Company Details
ey-parthenon
15,690
418,663
5416
http://www.ey.com/parthenon
0
EY-_1929556
In-progress

EY-Parthenon Company CyberSecurity Posture
http://www.ey.com/parthenonOur unique combination of transformative strategy, transactions and corporate finance delivers real-world value – solutions that work in practice, not just on paper. Benefiting from EY’s full spectrum of services, we’ve reimagined strategic consulting to work in a world of increasing complexity. With deep functional and sector expertise, paired with innovative AI-powered technology and an investor mindset, we partner with CEOs, boards, private equity and governments every step of the way – enabling you to shape your future with confidence. EY-Parthenon is a brand under which a number of EY member firms across the globe provide strategy consulting services. For more information, please visit ey.com/parthenon.
Company Details
ey-parthenon
15,690
418,663
5416
http://www.ey.com/parthenon
0
EY-_1929556
In-progress
Between 750 and 799

EY-Parthenon Global Score (TPRM)XXXX

Description: Ernst & Young (EY), a global accounting and consulting firm, inadvertently exposed a **4-terabyte (TB) SQL Server database backup** on the public internet. The unsecured **.BAK file**, discovered by a Neo Security researcher, contained highly sensitive internal data, including **database schemas, stored procedures, API keys, session tokens, user credentials, and service account passwords**—effectively a 'master blueprint' to EY’s digital infrastructure. While EY confirmed the exposure and claimed **no client, personal, or confidential data was compromised**, the incident stemmed from an acquired entity under **EY Italy**, disconnected from its global systems. The file remained accessible for an **estimated week** before remediation, raising concerns about potential access by malicious actors. EY’s response was praised for professionalism, though the delayed fix highlighted operational vulnerabilities. The exposure risked **unauthorized access to critical systems**, credential theft, and potential lateral movement within EY’s network, though the firm asserted no evidence of exploitation.
Description: On August 9, 2023, the Washington State Office of the Attorney General reported a data breach affecting Ernst & Young LLP (EY US). The breach occurred from May 27, 2023, to May 31, 2023, involving a third-party service vulnerability in Progress Software’s MOVEit Transfer solution. The breach affected 1,129 Washington residents, compromising personal data including names, Social Security numbers, and financial information.
Description: A 4TB SQL Server backup file belonging to Ernst & Young (EY) was discovered publicly exposed on Microsoft Azure by cybersecurity firm Neo Security. The unencrypted .BAK file, identified during routine passive network analysis, likely contained sensitive data such as database schemas, user credentials, API keys, and authentication tokens. Ownership was confirmed via DNS SOA lookup linking to **ey.com**, though initial searches showed no explicit owner. While EY remediated the exposure swiftly and claimed no client or confidential data was compromised, the incident underscored the high risk of automated scanning tools discovering such leaks. The exposure duration and potential access by malicious actors remained unclear, but past incidents demonstrated that even brief cloud exposures could lead to PII and credential theft. The case highlighted critical gaps in cloud visibility and leak detection, emphasizing the need for continuous attack surface monitoring in complex cloud environments.
Description: A Dutch cybersecurity firm, Neo Security, discovered a **4TB+ unencrypted SQL Server backup file** belonging to EY exposed publicly on the internet due to a **misconfigured cloud bucket**. The leaked data included **API keys, cached authentication tokens, session tokens, service account passwords, and user credentials**—essentially a full blueprint for accessing EY’s internal systems. The exposure was caused by a trivial error, likely a misconfigured bucket setting, which made the sensitive backup accessible to anyone. While the exact duration of exposure is unclear, such incidents typically assume compromise from the moment of discovery.The breach mirrors a past case Neo Security investigated, where a **lazy database migration** (temporarily setting a bucket to public) led to a **ransomware attack and the eventual collapse of the affected company** after data theft. EY responded professionally upon notification, remediating the issue within a week. However, the exposed credentials and trade secrets pose severe risks, including **potential follow-on attacks, financial fraud, or espionage** by threat actors who may have already downloaded the data.


No incidents recorded for EY-Parthenon in 2025.
No incidents recorded for EY-Parthenon in 2025.
No incidents recorded for EY-Parthenon in 2025.
EY-Parthenon cyber incidents detection timeline including parent company and subsidiaries

Our unique combination of transformative strategy, transactions and corporate finance delivers real-world value – solutions that work in practice, not just on paper. Benefiting from EY’s full spectrum of services, we’ve reimagined strategic consulting to work in a world of increasing complexity. With deep functional and sector expertise, paired with innovative AI-powered technology and an investor mindset, we partner with CEOs, boards, private equity and governments every step of the way – enabling you to shape your future with confidence. EY-Parthenon is a brand under which a number of EY member firms across the globe provide strategy consulting services. For more information, please visit ey.com/parthenon.


