Found 4 bookmarks
Newest
Update on a Security Incident Involving Third-Party Customer Service
Update on a Security Incident Involving Third-Party Customer Service
discord.com Discord October 3, 2025 At Discord, protecting the privacy and security of our users is a top priority. That’s why it’s important to us that we’re transparent with them about events that impact their personal information. Discord recently discovered an incident where an unauthorized party compromised one of Discord’s third-party customer service providers. This incident impacted a limited number of users who had communicated with our Customer Support or Trust & Safety teams. This unauthorized party did not gain access to Discord directly. No messages or activities were accessed beyond what users may have discussed with Customer Support or Trust & Safety agents. We immediately revoked the customer support provider’s access to our ticketing system and continue to investigate this matter. We’re working closely with law enforcement to investigate this matter. We are in the process of emailing the users impacted. ‍ At Discord, protecting the privacy and security of our users is a top priority. That’s why it’s important to us that we’re transparent with them about events that impact their personal information. Recently, we discovered an incident where an unauthorized party compromised one of Discord’s third-party customer service providers. The unauthorized party then gained access to information from a limited number of users who had contacted Discord through our Customer Support and/or Trust & Safety teams. As soon as we became aware of this attack, we took immediate steps to address the situation. This included revoking the customer support provider’s access to our ticketing system, launching an internal investigation, engaging a leading computer forensics firm to support our investigation and remediation efforts, and engaging law enforcement. We are in the process of contacting impacted users. If you were impacted, you will receive an email from noreply@discord.com. We will not contact you about this incident via phone – official Discord communications channels are limited to emails from noreply@discord.com. What happened? An unauthorized party targeted our third-party customer support services to access user data, with a view to extort a financial ransom from Discord. What data was involved? The data that may have been impacted was related to our customer service system. This may include: Name, Discord username, email and other contact details if provided to Discord customer support Limited billing information such as payment type, the last four digits of your credit card, and purchase history if associated with your account IP addresses Messages with our customer service agents Limited corporate data (training materials, internal presentations) The unauthorized party also gained access to a small number of government‑ID images (e.g., driver’s license, passport) from users who had appealed an age determination. If your ID may have been accessed, that will be specified in the email you receive. What data was not involved? Full credit card numbers or CCV codes Messages or activity on Discord beyond what users may have discussed with customer support Passwords or authentication data What are we doing about this? Discord has and will continue to take all appropriate steps in response to this situation. As standard, we will continue to frequently audit our third-party systems to ensure they meet our security and privacy standards. In addition, we have: Notified relevant data protection authorities. Proactively engaged with law enforcement to investigate this attack. Reviewed our threat detection systems and security controls for third-party support providers. Taking next steps Looking ahead, we recommend impacted users stay alert when receiving messages or other communication that may seem suspicious. We have service agents on hand to answer questions and provide additional support. We take our responsibility to protect your personal data seriously and understand the inconvenience and concern this may cause.
·discord.com·
Update on a Security Incident Involving Third-Party Customer Service
Security update: Incident related to Red Hat Consulting GitLab instance
Security update: Incident related to Red Hat Consulting GitLab instance
We are writing to provide an update regarding a security incident related to a specific GitLab environment used by our Red Hat Consulting team. Red Hat takes the security and integrity of our systems and the data entrusted to us extremely seriously, and we are addressing this issue with the highest priority. What happened We recently detected unauthorized access to a GitLab instance used for internal Red Hat Consulting collaboration in select engagements. Upon detection, we promptly launched a thorough investigation, removed the unauthorized party’s access, isolated the instance, and contacted the appropriate authorities. Our investigation, which is ongoing, found that an unauthorized third party had accessed and copied some data from this instance. We have now implemented additional hardening measures designed to help prevent further access and contain the issue. Scope and impact on customers We understand you may have questions about whether this incident affects you. Based on our investigation to date, we can share: Impact on Red Hat products and supply chain: At this time, we have no reason to believe this security issue impacts any of our other Red Hat services or products, including our software supply chain or downloading Red Hat software from official channels. Consulting customers: If you are a Red Hat Consulting customer, our analysis is ongoing. The compromised GitLab instance housed consulting engagement data, which may include, for example, Red Hat’s project specifications, example code snippets, and internal communications about consulting services. This GitLab instance typically does not house sensitive personal data. While our analysis remains ongoing, we have not identified sensitive personal data within the impacted data at this time. We will notify you directly if we believe you have been impacted. Other customers: If you are not a Red Hat Consulting customer, there is currently no evidence that you have been affected by this incident. For clarity, this incident is unrelated to a Red Hat OpenShift AI vulnerability (CVE-2025-10725) that was announced yesterday. Our next steps We are engaging directly with any customers who may be impacted. Thank you for your continued trust in Red Hat. We appreciate your patience as we continue our investigation.
·redhat.com·
Security update: Incident related to Red Hat Consulting GitLab instance
Levi Strauss notifies customers of cyberattack
Levi Strauss notifies customers of cyberattack
Personal information, including partial payment details, may have been obtained by bad actors during an automated credential-stuffing attack on Levi’s online store. The maker of the famous Levi’s denim jeans reported that over 72,000 accounts were affected during a “security incident” that was detected on July 13th.
·cybernews.com·
Levi Strauss notifies customers of cyberattack