Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers

Posted on December 22, 2025December 22, 2025 By CWS

Nissan Motor Company has publicly confirmed a big information breach stemming from unauthorized entry to Crimson Hat servers. Managed by a third-party contractor accountable for growing a buyer administration system.

The incident uncovered private data for roughly 21,000 Nissan Fukuoka Gross sales Co., Ltd. prospects. Crimson Hat, the contracted service supplier, detected the unauthorized server entry on September 26, 2025.

The corporate instantly revoked the attacker’s entry and applied countermeasures to stop additional intrusions.

21,000 Prospects Affected by Auto Information Breach

Nevertheless, notification to Nissan was delayed by per week. Crimson Hat knowledgeable Nissan Motor of the breach on October 3, 2025.

Prompting the automotive firm to report the incident to the Private Data Safety Fee on the identical day.

The leaked dataset contains buyer names, addresses, phone numbers, and partial e-mail addresses. Gross sales-related buyer data is utilized by Nissan’s vendor community.

Notably, the breach didn’t embrace bank card data or fee particulars, considerably limiting the chance of economic fraud. The affected buyer inhabitants contains people who bought autos or obtained service on the previously named Fukuoka Nissan Motor Co., Ltd…

It has since rebranded as Nissan Fukuoka Gross sales Co., Ltd. Nissan acknowledged it’s going to individually notify affected prospects and supply steering on protecting measures.

At present, no proof signifies that the compromised information has been exploited for fraudulent functions or offered on underground markets.

However, Nissan suggested prospects to stay vigilant towards suspicious communications, together with misleading cellphone calls or fraudulent correspondence.

The automotive producer confirmed that the Crimson Hat server atmosphere doesn’t comprise buyer information past the leaked dataset.

Eliminating issues about further breaches from the identical infrastructure. In response to the incident, Nissan Motor introduced it might strengthen oversight of contractors.

Improve data safety protocols throughout its operations. The corporate prolonged apologies to affected prospects and enterprise companions.

AI-Powered ISO 27001, SOC 2, NIST, NIS 2, and GDPR Compliance Guidelines => Begin for Free

Cyber Security News Tags:Access, Breach, Confirms, Data, Hat, Nissan, Red, Servers, Unauthorized

Post navigation

Previous Post: SideWinder APT Hackers Attacking Indian Entities by Masquerading as the Income Tax Department of India
Next Post: Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges

Related Posts

Lessons Learned from Massive npm Supply Chain Attack Using “Shai-Hulud” Self-Replicating Malware Cyber Security News
Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times Cyber Security News
FBI Warns of Fake Internet Crime Complaint Center (IC3) Website Used for Phishing Attacks Cyber Security News
Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials Cyber Security News
New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data Cyber Security News
29.7 Tbps DDoS Attack Via Aisuru botnet Breaks Internet With New World Record Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
  • BlindEagle Hackers Attacking Government Agencies with Powershell Scripts
  • PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation
  • Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges
  • Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
  • BlindEagle Hackers Attacking Government Agencies with Powershell Scripts
  • PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation
  • Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges
  • Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark