The wine and liquor store BevMo suffered a payment card breach, a hacker stole credit card numbers and other information from more than 14,000 customers who purchased goods on the website.
The company has notified the California attorney general’s office that a threat actor has injected a software skimmer into the checkout page of the website.
Attackers used a software skimmer that allowed them to capture information from orders placed between Aug. 2 and Sept. 26. Stolen data includes customer names, phone numbers, addresses and credit and debit card numbers along with security codes.
The wine and liquor store announced to have removed the malicious code from its online store and confirmed an ongoing investigation.
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – BevMo, Payment Card breach)
[adrotate banner=”5″] [adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.