Thursday, March 13, 2025
HomeData BreachPanasonic Disclosed a Security Breach that Hackers Gained Access to Servers

Panasonic Disclosed a Security Breach that Hackers Gained Access to Servers

Published on

SIEM as a Service

Follow Us on Google News

Officials of Panasonic have recently asserted that their servers were accessed illegally earlier this month by hackers.

Here’s what the official press release of Panasonic states:-

“Panasonic Corporation has confirmed that its network was illegally accessed by a third party on November 11, 2021. As the result of an internal investigation, it was determined that some data on a file server had been accessed during the intrusion.”

The Security Breach

However, after getting aware of this security breach Panasonic promptly reported all the relevant authorities about this security breach, and not only that even from the outside they have also closed all the access to its network.

While it’s being reported that during the investigation the traces and footprints of the third-party cybercriminals were discovered by the security experts.

And now they are trying their best to find out whether the hackers have managed to gain access to any personal information of the clients and other confidential data of the company.

Data Involved

Currently, there are no proper details are known about this security breach, but, some reliable sources claim that the hackers have managed to gain access to the following data:-

  • Sensitive information related to social infrastructure
  • Customer information
  • Personal data of employees
  • Technical files of Panasonic

Here, before the strange activity dragged the attention of company employees the most worse thing happened. The hackers have incubated the network of Panasonic for more than four months that is from June 22 to November 3 of this year.

Apart from this, Panasonic has assured that they are closely working with a third-party security organization to get each and every detail about this incident so that they can close all the loopholes immediately and secure their network.

Even for any concern or inconvenience caused due to this security breach they have expressed their sincerest apologies to their customers.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Blind Eagle Targets Organizations with Weaponized .URL Files to Steal User Hashes

In a significant development in the cybersecurity landscape, APT-C-36, more commonly known as Blind...

INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats

As Artificial Intelligence (AI)-powered cyber threats surge, INE Security, a global leader in cybersecurity...

Apache NiFi Vulnerability Exposes MongoDB Credentials to Attackers

A critical security vulnerability has been identified in Apache NiFi, a popular open-source data...

86,000+ Healthcare Staff Records Exposed Due to AWS S3 Misconfiguration

A non-password-protected database belonging to ESHYFT, a New Jersey-based HealthTech company, was recently discovered...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

86,000+ Healthcare Staff Records Exposed Due to AWS S3 Misconfiguration

A non-password-protected database belonging to ESHYFT, a New Jersey-based HealthTech company, was recently discovered...

Telecom Giant NTT Confirms Data Breach Affecting 18,000 Corporate Customers

Japanese telecom giant NTT Communications (NTT Com) has confirmed a data breach that compromised...

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...