Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Adidas Probes Possible Third-Party Data Breach

Adidas Probes Possible Third-Party Data Breach

Posted on February 19, 2026 By CWS

Adidas is currently investigating claims of a potential data breach involving one of its third-party partners. The breach was reported on February 16, 2026, when a group known as ‘LAPSUS-GROUP’ asserted on BreachForums that they had accessed the sportswear giant’s extranet portal without authorization.

Details of the Alleged Breach

The group, believed to be linked to the Scattered Lapsus$ Hunters, is notorious for using social engineering tactics. They claim to have extracted roughly 815,000 rows of data from the Adidas Extranet, a secure portal designed for interactions with business partners, suppliers, and retailers.

According to the threat actors, the compromised data includes names, email addresses, passwords, birthdays, and company details, alongside extensive technical data. They further suggested that more disclosures are imminent and alleged possession of around 420GB of data related to the French market.

Adidas’ Response and Investigation

An Adidas spokesperson informed The Register about the potential data protection issue, linked to an independent licensing partner dealing with martial arts products. Adidas emphasized that this partner operates its own IT systems, and there is no indication that Adidas’ own IT infrastructure, e-commerce platforms, or consumer data have been affected.

This incident follows another third-party breach in May 2025, where an unauthorized party accessed a customer service provider used by Adidas, compromising contact details of customers who had reached out to their helpdesk. No passwords or financial data were involved in that breach.

Security Implications and Recommendations

The repeated incidents highlight vulnerabilities in supply chain security and vendor access management for Adidas. Security experts advise companies to implement strict least-privilege access, require multi-factor authentication for third-party interactions, and conduct regular audits of partner-facing portals to mitigate risks associated with extranet vulnerabilities.

Adidas has not provided details on the timing or scope of the latest breach, and the investigation is ongoing. The company continues to assess the situation to ensure data security and minimize future risks.

Stay updated with the latest cybersecurity news by following us on Google News, LinkedIn, and X. Reach out to feature your stories.

Cyber Security News Tags:Adidas, Cybersecurity, data breach, extranet portal, IT systems, LAPSUS-GROUP, Scattered LAPSUS$ Hunters, supply chain security, third-party security, vendor access management

Post navigation

Previous Post: Link11 Unveils AI Management Dashboard for Enhanced Traffic Control
Next Post: New Android Malware Uses AI for Persistent Threats

Related Posts

Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen  Million from Victims Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims Cyber Security News
DoJ Seizes .8 Million in Crypto From Zeppelin Ransomware Operators DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators Cyber Security News
20 Best SNMP Monitoring Tools in 2025 20 Best SNMP Monitoring Tools in 2025 Cyber Security News
Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums Cyber Security News
Smart Electric Vehicles Face Hidden Cyber Vulnerabilities Exposing Drivers to Risks Smart Electric Vehicles Face Hidden Cyber Vulnerabilities Exposing Drivers to Risks Cyber Security News
Threat Actors Leveraging Foxit PDF Reader to Gain System Control and Steal Sensitive Data Threat Actors Leveraging Foxit PDF Reader to Gain System Control and Steal Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaws in Apache Traffic Server Demand Immediate Updates
  • Node.js Maintainers Targeted by North Korean Hackers
  • LiteLLM Attack Exploits Developer Machines for Credentials
  • Google Awards $17M Through Bug Bounty Program in 2025
  • Strapi Ecosystem Hit by Malicious NPM Package Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaws in Apache Traffic Server Demand Immediate Updates
  • Node.js Maintainers Targeted by North Korean Hackers
  • LiteLLM Attack Exploits Developer Machines for Credentials
  • Google Awards $17M Through Bug Bounty Program in 2025
  • Strapi Ecosystem Hit by Malicious NPM Package Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark