Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NordVPN Denies Breach After Hacker Leaks Data

NordVPN Denies Breach After Hacker Leaks Data

Posted on January 6, 2026January 6, 2026 By CWS

VPN firm NordVPN has denied struggling a breach after a risk actor leaked information allegedly stolen from its programs.

The hacker claimed on January 4 on the BreachForums cybercrime discussion board that that they had obtained supply code from a “NordVPN growth server”.

“This data was acquired by bruteforcing a misconfigured server of NordVPN, which has Salesforce and Jira data saved,” the hacker stated.

The attacker publicly launched some pattern information and made all the knowledge out there for obtain to the cybercrime discussion board’s premium customers. 

NordVPN responded to the claims on January 5, saying that whereas its probe is ongoing, an preliminary forensic evaluation has not discovered any proof of its servers or inner manufacturing infrastructure being compromised.

As well as, NordVPN clarified that the leaked information doesn’t originate from its Salesforce surroundings or another inner system. As a substitute, it seems to come back from a third-party automated testing platform that the corporate evaluated six months in the past. 

The VPN agency stated it ended up selecting the companies of a unique vendor, however throughout the trial interval it did create a brief surroundings to check the platform’s performance. 

Nonetheless, the take a look at surroundings was by no means linked to its manufacturing programs, and no actual buyer information, supply code, or credentials had been ever uploaded.

“The claims that our inner Salesforce growth servers had been breached are false. The leaked parts, akin to the precise API tables and database schemas can solely be artifacts of an remoted third-party take a look at surroundings, containing solely dummy information used for performance checks,” NordVPN stated. Commercial. Scroll to proceed studying.

“Whereas no information within the dump factors to NordVPN, we’ve contacted the seller for extra data,” the corporate added.

Associated: TorGuard, NordVPN Reply to Breach Reviews

Associated: Verizon DBIR Flags Main Patch Delays on VPNs, Edge Home equipment

Associated: New VPN Assault Demonstrated In opposition to Palo Alto Networks, SonicWall Merchandise

Security Week News Tags:Breach, Data, Denies, Hacker, Leaks, NordVPN

Post navigation

Previous Post: New macOS TCC Bypass Vulnerability Allow Attackers to Access Sensitive User Data
Next Post: VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX

Related Posts

Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption Security Week News
US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles Security Week News
Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce Security Week News
SecurityWeek to Host 2025 ICS Cybersecurity Conference October 27-30 in Atlanta SecurityWeek to Host 2025 ICS Cybersecurity Conference October 27-30 in Atlanta Security Week News
Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks Security Week News
Seal Security Raises  Million to Secure Software Supply Chain Seal Security Raises $13 Million to Secure Software Supply Chain Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News