Bain & Company is a global consultancy that helps the world’s most ambitious change makers define the future. Across 65 cities in 40 countries, we work alongside our clients as one team with a shared ambition to achieve extraordinary results, outperform the competition, and redefine industries. We
Choosing a digital partner is about more than capabilities — it’s about collaboration and character. Unrealistic overhauls and off-the-shelf products ignore what matters most — your unique needs, culture, goals, and your legacy data and technology environments. At EXL, our collaboration is built o
Genpact (NYSE: G) is a global professional services and solutions firm delivering outcomes that shape the future. Our 125,000+ people across 30+ countries are driven by our innate curiosity, entrepreneurial agility, and desire to create lasting value for clients. Powered by our purpose – the relentl

Boston Consulting Group partners with leaders in business and society to tackle their most important challenges and capture their greatest opportunities. BCG was the pioneer in business strategy when it was founded in 1963. Today, we work closely with clients to embrace a transformational approach a

As the leader in circular services at work, Elis ensures its clients achieve optimal hygiene, well-being and protection – everywhere, every day, in a sustainable way. We employ 54,000 people locally in 30 countries. We work for public and private organizations of all sizes, in all sectors of activi
Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are

At Advantage Solutions, we're the unseen architects behind your everyday purchases. From pantry staples to your online shopping carts, we ensure your favorite goods are always in stock and within reach by connecting manufacturers to the right retailers and teaming up with retailers to figure out the

Ventra – один из крупнейших федеральных игроков рынка аутсорсинга бизнес-процессов. Внимание, мы объединяем профили с https://www.linkedin.com/company/2928612 присоединяйтесь! Более 20 лет компании работает на территории России, Казахстана и Республики Беларусь. У Ventra большой опыт работы с круп

