Cisco Investigates Major Data Breach Amid Allegations of Sensitive Information Sale

Oct 16, 2024

Cisco is currently investigating a potential cybersecurity incident following reports of data being sold on BreachForums. The post, made by a known user, IntelBroker, claims that a significant data breach occurred on October 6. If confirmed, the leak is substantial, impacting high-profile companies including Microsoft, AT&T, and Bank of America.

The compromised data reportedly includes source codes, projects from GitHub and GitLab, hardcoded access credentials, certificates, various tokens and keys, builds, and cloud storage buckets. Confidential documents were also mentioned, along with some user information, though the latter appears less critical in comparison to the other materials.

The scale of the breach raises concerns not only about corporate espionage but also national security, particularly if competitors, such as Huawei, were to acquire this information. Should this leak be verified, it is conceivable that Cisco may seek to reclaim the data, potentially under the guidance of governmental authorities.

For now, the gravity of the situation hinges on the legitimacy and extent of the leak, with further developments likely to unfold in the coming days.

Cisco Data Breach

For more information, visit the full article here.


Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks
Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks
Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks
Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks

Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks

Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks

Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks

Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks

Nov 17, 2025

Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap
Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap
Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap
Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap

Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap

Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap

Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap

Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap

Nov 12, 2025

AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training
AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training
AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training
AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training

AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training

AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training

AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training

AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training

Nov 7, 2025

Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft
Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft
Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft
Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft

Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft

Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft

Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft

Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft

Nov 4, 2025

RedTiger Infostealer Targets Discord Users via Fake Game Mods
RedTiger Infostealer Targets Discord Users via Fake Game Mods
RedTiger Infostealer Targets Discord Users via Fake Game Mods
RedTiger Infostealer Targets Discord Users via Fake Game Mods

RedTiger Infostealer Targets Discord Users via Fake Game Mods

RedTiger Infostealer Targets Discord Users via Fake Game Mods

RedTiger Infostealer Targets Discord Users via Fake Game Mods

RedTiger Infostealer Targets Discord Users via Fake Game Mods

Oct 27, 2025

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens
New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens
New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens
New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

Oct 27, 2025

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.