Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers

Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers

Posted on December 22, 2025December 22, 2025 By CWS

Nissan Motor Company has publicly confirmed a big information breach stemming from unauthorized entry to Crimson Hat servers. Managed by a third-party contractor accountable for growing a buyer administration system.

The incident uncovered private data for roughly 21,000 Nissan Fukuoka Gross sales Co., Ltd. prospects. Crimson Hat, the contracted service supplier, detected the unauthorized server entry on September 26, 2025.

The corporate instantly revoked the attacker’s entry and applied countermeasures to stop additional intrusions.

21,000 Prospects Affected by Auto Information Breach

Nevertheless, notification to Nissan was delayed by per week. Crimson Hat knowledgeable Nissan Motor of the breach on October 3, 2025.

Prompting the automotive firm to report the incident to the Private Data Safety Fee on the identical day.

The leaked dataset contains buyer names, addresses, phone numbers, and partial e-mail addresses. Gross sales-related buyer data is utilized by Nissan’s vendor community.

Notably, the breach didn’t embrace bank card data or fee particulars, considerably limiting the chance of economic fraud. The affected buyer inhabitants contains people who bought autos or obtained service on the previously named Fukuoka Nissan Motor Co., Ltd…

It has since rebranded as Nissan Fukuoka Gross sales Co., Ltd. Nissan acknowledged it’s going to individually notify affected prospects and supply steering on protecting measures.

At present, no proof signifies that the compromised information has been exploited for fraudulent functions or offered on underground markets.

However, Nissan suggested prospects to stay vigilant towards suspicious communications, together with misleading cellphone calls or fraudulent correspondence.

The automotive producer confirmed that the Crimson Hat server atmosphere doesn’t comprise buyer information past the leaked dataset.

Eliminating issues about further breaches from the identical infrastructure. In response to the incident, Nissan Motor introduced it might strengthen oversight of contractors.

Improve data safety protocols throughout its operations. The corporate prolonged apologies to affected prospects and enterprise companions.

AI-Powered ISO 27001, SOC 2, NIST, NIS 2, and GDPR Compliance Guidelines => Begin for Free

Cyber Security News Tags:Access, Breach, Confirms, Data, Hat, Nissan, Red, Servers, Unauthorized

Post navigation

Previous Post: SideWinder APT Hackers Attacking Indian Entities by Masquerading as the Income Tax Department of India
Next Post: Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges

Related Posts

SoupDealer Malware Bypasses Every Sandbox, AV’s and EDR/XDR in Real-World Incidents SoupDealer Malware Bypasses Every Sandbox, AV’s and EDR/XDR in Real-World Incidents Cyber Security News
RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases Cyber Security News
Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner Cyber Security News
Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges Cyber Security News
Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency Cyber Security News
Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RenEngine Loader Bypasses Security with Multi-Stage Attack
  • China-Linked Hackers Target Linux Devices with Malware
  • China-Linked DKnife Framework Exploits Routers for Attacks
  • CISA Demands Removal of Outdated Network Devices
  • Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RenEngine Loader Bypasses Security with Multi-Stage Attack
  • China-Linked Hackers Target Linux Devices with Malware
  • China-Linked DKnife Framework Exploits Routers for Attacks
  • CISA Demands Removal of Outdated Network Devices
  • Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark