• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

SAP fixed 26 flaws in August 2025 Update, including 4 Critical

 | 

August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day

 | 

Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs

 | 

Chrome sandbox escape nets security researcher $250,000 reward

 | 

Smart Buses flaws expose vehicles to tracking, control, and spying

 | 

MedusaLocker ransomware group is looking for pentesters

 | 

Google confirms Salesforce CRM breach, faces extortion threat

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

 | 

Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Embargo Ransomware nets $34.2M in crypto since April 2024

 | 

Germany limits police spyware use to serious crimes

 | 

Phishing attacks exploit WinRAR flaw CVE-2025-8088 to install RomCom

 | 

French firm Bouygues Telecom suffered a data breach impacting 6.4M customers

 | 

Columbia University data breach impacted 868,969 people

 | 

SonicWall dismisses zero-day fears after Ransomware probe

 | 

Air France and KLM disclosed data breaches following the hack of a third-party platform

 | 

CISA, Microsoft warn of critical Exchange hybrid flaw CVE-2025-53786

 | 

Microsoft unveils Project Ire: AI that autonomously detects malware

 | 

CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

 | 

Over 100 Dell models exposed to critical ControlVault3 firmware bugs

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Data Breach
  • Hacking
  • VeriSource data breach impacted 4M individuals

VeriSource data breach impacted 4M individuals

Pierluigi Paganini April 29, 2025

VeriSource breach exposed data of 4M people in Feb 2024; stolen info includes personal details from an employee benefits services provider.

VeriSource is alerting 4 million people after a February 2024 breach that exposed personal information. The data was stolen on February 27, 2024, and the incident was discovered on February 28, 2024.

The company launched an investigation into the security breach.

“April 24, 2025 – Verisource Services, Inc. (“VSI”) experienced a data security incident that involved personal information belonging to employees and dependents of companies that use VSI’s services and has provided notice of this incident to impacted individuals. On February 28, 2024, VSI became aware of unusual activity on our network environment. Upon discovering this activity, VSI immediately took steps to secure our network and launched an investigation with the assistance of independent cybersecurity experts. The investigation subsequently revealed that certain personal information was acquired without authorization on or about February 27, 2024. VSI then commenced a comprehensive review of the affected data to determine whether any sensitive data was involved and whether personal information may have been affected.” reads the notice of data breach published by the company. “On August 12, 2024, that review concluded and we confirmed that certain personal information was involved. Based on that review, an initial set of notices were issued beginning on August 20, 2024.  VSI also notified its client companies and continued to work with them to collect the necessary information to notify additional individuals affected by this incident. That process was completed on April 17, 2025. We then took steps to notify impacted individuals of the incident as quickly as possible.”

The review ended on August 12, 2024, revealing personal data like names, addresses, dates of birth, gender, and/or Social Security numbers were compromised. Notifications began August 20, 2024, and were completed by April 17, 2025. Not all data types were impacted for every individual.

The employee benefit administrative services provider VeriSource Services (VSI) is notifying impacted employees and dependents.

VSI reported the breach to the FBI, HHS, and credit agencies, the company is not aware of any misuse of stolen data.

VeriSource offered free 12-month ID protection to the impacted individuals.

Impacted individuals are advised to closely monitor their debit and credit card statements for any unusual activity and promptly contact their card issuer if they notice anything suspicious.

​VeriSource Services, Inc., established in 1997 and headquartered in Houston, Texas, is a privately held company specializing in employee benefits administration and enrollment solutions for employer groups. The company offers a range of services, including COBRA administration, dependent verification, ACA reporting, eligibility monitoring, consolidated billing, and direct billing services. The company leverages proprietary, rules-based technology to deliver customized, cost-effective solutions tailored to each client’s needs.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, data breach)


facebook linkedin twitter

you might also like

Pierluigi Paganini August 12, 2025
August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day
Read more
Pierluigi Paganini August 12, 2025
Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    SAP fixed 26 flaws in August 2025 Update, including 4 Critical

    Uncategorized / August 13, 2025

    August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day

    Hacking / August 12, 2025

    Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs

    Hacking / August 12, 2025

    Researchers cracked the encryption used by DarkBit ransomware

    Malware / August 12, 2025

    Chrome sandbox escape nets security researcher $250,000 reward

    Hacking / August 11, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT