voice phishingaddressed to an employee allowed an authorized actor to access almost 900,000 records containing names and e-mail addresses, in addition to other limited data from an inherited marketing tool after an acquisition in 2021. You can read Aura's official note here: Aura's statement . BleepingComputer, who has been asking Aura for discrepancies in numbers and scope. Have I Been Pwned (HIBP), which added the leak to its database and noted that, in addition to the basic fields, the files included customer service comments and even IP addresses. HIBP also noted that most of the exposed emails - about 90% - were already on their base for previous incidents, which does not subtract gravity but does partly explain the overlap of addresses. vishing- phone supplanting - may avoid security controls if the employees are not prepared or if the verification procedures are laxity. Secondly, the incorporation of tools and databases from acquired companies can carry old risks if data access and governance controls are not properly cleaned and aligned. Have I Been PwnedAnd wait for Aura's official communication. Although the company claims that no passwords or financial data were displayed, it is prudent to strengthen surveillance: activate multifactor authentication where possible, review unusual activity alerts in accounts associated with the mail that could be leaked and, if appropriate, consider additional measures such as credit freezing or fraud alerts as recommended by the consumer protection authorities. BleepingComputerand annotations to Have I Been Pwned They're good starting points. And if you receive communications that appear to be related to this incident, it confirms its veracity with official sources before providing more data.


Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...