Swedish e-government platform source code was leaked by threat actor ByteToBreach after compromising CGI Sverige AB infrastructure through Jenkins compromise, Docker escape, and SSH pivoting. The leak includes full platform source code, staff databases, API signing systems, and separately-sold citizen PII databases and electronic signing documents.
Telus Digital suffered a breach exposing nearly 1 petabyte of data after ShinyHunters obtained Google Cloud Platform credentials from a prior Salesloft-Drift breach and used trufflehog to exfiltrate customer support data, call records, source code, and financial information across 28+ impacted clients. The threat actors demanded $65M in extortion.
A researcher discovered an information disclosure vulnerability on a Google-acquired property by identifying an API endpoint that exposed user PII (personally identifiable information) when usernames were changed in the request URL, allowing enumeration of other users' private data.
A bug bounty hunter discovered an information disclosure vulnerability in an enrollment portal where sensitive PII (last 4 SSN digits, account numbers, and verification answers) was exposed through missing rate limiting and HTML comments in the page source code, allowing account verification bypass.