Acosta Group fuses storied expertise, unmatched connectivity and advanced insight to accelerate brand growth – everywhere you sell. Our collective of the most trusted retail, marketing and foodservice agencies is reimagining how people connect with brands at every point in the consumer journey. Co
.png)
Get the latest EY India news, insights, and updates. Stay informed about EY India's innovations, industry impact, and how we're building a...
Explore how advanced mining technologies demand robust cybersecurity to secure operations, protect assets and ensure sustainable growth.
Our commitment to audit quality. At EY US, we are bringing our bold vision for the future of audit to life with quality at the center,...
Read the latest Merger Monthly, with insights on recent US M&A activity and what M&A trends to expect as we look ahead.
Companies are expanding disclosures on artificial intelligence (AI) and cybersecurity governance as technology's role in business evolves.
At this exclusive and insightful breakfast event, the spotlight will be on the “2025 EY Global Cybersecurity Leadership Insights Study.”
Learn how your cybersecurity team can become a model for the entire organization by embracing AI-driven innovation to thwart cyberattacks.
New York, 10 September 2025. Jeff Schumacher, architect behind the groundbreaking AI solution, to steer EY Growth Platforms.
Cybersecurity is a board-level concern, yet many chief information security officers (CISOs) struggle to translate technical risks into...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of EY-Parthenon is http://www.ey.com/parthenon.
According to Rankiteo, EY-Parthenon’s AI-generated cybersecurity score is 784, reflecting their Fair security posture.
According to Rankiteo, EY-Parthenon currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, EY-Parthenon is not certified under SOC 2 Type 1.
According to Rankiteo, EY-Parthenon does not hold a SOC 2 Type 2 certification.
According to Rankiteo, EY-Parthenon is not listed as GDPR compliant.
According to Rankiteo, EY-Parthenon does not currently maintain PCI DSS compliance.
According to Rankiteo, EY-Parthenon is not compliant with HIPAA regulations.
According to Rankiteo,EY-Parthenon is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
EY-Parthenon operates primarily in the Business Consulting and Services industry.
EY-Parthenon employs approximately 15,690 people worldwide.
EY-Parthenon presently has no subsidiaries across any sectors.
EY-Parthenon’s official LinkedIn profile has approximately 418,663 followers.
EY-Parthenon is classified under the NAICS code 5416, which corresponds to Management, Scientific, and Technical Consulting Services.
No, EY-Parthenon does not have a profile on Crunchbase.
Yes, EY-Parthenon maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ey-parthenon.
As of November 30, 2025, Rankiteo reports that EY-Parthenon has experienced 4 cybersecurity incidents.
EY-Parthenon has an estimated 17,871 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes (professional and effective response), and third party assistance with yes (neo security reported the incident), and containment measures with remediation of cloud bucket access controls, and remediation measures with securing the exposed backup file, and communication strategy with cold messaging on linkedin to reach incident responders, and incident response plan activated with yes (described as 'textbook perfect' by the researcher), and third party assistance with neo security (reporting party), and containment measures with securing the exposed backup file, and remediation measures with remediated within ~1 week, and communication strategy with swift acknowledgment, communication strategy with professional response to researcher, communication strategy with public statement downplaying impact, and incident response plan activated with yes (ey's csirt engaged after disclosure), and third party assistance with neo security (disclosure), and containment measures with restricted public access to the azure blob, and remediation measures with secured misconfigured storage permissions, and communication strategy with public disclosure via securityaffairs, communication strategy with statement confirming no client/confidential data affected..
Title: Data Breach at Ernst & Young LLP (EY US)
Description: A data breach affecting Ernst & Young LLP (EY US) occurred from May 27, 2023, to May 31, 2023, involving a third-party service vulnerability in Progress Software’s MOVEit Transfer solution.
Date Detected: 2023-08-09
Date Publicly Disclosed: 2023-08-09
Type: Data Breach
Attack Vector: Third-party service vulnerability
Vulnerability Exploited: Progress Software’s MOVEit Transfer solution
Title: EY 4TB+ SQL Server Backup File Exposure
Description: A Dutch cybersecurity firm, Neo Security, discovered a 4TB+ SQL Server backup file belonging to EY (Ernst & Young) exposed to the public internet. The unencrypted BAK file contained sensitive data such as API keys, cached authentication tokens, session tokens, service account passwords, and user credentials. The exposure was due to a misconfigured cloud bucket, reminiscent of a past incident where a company collapsed after a similar breach. EY's response was praised as professional and effective, with remediation completed within a week.
Type: data breach
Attack Vector: cloud bucket misconfiguration (publicly accessible storage)
Vulnerability Exploited: improper access controls on cloud storage (public bucket setting)
Title: Ernst & Young (EY) Exposes 4TB Database Backup on Public Internet
Description: Ernst & Young (EY), one of the world’s largest accounting and consulting firms, reportedly left a 4-terabyte (TB) database backup exposed on the public internet, potentially revealing vast amounts of sensitive company information. The unprotected .BAK file, believed to be a full SQL Server database backup, was discovered by a security researcher at Neo Security. The file contained critical internal data, including schema, stored procedures, API keys, session tokens, user credentials, and service account passwords. EY was alerted and responded swiftly, though remediation took about a week. EY confirmed the incident but stated no client information, personal data, or confidential EY data was impacted, localizing the issue to an acquired entity in Italy.
Type: data exposure
Attack Vector: publicly accessible unprotected database backup (.BAK file)
Vulnerability Exploited: misconfigured public-facing storage/exposure of sensitive backup file
Title: EY Exposes 4TB SQL Server Backup Publicly on Microsoft Azure
Description: A massive 4TB SQL Server backup file belonging to global accounting giant Ernst & Young (EY) was discovered publicly accessible on Microsoft Azure during a routine scan by cybersecurity firm Neo Security. The file, identified by its .BAK extension, was unencrypted and likely contained sensitive data such as schemas, user information, API keys, credentials, and authentication tokens. Neo Security responsibly disclosed the exposure to EY, which quickly remediated the issue, confirming no client or confidential data was affected. The incident underscores the risks of automated scanning and the need for continuous cloud visibility and leak detection tools.
Date Detected: 2025-10-31
Date Publicly Disclosed: 2025-10-31
Type: data exposure
Attack Vector: publicly accessible cloud storage (Azure Blob)
Vulnerability Exploited: misconfigured Azure Blob storage permissions
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through publicly accessible cloud bucket.

