Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers

Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers

Posted on December 22, 2025December 22, 2025 By CWS

Nissan Motor Company has publicly confirmed a big information breach stemming from unauthorized entry to Crimson Hat servers. Managed by a third-party contractor accountable for growing a buyer administration system.

The incident uncovered private data for roughly 21,000 Nissan Fukuoka Gross sales Co., Ltd. prospects. Crimson Hat, the contracted service supplier, detected the unauthorized server entry on September 26, 2025.

The corporate instantly revoked the attacker’s entry and applied countermeasures to stop additional intrusions.

21,000 Prospects Affected by Auto Information Breach

Nevertheless, notification to Nissan was delayed by per week. Crimson Hat knowledgeable Nissan Motor of the breach on October 3, 2025.

Prompting the automotive firm to report the incident to the Private Data Safety Fee on the identical day.

The leaked dataset contains buyer names, addresses, phone numbers, and partial e-mail addresses. Gross sales-related buyer data is utilized by Nissan’s vendor community.

Notably, the breach didn’t embrace bank card data or fee particulars, considerably limiting the chance of economic fraud. The affected buyer inhabitants contains people who bought autos or obtained service on the previously named Fukuoka Nissan Motor Co., Ltd…

It has since rebranded as Nissan Fukuoka Gross sales Co., Ltd. Nissan acknowledged it’s going to individually notify affected prospects and supply steering on protecting measures.

At present, no proof signifies that the compromised information has been exploited for fraudulent functions or offered on underground markets.

However, Nissan suggested prospects to stay vigilant towards suspicious communications, together with misleading cellphone calls or fraudulent correspondence.

The automotive producer confirmed that the Crimson Hat server atmosphere doesn’t comprise buyer information past the leaked dataset.

Eliminating issues about further breaches from the identical infrastructure. In response to the incident, Nissan Motor introduced it might strengthen oversight of contractors.

Improve data safety protocols throughout its operations. The corporate prolonged apologies to affected prospects and enterprise companions.

AI-Powered ISO 27001, SOC 2, NIST, NIS 2, and GDPR Compliance Guidelines => Begin for Free

Cyber Security News Tags:Access, Breach, Confirms, Data, Hat, Nissan, Red, Servers, Unauthorized

Post navigation

Previous Post: SideWinder APT Hackers Attacking Indian Entities by Masquerading as the Income Tax Department of India
Next Post: Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges

Related Posts

Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild Cyber Security News
Hackers Using ClickFix Technique to Attack Windows Machine and Execute Powershell Commands Hackers Using ClickFix Technique to Attack Windows Machine and Execute Powershell Commands Cyber Security News
Russian Vodka Producer Beluga Hit by Ransomware Attack Russian Vodka Producer Beluga Hit by Ransomware Attack Cyber Security News
Critical n8n Automation Platform Vulnerability Enables RCE Attacks Critical n8n Automation Platform Vulnerability Enables RCE Attacks Cyber Security News
Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations Cyber Security News
Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Target Linux Devices with Malware
  • China-Linked DKnife Framework Exploits Routers for Attacks
  • CISA Demands Removal of Outdated Network Devices
  • Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits
  • AI Exploitation: Emerging Threats in Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Target Linux Devices with Malware
  • China-Linked DKnife Framework Exploits Routers for Attacks
  • CISA Demands Removal of Outdated Network Devices
  • Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits
  • AI Exploitation: Emerging Threats in Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark