Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    CVE-2026-6652 | THREATINT

    April 20, 2026

    CVE-2026-5760 | THREATINT

    April 20, 2026

    Learn How to Operationalize Exploit Intelligence in Splunk with VulnCheck’s New Splunkbase App | Blog

    April 20, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»Incident: Toyota does U-turn, confirms thousands of Australian customers hit by latest data breach | drive.com.au
    Alerts

    Incident: Toyota does U-turn, confirms thousands of Australian customers hit by latest data breach | drive.com.au

    adminBy adminApril 18, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Access key was publicly available on GitHub for almost five years

    Source: Toyota does U-turn, confirms thousands of Australian customers hit by latest data breach | drive.com.au
    Source: Toyota discloses data leak after access key exposed on GitHub | beepingcomputer

    News agency Reuters reports, in the latest computer hack, the vehicle data of 2.15 million Toyota customers in Japan – almost all owners who signed up for the company’s cloud services from 2012 – had been “publicly available for a decade due to human error”.

    After initially saying Toyota customers in Australia were not affected, the company has since done a U-turn. However, Toyota Australia issued the following statement: “On 12 May 2023, Toyota Motor Corporation confirmed the vehicle data of some users in Japan had been publicly accessible due to an error in the configuration of a cloud-based database.

    Toyota discovered recently that a portion of the T-Connect site source code was mistakenly published on GitHub and contained an access key to the data server that stored customer email addresses and management numbers.

    This made it possible for an unauthorized third party to access the details of 296,019 customers between December 2017 and September 15, 2022, when access to the GitHub repository was restricted.

     


    Related



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article[Control systems] Siemens security advisory (AV26-347)
    Next Article Understanding Command & Control (C2) Infrastructure | Blog
    admin
    • Website

    Related Posts

    Alerts

    CVE-2026-6652 | THREATINT

    April 20, 2026
    Alerts

    CVE-2026-5760 | THREATINT

    April 20, 2026
    Alerts

    CVE-2026-6648 | THREATINT

    April 20, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202623 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202623 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    CVE-2026-6652 | THREATINT

    April 20, 2026

    CVE-2026-5760 | THREATINT

    April 20, 2026

    Learn How to Operationalize Exploit Intelligence in Splunk with VulnCheck’s New Splunkbase App | Blog

    April 20, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.