<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>data breach Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/data-breach/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/data-breach/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Tue, 12 May 2026 09:25:35 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>data breach Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/data-breach/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>40% Vibe-Coding Leaves  Business Vulnerable to Hackers and Data Leaks</title>
		<link>https://www.vertexcybersecurity.com.au/40-vibe-coding-leaves-business-vulnerable-to-hackers-and-data-leaks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=40-vibe-coding-leaves-business-vulnerable-to-hackers-and-data-leaks</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 11 May 2026 23:35:25 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[cyber security audit]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Shadow IT]]></category>
		<category><![CDATA[vibe-coding]]></category>
		<category><![CDATA[vulnerable]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10771</guid>

					<description><![CDATA[Discover how AI-generated "vibe-coding" leaves businesses vulnerable to hackers. Learn the risks of Shadow IT and how to protect your corporate data from accidental leaks.]]></description>
		
		
		
			</item>
		<item>
		<title>The ShinyHunters Data Breach: What the Queensland Department of Education Incident Means for Your Organisation</title>
		<link>https://www.vertexcybersecurity.com.au/the-shinyhunters-data-breach-what-the-queensland-department-of-education-incident-means-for-your-organisation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-shinyhunters-data-breach-what-the-queensland-department-of-education-incident-means-for-your-organisation</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 07 May 2026 04:49:42 +0000</pubDate>
				<category><![CDATA[Uncategorised]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Queensland Education]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[third-party risk]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10753</guid>

					<description><![CDATA[The Queensland Department of Education confirmed a data breach affecting staff and students via a third-party provider. Learn how to protect your organisation.]]></description>
		
		
		
			</item>
		<item>
		<title>The Teenage Hacker and the Secure Document Breach: Lessons for Business Resilience</title>
		<link>https://www.vertexcybersecurity.com.au/the-teenage-hacker-and-the-secure-document-breach-lessons-for-business-resilience/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-teenage-hacker-and-the-secure-document-breach-lessons-for-business-resilience</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 06 May 2026 03:25:33 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[France Titres]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Secure Documents]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10674</guid>

					<description><![CDATA[A 15-year-old hacker is linked to a massive data breach of millions of secure documents in France. Discover what this means for your business cybersecurity.]]></description>
		
		
		
			</item>
		<item>
		<title>The Great Ransomware Bluff: Why Cybercriminals Are Skipping Encryption and Faking Breaches in 2026</title>
		<link>https://www.vertexcybersecurity.com.au/the-great-ransomware-bluff-why-cybercriminals-are-skipping-encryption-and-faking-breaches-in-2026/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-great-ransomware-bluff-why-cybercriminals-are-skipping-encryption-and-faking-breaches-in-2026</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 05 May 2026 00:29:08 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Extortion]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Ransomware 2026]]></category>
		<category><![CDATA[Vertex Cyber Security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10628</guid>

					<description><![CDATA[In 2026, ransomware groups are skipping encryption and faking data breaches to save time. Learn how to protect your business from the new "cyber bluff" tactics.]]></description>
		
		
		
			</item>
		<item>
		<title>5,600 Sensitive Documents Stolen: Lessons from the NSW Treasury Insider Data Breach</title>
		<link>https://www.vertexcybersecurity.com.au/5600-sensitive-documents-stolen-lessons-from-the-nsw-treasury-insider-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5600-sensitive-documents-stolen-lessons-from-the-nsw-treasury-insider-data-breach</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 06:41:03 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[NSW Government]]></category>
		<category><![CDATA[Security Monitoring]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10569</guid>

					<description><![CDATA[A significant data breach at the NSW Treasury involving 5,600 documents highlights the danger of insider threats. Learn how to enhance your organisation's security monitoring.]]></description>
		
		
		
			</item>
		<item>
		<title>The Digital High: Why Cyber Hacking is So Addictive for Beginners</title>
		<link>https://www.vertexcybersecurity.com.au/the-digital-high-why-cyber-hacking-is-so-addictive-for-beginners/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-digital-high-why-cyber-hacking-is-so-addictive-for-beginners</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 23:12:17 +0000</pubDate>
				<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Addiction]]></category>
		<category><![CDATA[Cyber Hacking]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10560</guid>

					<description><![CDATA[Explore the psychological reasons why cyber hacking is so addictive for beginners, the dangerous cycle of criminal escalation, and why cybercrime never pays in the long run.]]></description>
		
		
		
			</item>
		<item>
		<title>The PowerSchool Ransomware Heist: Why a 20-Year-Old is Heading to Federal Prison</title>
		<link>https://www.vertexcybersecurity.com.au/the-powerschool-ransomware-heist-why-a-20-year-old-is-heading-to-federal-prison/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-powerschool-ransomware-heist-why-a-20-year-old-is-heading-to-federal-prison</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 23:06:24 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Matthew Lane]]></category>
		<category><![CDATA[PowerSchool]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10556</guid>

					<description><![CDATA[A 20-year-old receives 4 years in prison for the historic PowerSchool breach. Learn how teenage hackers are recruited on gaming platforms and why cybercrime never pays.]]></description>
		
		
		
			</item>
		<item>
		<title>AI Platform Breached Exposing Chats: Why Security Cannot Be an Afterthought in Artificial Intelligence Development</title>
		<link>https://www.vertexcybersecurity.com.au/ai-platform-breached-exposing-chats-why-security-cannot-be-an-afterthought-in-artificial-intelligence-development/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ai-platform-breached-exposing-chats-why-security-cannot-be-an-afterthought-in-artificial-intelligence-development</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 02 Feb 2026 23:35:25 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[artificial intelligence privacy]]></category>
		<category><![CDATA[cybersecurity audits]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Firebase misconfiguration]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10269</guid>

					<description><![CDATA[Learn how the Chat &#038; Ask AI breach exposed millions of messages due to simple errors and discover why artificial intelligence security is critical for your business.]]></description>
		
		
		
			</item>
		<item>
		<title>The Hidden Cost of Cheap Malware Protection: Lessons from the Langley Twigg Law Firm Breach</title>
		<link>https://www.vertexcybersecurity.com.au/the-hidden-cost-of-cheap-malware-protection-lessons-from-the-langley-twigg-law-firm-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-hidden-cost-of-cheap-malware-protection-lessons-from-the-langley-twigg-law-firm-breach</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 02 Feb 2026 23:04:07 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Business Resilience]]></category>
		<category><![CDATA[Case Study]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Langley Twigg]]></category>
		<category><![CDATA[Law Firm]]></category>
		<category><![CDATA[Malware Protection]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10261</guid>

					<description><![CDATA[Using the Langley Twigg Law attack as a case study, discover why saving money on cheap malware protection can lead to devastating data breaches and hidden costs.]]></description>
		
		
		
			</item>
		<item>
		<title>Should I use Have I been pwned (HIBP) ?</title>
		<link>https://www.vertexcybersecurity.com.au/should-i-use-have-i-been-pwned-hibps/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=should-i-use-have-i-been-pwned-hibps</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 05 Jan 2026 01:56:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data breach check]]></category>
		<category><![CDATA[email hack check]]></category>
		<category><![CDATA[hack check]]></category>
		<category><![CDATA[have i been pwned]]></category>
		<category><![CDATA[password check]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=616</guid>

					<description><![CDATA[So, you might have heard of a website &#8220;Have I been pwned&#8221; (HIBP) which contains a list of hacked user emails and passwords that you can check to see if your email or password has been hacked. Now, before I talk about &#8220;Have I been pwned&#8221;, it is worth highlighting there are many sites out [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
