• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Intruders Latest Cybersecurity News Windows security

Globant data breach by LAPSUSS affected 70 GB of data

John Greenwood Posted On March 31, 2022
0



Globant data breach

Globant data breach has been confirmed by the company as threat actors have gained accessed their key repository. In a statement by the company, Globant confirmed that a limited section of their code repository was accessed by hackers.

“We have activated our security protocols and are conducting an exhaustive investigation. According to our current analysis, the information that was accessed was limited to certain source code and project-related documentation for a very limited number of clients. To date, we have not found any evidence that other areas of our infrastructure systems or those of our clients were affected. We are taking strict measures to prevent further incidents”, said the company.

Globant data breach and the LAPSUS$ hackers behind it

On Tuesday, the popular hacking group LapusS shared a 70GB data of Globant’s customer source code in their Telegram channel.  “For anyone who is interested about the poor security practices in use at Globant.com I will expose the admin credentials for ALL there devops platforms below,” the group said.

Lapsus$ shared Globant system administrator credentials for Github, Crucible, Confluence and JIRA as well as few other related documents linked to Globant data breach and their customers. As per a cybersecurity researcher Sourfiane Tahiri tweet, the data breach must have begun from Colombia and Bogota.

Most of what I'm seeing for now, from this #Globant leak, points toward Colombia. If this leak comes from a compromised employee account (as #Lapsus tended to use) I bet on Globant offices in Bogota. pic.twitter.com/5GA7r2dzDW

— Soufiane Tahiri (@S0ufi4n3) March 30, 2022

Lapsus$ is already the buzz on the cybersecurity industry with data breaches on Microsoft, Okta, NVIDIA, Samsung and other major tech giants. Only recently. London law enforcement arrested seven teenagers of LapsusS group.

Lapsus$ hackers announced they are taking a vacation for the week and will be back with more leaks. The same has been done, as they leaked the data of Globant.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends


CybersecurityData Breachdata security


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

You may also like
Top 9 Best Log Management Tools for 2025
September 20, 2025
Top 4 Remote Support Tools for 2025- Best Remote Support Solution
September 18, 2025
Top 5 Best Unified Endpoint Management (UEM) Software for 2025
September 12, 2025
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search