• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

VirusTotal Data Leak Exposes Some Registered Customers’ Details

You are here: Home / Cyber Security News / VirusTotal Data Leak Exposes Some Registered Customers’ Details

Facts connected with a subset of registered clients of VirusTotal, including their names and email addresses, have leaked on the internet.

The security incident, which comprises a database of 5,600 names in a 313KB file, was initial disclosed by Der Spiegel and Der Conventional yesterday.

Introduced in 2004, VirusTotal is a preferred assistance that analyzes suspicious files and URLs to detect styles of malware and malicious articles employing antivirus engines and site scanners. It was obtained by Google in 2012 and turned a subsidiary of Google Cloud’s Chronicle device in 2018.

When achieved for comment, Google verified the leak and explained it took speedy ways to take out the information.

“We are conscious of the unintended distribution of a little section of buyer group administrator e-mail and business names by just one of our workers on the VirusTotal platform,” a Google Cloud spokesperson informed The Hacker Information.

Upcoming WEBINARShield Against Insider Threats: Master SaaS Security Posture Management

Nervous about insider threats? We have bought you covered! Sign up for this webinar to examine simple procedures and the secrets of proactive security with SaaS Security Posture Administration.

Join These days

“We eliminated the record from the system in an hour of its submitting and we are on the lookout at our inside procedures and technical controls to make improvements to our operations in the long run.”

Integrated amongst them are accounts connected to official U.S. bodies this sort of as the Cyber Command, Department of Justice, Federal Bureau of Investigation (FBI), and the Countrywide Security Agency (NSA). Other accounts belong to government organizations in Germany, the Netherlands, Taiwan, and the U.K.

Final 12 months, Germany’s Federal Place of work for Facts Security (BSI) warned in opposition to automating uploading of suspicious email attachments, noting that carrying out so could lead to the exposure of sensitive information and facts.

Observed this posting exciting? Observe us on Twitter  and LinkedIn to go through far more exceptional written content we write-up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Go Beyond the Headlines for Deeper Dives into the Cybercriminal Underground
Next Post: Pakistani Entities Targeted in Sophisticated Attack Deploying ShadowPad Malware »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers
  • ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files
  • ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
  • The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That

Copyright © 2025 · AllTech.News, All Rights Reserved.