Data Compromised: Names, Social security numbers, Financial information

Data Compromised: Api keys, Cached authentication tokens, Session tokens, Service account passwords, User credentials, Potential trade secrets
Systems Affected: SQL Server backup (BAK file)
Brand Reputation Impact: potential reputational damage (high-profile exposure)
Identity Theft Risk: high (due to exposed credentials)

Data Compromised: Internal database schema, Stored procedures, Api keys, Session tokens, User credentials, Service account passwords
Systems Affected: SQL Server database backup (.BAK file)
Brand Reputation Impact: potential reputational harm due to exposure of sensitive internal data
Identity Theft Risk: high (due to exposed credentials and tokens)

Data Compromised: Potential schemas, User information, Api keys, Credentials, Authentication tokens
Systems Affected: Microsoft Azure Blob Storage
Brand Reputation Impact: potential reputational risk due to exposure of sensitive backup
Identity Theft Risk: high (if credentials/PII were exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, Financial Information, , Api Keys, Authentication Tokens (Cached), Session Tokens, Service Account Passwords, User Credentials, Potential Trade Secrets, , Internal Database Schema, Stored Procedures, Api Keys, Session Tokens, User Credentials, Service Account Passwords, , Sql Server Database Backup (.Bak File), Potential: Schemas, User Information, Api Keys, Credentials, Authentication Tokens and .

Entity Name: Ernst & Young LLP (EY US)
Entity Type: Company
Industry: Professional Services
Customers Affected: 1129

Entity Name: Ernst & Young (EY)
Entity Type: multinational professional services firm
Industry: accounting, consulting, financial services
Location: global (headquartered in London, UK)
Size: large (one of the 'Big Four' accounting firms)

Entity Name: Ernst & Young (EY)
Entity Type: accounting firm, consulting firm
Industry: professional services, financial services
Location: global (incident localized to EY Italy)
Size: large (one of the 'Big Four' accounting firms)
Customers Affected: none (per EY's statement)

Entity Name: Ernst & Young (EY)
Entity Type: global accounting firm
Industry: professional services (accounting, consulting)
Location: global (headquartered in London, UK)
Size: large (multinational)
Customers Affected: none (per EY's statement)

Incident Response Plan Activated: yes (professional and effective response)
Third Party Assistance: yes (Neo Security reported the incident)
Containment Measures: remediation of cloud bucket access controls
Remediation Measures: securing the exposed backup file
Communication Strategy: cold messaging on LinkedIn to reach incident responders

Incident Response Plan Activated: yes (described as 'textbook perfect' by the researcher)
Third Party Assistance: Neo Security (Reporting Party).
Containment Measures: securing the exposed backup file
Remediation Measures: remediated within ~1 week
Communication Strategy: swift acknowledgmentprofessional response to researcherpublic statement downplaying impact

Incident Response Plan Activated: yes (EY's CSIRT engaged after disclosure)
Third Party Assistance: Neo Security (Disclosure).
Containment Measures: restricted public access to the Azure Blob
Remediation Measures: secured misconfigured storage permissions
Communication Strategy: public disclosure via SecurityAffairsstatement confirming no client/confidential data affected
Third-Party Assistance: The company involves third-party assistance in incident response through Neo Security (reporting party), , Neo Security (disclosure), .

Type of Data Compromised: Names, Social security numbers, Financial information
Number of Records Exposed: 1129
Sensitivity of Data: High

Type of Data Compromised: Api keys, Authentication tokens (cached), Session tokens, Service account passwords, User credentials, Potential trade secrets
Sensitivity of Data: high (credentials, secrets, and potentially proprietary information)
Data Exfiltration: likely (researcher downloaded first 1000 bytes; attackers may have downloaded full file)
Data Encryption: no (unencrypted BAK file)
File Types Exposed: SQL Server backup (.BAK)
Personally Identifiable Information: potentially (if user credentials included PII)

Type of Data Compromised: Internal database schema, Stored procedures, Api keys, Session tokens, User credentials, Service account passwords
Sensitivity of Data: high (internal credentials, tokens, and technical blueprints)
Data Exfiltration: unknown (assumed possible due to public exposure)
Data Encryption: no (file was unprotected)
File Types Exposed: .BAK (SQL Server backup)
Personally Identifiable Information: no (per EY's statement)

Type of Data Compromised: Sql server database backup (.bak file), Potential: schemas, user information, api keys, credentials, authentication tokens
Sensitivity of Data: high (potentially included credentials and PII)
Data Exfiltration: none confirmed (per EY)
Data Encryption: no (file was unencrypted)
File Types Exposed: .BAK (SQL Server backup)
Personally Identifiable Information: potential (not confirmed)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: securing the exposed backup file, , remediated within ~1 week, , secured misconfigured storage permissions, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by remediation of cloud bucket access controls, , securing the exposed backup file, , restricted public access to the azure blob and .

