Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Employee Risk. Show all posts

Automobile Giant Jaguar Land Rover Allegedly Suffers Major Data Breach

 

Jaguar Land Rover (JLR), the well-known luxury car company, is reported to be the latest victim of a cybersecurity breach. A threat actor known as "Rey" has publicly disclosed critical company records and personnel data on the infamous hacking forum BreachForums. 

According to the reports, approximately 700 internal Jaguar Land Rover documents were made public as a result of the data breach, which is believed to have taken place around March 2025. Critical development logs, tracking information, and proprietary source codes are among the leaked documents. 

Such materials are highly sensitive and could jeopardise the company's competitive advantage by supplying rivals or malicious actors with information about JLR's operational and strategic plans. 

In addition to internal company records, a large personnel dataset has been compromised. This dataset contains private data such as usernames, email addresses, display names, and time zone data. The disclosure of personal information puts impacted employees at risk of identity theft, phishing schemes, and other targeted cyberattacks.

An anonymous threat actor known as "Rey" exposed the vulnerability on BreachForums. Rey made the hacked data available for download to cybercriminals and possible competitors, compounding the potential harm to JLR and its employees, security researchers stated. 

For Jaguar Land Rover, this security issue may have far-reaching effects. Competitors may learn about the company's future plans, proprietary technologies, and strategic operations if confidential internal documents are made public. In the fiercely competitive automotive sector, this can result in a major competitive disadvantage. 

The personnel dataset that was exposed also presents serious risks to organisational and individual security. Employees whose data was compromised need to be on the lookout for signs of fraud and targeted phishing attacks, among other cyberthreats. 

Mitigation tips 

Jaguar Land Rover has not yet commented on the data breach. It remains to be seen how the company will handle this issue and what steps it will take to minimise the damage. An internal investigation is anticipated to be initiated to investigate the scope of the breach and any flaws in the organization's security systems. 

The organisation should perform a thorough internal investigation to discover vulnerabilities and upgrade its cybersecurity infrastructure. Affected personnel should change their passwords, enable two-factor authentication, and be wary of unsolicited communications, especially suspicious emails or messages.

Employee Use of 'Shadow IT' Elevates Cyber Attack Risks for Indian Firms

 

In India, a recent report indicates that approximately 89% of companies faced cyber incidents within the past two years. Alarmingly, 20% of these breaches were attributed to the utilization of shadow IT, as per findings from a study.

This surge in cyber threats is significantly linked to the adoption of shadow IT by employees, a trend catalyzed by the shift towards remote work setups, states a study conducted by Kaspersky, a cybersecurity firm.

Globally, over the last two years, 11% of companies experienced cyber incidents due to the unauthorized use of shadow IT by their workforce.

Shadow IT refers to the section of a company’s IT structure that operates outside the oversight of IT and Information Security departments. This includes applications, devices, and public cloud services used without compliance to information security protocols.

Alexey Vovk, Head of Information Security at Kaspersky, highlighted that employees using unapproved IT resources often assume that reputable providers guarantee safety. However, these third-party providers outline a 'shared responsibility model' in their terms, indicating that users must conduct regular software updates and take accountability for related incidents, including corporate data breaches.

Effectively managing shadow IT remains a critical need for businesses. Mishandling or operating outside IT protocols can lead to severe repercussions. The Kaspersky study noted that the IT industry bore the brunt, accounting for 16% of cyber incidents resulting from unauthorized shadow IT use between 2022 and 2023.

Additionally, critical infrastructure, transport, and logistics sectors were affected, with 13% of reported attacks attributed to this issue, as per the report's findings.