Gym audio recordings exposed in data leak

A significant data breach has exposed thousands of audio recordings from a popular gym chain, raising serious privacy concerns. The leaked audio files include sensitive conversations and personal information of gym members, highlighting vulnerabilities in the gym's data security measures. This incident underscores the critical need for robust cybersecurity practices in fitness and health-related industries, where personal data protection is paramount. Experts advise gyms to implement end-to-end encryption and regular security audits to prevent such breaches. The exposure of these recordings not only compromises individual privacy but also poses risks of identity theft and unauthorized surveillance. This event serves as a wake-up call for organizations to prioritize cybersecurity and protect customer data against evolving cyber threats.

This Cyber News was published on www.theregister.com. Publication date: Tue, 09 Sep 2025 21:44:04 +0000


Cyber News related to Gym audio recordings exposed in data leak

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 year ago Aws.amazon.com
Australian Court Service Hacked, Hearing Recordings at Risk - Court cases and tribunals in Australia have been impacted by a cybersecurity incident, with attackers potentially accessing recordings of hearings, according to the Court Services Victoria. The CSV revealed the incident in a statement on January 2, ...
2 years ago Infosecurity-magazine.com
Gym audio recordings exposed in data leak - A significant data breach has exposed thousands of audio recordings from a popular gym chain, raising serious privacy concerns. The leaked audio files include sensitive conversations and personal information of gym members, highlighting ...
5 months ago Theregister.com
Cyberattackers breach trove of Victoria court recordings The Register - The court system of Victoria, Australia, was subject to a suspected ransomware attack in which audiovisual recordings of court hearings may have been accessed. The incident began on December 8 and attackers may have accessed hearings between November ...
2 years ago Go.theregister.com Qilin
Victoria court recordings exposed in reported ransomware attack - Australia's Court Services Victoria is warning that video recordings of court hearings were exposed after suffering a reported Qilin ransomware attack. CSV is an independent statutory authority that provides services to Victoria's court systems, ...
2 years ago Bleepingcomputer.com Akira Qilin
Hackers breach Australian court hearing database - The court system for Australia's second-most-populated state was hit by a ransomware attack that potentially exposed sensitive recordings of some court hearings. Court Services Victoria, an administrative body that supports the operations of the ...
2 years ago Therecord.media Qilin
CVE-2007-0018 - Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote attackers to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the ...
7 years ago
CVE-2025-3652 - Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an information disclosure vulnerability that allows unauthorized access to private audio recordings by exploiting sequential audio IDs and insecure assignment endpoints. Attackers can ...
1 month ago
LLMs Open to Manipulation Using Doctored Images, Audio - Such attacks could become a major issue as LLMs become increasingly multimodal or are capable of responding contextually to inputs that combine text, audio, pictures, and even video. Hiding Instructions in Images and Audio At Black Hat Europe 2023 ...
2 years ago Darkreading.com
Concentric AI expands Semantic Intelligence DSPM capabilities with audio and video data protection - Concentric AI unveiled that its Semantic Intelligence DSPM solution now offers sensitive data discovery, identification, risk monitoring, and remediation protection for audio and video files, furthering the data protection capabilities of its DSPM ...
2 years ago Helpnetsecurity.com
Windows 11 24H2 Audio Issue: What You Need to Know - Windows 11 version 24H2 has been reported to have a significant audio issue affecting many users. This problem manifests as audio playback failures or distorted sound output, impacting the overall user experience. The issue appears to be linked to ...
4 months ago Cybersecuritynews.com
Tech Security Year in Review - In this Tech Security Year in Review for 2023, let's look into the top data breaches of the past year. Each factor contributes to the growing threatscape, demanding a proactive and adaptable cybersecurity approach to safeguard your organization ...
2 years ago Securityboulevard.com
The Week in Ransomware - With it being the first week of the New Year and some still away on vacation, it has been slow with ransomware news, attacks, and new information. Last weekend, BleepingComputer tested a new decryptor for the Black Basta ransomware to show how it ...
2 years ago Bleepingcomputer.com Inc ransom Qilin Mallox Black Basta
Android game dev's Google Drive misconfig highlights cloud security risks - Japanese game developer Ateam has proven that a simple Google Drive configuration mistake can result in the potential but unlikely exposure of sensitive information for nearly one million people over a period of six years and eight months. The ...
2 years ago Bleepingcomputer.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
1 year ago Feeds.dzone.com
Linux USB Audio Driver Vulnerability Actively Exploited in the Wild Via Malicious USB - The USB-audio driver in the Linux kernel has an out-of-bounds access vulnerability that possibly enables an attacker with physical access to the system to use a malicious USB device to escalate privileges, modify system memory, or run arbitrary code. ...
10 months ago Cybersecuritynews.com
Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews - Unlike the traditional “Read Aloud” function, which simply reads webpage text in a single synthetic voice, the new AI Audio Overviews feature uses two AI-generated voices to deliver a conversational summary of the content. The browser is ...
7 months ago Cybersecuritynews.com
Windows 11 tests shared Bluetooth audio support, but only for AI PCs - Microsoft is currently testing a new feature in Windows 11 that enables shared Bluetooth audio support, but this functionality is limited exclusively to AI-powered PCs. This development aims to enhance the audio sharing experience by leveraging AI ...
3 months ago Bleepingcomputer.com
Trello API abused to link email addresses to 15 million accounts - An exposed Trello API allows linking private email addresses with Trello accounts, enabling the creation of millions of data profiles containing both public and private information. Trello is an online project management tool owned by Atlassian that ...
2 years ago Bleepingcomputer.com
Hugging Face API tokens exposed, major projects vulnerable The Register - The API tokens of tech giants Meta, Microsoft, Google, VMware, and more have been found exposed on Hugging Face, opening them up to potential supply chain attacks. Researchers at Lasso Security found more than 1,500 exposed API tokens on the open ...
2 years ago Go.theregister.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
1 year ago Venturebeat.com
LastPass: Hackers targeted employee in failed deepfake CEO call - LastPass revealed this week that threat actors targeted one of its employees in a voice phishing attack, using deepfake audio to impersonate Karim Toubba, the company's Chief Executive Officer. While 25% of people have been on the receiving end of an ...
1 year ago Bleepingcomputer.com
Microsoft fixes Windows 11 audio issues confirmed in December - Microsoft has released a fix for the audio issues affecting Windows 11 users, which were initially confirmed in December. The update addresses various sound problems that users experienced after installing previous Windows 11 updates. These audio ...
4 months ago Bleepingcomputer.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
2 years ago Helpnetsecurity.com
When a Data Mesh Doesn't Make Sense - The data mesh is a thoughtful decentralized approach that facilitates the creation of domain-driven, self-service data products. Data mesh-including data mesh governance-requires the right mix of process, tooling, and internal resources to be ...
1 year ago Feeds.dzone.com