HomeCII/OTGoogle Cloud Storage Data Breach Linked to Shark Tank Participant

Google Cloud Storage Data Breach Linked to Shark Tank Participant

Published on

spot_img

Alice’s Table, a popular virtual floral arrangement platform, recently faced a major data breach due to a misconfigured Google Cloud Storage bucket. The breach exposed the personal data of over 83,000 customers, including sensitive information such as names, email addresses, home addresses, and order details.

Cybernews researchers discovered the exposed Google Cloud bucket during a routine investigation in April. The bucket contained tens of thousands of files, including personally identifiable information (PII) from both personal and corporate email accounts. This breach raises concerns about the security risks associated with business email addresses being used for phishing attacks and identity theft. Additionally, the exposure of home addresses puts individuals at risk of physical intrusions.

Misconfigured cloud storage buckets, like the one linked to Alice’s Table, are a common security risk that can lead to serious consequences such as data breaches and unauthorized data exfiltration. These misconfigurations often include publicly accessible buckets, incorrect permissions, missing encryption, and weak access controls. The wide prevalence of misconfigured buckets has been a significant concern, with studies showing millions of publicly accessible buckets containing sensitive data ranging from financial information to medical records.

Preventing misconfigured cloud storage buckets requires strong access controls, encryption of data at rest and in transit, regular security settings reviews, and the use of cloud security tools like Cyble’s CTI and Odin offerings. By implementing these best practices, organizations can reduce the risk of data breaches and protect sensitive information stored in cloud storage buckets.

As of now, neither Alice’s Table nor its parent company, 1-800-Flowers, have responded to requests for comment regarding the data breach. It is crucial for companies to prioritize data security and take proactive measures to prevent such incidents in the future.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...