<a href=\"https:\/\/cyphtrex.com\/category\/data-breach\/\" rel=\"category tag\">Data Breach<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyphtrex.com\/tag\/children-data-breach\/' rel='post_tag'>children data breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/cybersecurity\/' rel='post_tag'>cybersecurity<\/a><a href='https:\/\/cyphtrex.com\/tag\/data-deletion-by-hackers\/' rel='post_tag'>data deletion by hackers<\/a><a href='https:\/\/cyphtrex.com\/tag\/data-protection\/' rel='post_tag'>data protection<\/a><a href='https:\/\/cyphtrex.com\/tag\/early-education-cybersecurity\/' rel='post_tag'>early education cybersecurity<\/a><a href='https:\/\/cyphtrex.com\/tag\/education-data-breach\/' rel='post_tag'>education data breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/incident-response\/' rel='post_tag'>incident response<\/a><a href='https:\/\/cyphtrex.com\/tag\/kido-preschool-data-breach\/' rel='post_tag'>Kido Preschool data breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/personal-data-leak\/' rel='post_tag'>personal data leak<\/a><a href='https:\/\/cyphtrex.com\/tag\/privacy-breach\/' rel='post_tag'>privacy breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/school-cybersecurity\/' rel='post_tag'>school cybersecurity<\/a><a href='https:\/\/cyphtrex.com\/tag\/student-data-privacy\/' rel='post_tag'>student data privacy<\/a>"},"readTime":{"min":1,"sec":39},"status":"publish","content":"The global education sector has become the latest victim of cybercrime. Kido Preschool, an international network of early learning centers, has suffered a major data"},{"id":"867","link":"https:\/\/cyphtrex.com\/2025\/10\/26\/vulnerability-assessment-what-it-is-how-to-perform-one\/","name":"vulnerability-assessment-what-it-is-how-to-perform-one","thumbnail":{"url":"https:\/\/i0.wp.com\/cyphtrex.com\/wp-content\/uploads\/2025\/10\/65df730113e16b7248bf58fc_Vulnerability-Management-Cycle.png?fit=776%2C628&ssl=1","alt":""},"title":"Vulnerability Assessment: What it is & How to Perform One","author":{"name":"Chaman Gautam","link":"https:\/\/cyphtrex.com\/author\/chamangautam123\/"},"date":"Oct 26, 2025","dateGMT":"2025-10-26 13:15:52","modifiedDate":"2025-12-28 20:16:39","modifiedDateGMT":"2025-12-28 14:46:39","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/cyphtrex.com\/category\/web-application\/\" rel=\"category tag\">Web Application<\/a>","space":"<a href=\"https:\/\/cyphtrex.com\/category\/web-application\/\" rel=\"category tag\">Web Application<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyphtrex.com\/tag\/application-security-testing\/' rel='post_tag'>application security testing<\/a><a href='https:\/\/cyphtrex.com\/tag\/cyber-risk-assessment\/' rel='post_tag'>cyber risk assessment<\/a><a href='https:\/\/cyphtrex.com\/tag\/cybersecurity-assessment\/' rel='post_tag'>cybersecurity assessment<\/a><a href='https:\/\/cyphtrex.com\/tag\/identify-security-vulnerabilities\/' rel='post_tag'>identify security vulnerabilities<\/a><a href='https:\/\/cyphtrex.com\/tag\/network-security-assessment\/' rel='post_tag'>network security assessment<\/a><a href='https:\/\/cyphtrex.com\/tag\/penetration-testing\/' rel='post_tag'>penetration testing<\/a><a href='https:\/\/cyphtrex.com\/tag\/risk-assessment\/' rel='post_tag'>risk assessment<\/a><a href='https:\/\/cyphtrex.com\/tag\/security-assessment-process\/' rel='post_tag'>security assessment process<\/a><a href='https:\/\/cyphtrex.com\/tag\/security-vulnerability-assessment\/' rel='post_tag'>security vulnerability assessment<\/a><a href='https:\/\/cyphtrex.com\/tag\/vulnerability-assessment\/' rel='post_tag'>vulnerability assessment<\/a><a href='https:\/\/cyphtrex.com\/tag\/vulnerability-management\/' rel='post_tag'>vulnerability management<\/a><a href='https:\/\/cyphtrex.com\/tag\/vulnerability-scanning\/' rel='post_tag'>vulnerability scanning<\/a>"},"readTime":{"min":3,"sec":28},"status":"publish","content":"A comprehensive guide to Vulnerability Assessment (VA) \u2014 learn what it is, why it matters, how to perform one, and which tools and methods strengthen"},{"id":"864","link":"https:\/\/cyphtrex.com\/2025\/10\/26\/subscribed-%f0%9f%9a%a8-discord-data-breach-a-lesson-in-vendor-security-transparency\/","name":"subscribed--discord-data-breach-a-lesson-in-vendor-security-transparency","thumbnail":{"url":"https:\/\/i0.wp.com\/cyphtrex.com\/wp-content\/uploads\/2025\/10\/1760516970958.jpeg?fit=1279%2C720&ssl=1","alt":""},"title":"Subscribed \ud83d\udea8 Discord Data Breach: A Lesson in Vendor Security & Transparency","author":{"name":"Chaman Gautam","link":"https:\/\/cyphtrex.com\/author\/chamangautam123\/"},"date":"Oct 26, 2025","dateGMT":"2025-10-26 13:12:31","modifiedDate":"2025-12-26 18:59:03","modifiedDateGMT":"2025-12-26 13:29:03","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/cyphtrex.com\/category\/data-breach\/\" rel=\"category tag\">Data Breach<\/a>","space":"<a href=\"https:\/\/cyphtrex.com\/category\/data-breach\/\" rel=\"category tag\">Data Breach<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyphtrex.com\/tag\/customer-data-exposure\/' rel='post_tag'>customer data exposure<\/a><a href='https:\/\/cyphtrex.com\/tag\/cybersecurity-best-practices\/' rel='post_tag'>cybersecurity best practices<\/a><a href='https:\/\/cyphtrex.com\/tag\/cybersecurity-incident\/' rel='post_tag'>cybersecurity incident<\/a><a href='https:\/\/cyphtrex.com\/tag\/data-breach\/' rel='post_tag'>data breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/data-protection\/' rel='post_tag'>data protection<\/a><a href='https:\/\/cyphtrex.com\/tag\/discord-data-breach\/' rel='post_tag'>Discord data breach<\/a><a href='https:\/\/cyphtrex.com\/tag\/incident-response\/' rel='post_tag'>incident response<\/a><a href='https:\/\/cyphtrex.com\/tag\/risk-management\/' rel='post_tag'>risk management<\/a><a href='https:\/\/cyphtrex.com\/tag\/supply-chain-security\/' rel='post_tag'>supply chain security<\/a><a href='https:\/\/cyphtrex.com\/tag\/third-party-risk\/' rel='post_tag'>third-party risk<\/a><a href='https:\/\/cyphtrex.com\/tag\/transparency-in-cybersecurity\/' rel='post_tag'>transparency in cybersecurity<\/a><a href='https:\/\/cyphtrex.com\/tag\/vendor-security\/' rel='post_tag'>vendor security<\/a>"},"readTime":{"min":1,"sec":19},"status":"publish","content":"Recently, Discord faced backlash after a reported data breach involving the exposure of nearly 70,000 users\u2019 government ID photos. Initially, the company attributed the incident"}]