Lessons Learned: Cloud storage misconfigurations can lead to massive data exposures with minimal effort., Automated scans by attackers can exploit even brief periods of public exposure., Convenience in cloud tools (e.g., one-click exports) does not prioritize security by default., Proactive monitoring and access reviews are critical for cloud storage.

Lessons Learned: Even resource-rich organizations can accidentally expose sensitive data in complex cloud environments., Automated scanning tools make exposures inevitable; continuous monitoring and attack surface management are critical., Responsible disclosure by third-party researchers can mitigate risks before malicious exploitation.

Recommendations: Implement strict access controls and default-deny policies for cloud storage., Use encryption for sensitive backups, even in 'temporary' public states., Enable automated alerts for changes in bucket permissions or public exposure., Conduct regular audits of cloud storage configurations., Train employees on secure data handling during migrations or backups.Implement strict access controls and default-deny policies for cloud storage., Use encryption for sensitive backups, even in 'temporary' public states., Enable automated alerts for changes in bucket permissions or public exposure., Conduct regular audits of cloud storage configurations., Train employees on secure data handling during migrations or backups.Implement strict access controls and default-deny policies for cloud storage., Use encryption for sensitive backups, even in 'temporary' public states., Enable automated alerts for changes in bucket permissions or public exposure., Conduct regular audits of cloud storage configurations., Train employees on secure data handling during migrations or backups.Implement strict access controls and default-deny policies for cloud storage., Use encryption for sensitive backups, even in 'temporary' public states., Enable automated alerts for changes in bucket permissions or public exposure., Conduct regular audits of cloud storage configurations., Train employees on secure data handling during migrations or backups.Implement strict access controls and default-deny policies for cloud storage., Use encryption for sensitive backups, even in 'temporary' public states., Enable automated alerts for changes in bucket permissions or public exposure., Conduct regular audits of cloud storage configurations., Train employees on secure data handling during migrations or backups.

Recommendations: Implement continuous cloud visibility and leak detection tools., Enforce strict access controls and encryption for cloud-stored backups., Regularly audit cloud storage permissions to prevent misconfigurations., Establish clear channels for third-party vulnerability disclosures.Implement continuous cloud visibility and leak detection tools., Enforce strict access controls and encryption for cloud-stored backups., Regularly audit cloud storage permissions to prevent misconfigurations., Establish clear channels for third-party vulnerability disclosures.Implement continuous cloud visibility and leak detection tools., Enforce strict access controls and encryption for cloud-stored backups., Regularly audit cloud storage permissions to prevent misconfigurations., Establish clear channels for third-party vulnerability disclosures.Implement continuous cloud visibility and leak detection tools., Enforce strict access controls and encryption for cloud-stored backups., Regularly audit cloud storage permissions to prevent misconfigurations., Establish clear channels for third-party vulnerability disclosures.
Key Lessons Learned: The key lessons learned from past incidents are Cloud storage misconfigurations can lead to massive data exposures with minimal effort.,Automated scans by attackers can exploit even brief periods of public exposure.,Convenience in cloud tools (e.g., one-click exports) does not prioritize security by default.,Proactive monitoring and access reviews are critical for cloud storage.Even resource-rich organizations can accidentally expose sensitive data in complex cloud environments.,Automated scanning tools make exposures inevitable; continuous monitoring and attack surface management are critical.,Responsible disclosure by third-party researchers can mitigate risks before malicious exploitation.

Source: Washington State Office of the Attorney General
Date Accessed: 2023-08-09

Source: The Register

Source: Neo Security (Dutch cybersecurity firm)

Source: TechRadar Pro

Source: SecurityAffairs
URL: https://securityaffairs.com/153422/data-breach/ey-exposes-4tb-sql-server-backup.html
Date Accessed: 2025-10-31
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington State Office of the Attorney GeneralDate Accessed: 2023-08-09, and Source: The Register, and Source: Neo Security (Dutch cybersecurity firm), and Source: TechRadar Pro, and Source: SecurityAffairsUrl: https://securityaffairs.com/153422/data-breach/ey-exposes-4tb-sql-server-backup.htmlDate Accessed: 2025-10-31.

Investigation Status: resolved (remediated within a week)

Investigation Status: resolved (per EY's statement)

Investigation Status: resolved (per EY's statement)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Cold Messaging On Linkedin To Reach Incident Responders, Swift Acknowledgment, Professional Response To Researcher, Public Statement Downplaying Impact, Public Disclosure Via Securityaffairs and Statement Confirming No Client/Confidential Data Affected.

Customer Advisories: EY issued a public statement downplaying impact

Customer Advisories: EY confirmed no client or confidential data was affected.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were EY issued a public statement downplaying impact, Ey Confirmed No Client Or Confidential Data Was Affected. and .

Entry Point: publicly accessible cloud bucket
High Value Targets: Sql Server Backup Containing Credentials And Secrets,
Data Sold on Dark Web: Sql Server Backup Containing Credentials And Secrets,

Root Causes: Human Error (Misconfigured Cloud Bucket Permissions), Lack Of Safeguards Against Accidental Public Exposure, Over-Reliance On Convenience Features In Cloud Tools Without Security Checks,
Corrective Actions: Secured The Exposed Backup File, Likely Reviewed And Hardened Cloud Storage Access Controls (Inferred From Remediation),

Root Causes: Misconfigured Public Exposure Of Sensitive Backup File,
Corrective Actions: Secured The Exposed File, Remediated Within ~1 Week,

Root Causes: Misconfigured Azure Blob Storage Permissions, Lack Of Continuous Monitoring For Exposed Assets,
Corrective Actions: Secured Exposed Backup, Likely Internal Review Of Cloud Security Practices (Inferred),
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Neo Security (Reporting Party), , Neo Security (Disclosure), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Secured The Exposed Backup File, Likely Reviewed And Hardened Cloud Storage Access Controls (Inferred From Remediation), , Secured The Exposed File, Remediated Within ~1 Week, , Secured Exposed Backup, Likely Internal Review Of Cloud Security Practices (Inferred), .
Most Recent Incident Detected: The most recent incident detected was on 2023-08-09.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-10-31.
Most Significant Data Compromised: The most significant data compromised in an incident were names, Social Security numbers, financial information, , API keys, cached authentication tokens, session tokens, service account passwords, user credentials, potential trade secrets, , internal database schema, stored procedures, API keys, session tokens, user credentials, service account passwords, , potential schemas, user information, API keys, credentials, authentication tokens and .
Most Significant System Affected: The most significant system affected in an incident was SQL Server backup (BAK file) and SQL Server database backup (.BAK file) and Microsoft Azure Blob Storage.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was neo security (reporting party), , neo security (disclosure), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were remediation of cloud bucket access controls, securing the exposed backup file and restricted public access to the Azure Blob.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were API keys, credentials, Social Security numbers, stored procedures, service account passwords, cached authentication tokens, financial information, potential trade secrets, session tokens, internal database schema, potential schemas, names, user information, user credentials and authentication tokens.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 121.0.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Responsible disclosure by third-party researchers can mitigate risks before malicious exploitation.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Conduct regular audits of cloud storage configurations., Train employees on secure data handling during migrations or backups., Use encryption for sensitive backups, even in 'temporary' public states., Implement continuous cloud visibility and leak detection tools., Establish clear channels for third-party vulnerability disclosures., Enforce strict access controls and encryption for cloud-stored backups., Enable automated alerts for changes in bucket permissions or public exposure., Implement strict access controls and default-deny policies for cloud storage. and Regularly audit cloud storage permissions to prevent misconfigurations..
Most Recent Source: The most recent source of information about an incident are TechRadar Pro, SecurityAffairs, The Register, Washington State Office of the Attorney General and Neo Security (Dutch cybersecurity firm).
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://securityaffairs.com/153422/data-breach/ey-exposes-4tb-sql-server-backup.html .
Current Status of Most Recent Investigation: The current status of the most recent investigation is resolved (remediated within a week).
Most Recent Customer Advisory: The most recent customer advisory issued were an EY issued a public statement downplaying impact and EY confirmed no client or confidential data was affected.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an publicly accessible cloud bucket.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Human error (misconfigured cloud bucket permissions)Lack of safeguards against accidental public exposureOver-reliance on convenience features in cloud tools without security checks, misconfigured public exposure of sensitive backup file, misconfigured Azure Blob storage permissionslack of continuous monitoring for exposed assets.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Secured the exposed backup fileLikely reviewed and hardened cloud storage access controls (inferred from remediation), secured the exposed fileremediated within ~1 week, secured exposed backuplikely internal review of cloud security practices (inferred).
.png)
A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.