The European airplane manufacturer Airbus announced to have suffered a data breach, hackers broke into the company “Commercial Aircraft business” information systems and gained access to some of its employees’ personal information.
“Airbus SE (stock exchange symbol: AIR) detected a cyber incident on Airbus “Commercial Aircraft business” information systems, which resulted in unauthorised access to data. There is no impact on Airbus’ commercial operations. “reads the statement published by the company.
According to the European aerospace corporation, the intrusion has happened earlier this month, the good news is that the security breach did not affect its commercial operations either the aircraft production.
The company did not share further details on the hack, it confirmed that investigations are ongoing to “understand if any specific data was targeted,”
However, data accessed by hackers are mostly professional contact and IT identification details of some Airbus employees in Europe.
“Investigations are ongoing to understand if any specific data was targeted; however we do know some personal data was accessed,” continues the statement.
Airbus declared to have begun taking immediate and appropriate actions to reinforce existing security measures. and to mitigate the potential impact of the data breach.
The airplane maker has also instructed its employees to “take all necessary precautions going forward,” to strengthen their security defenses.
The company reported the incident the regulatory authorities and the data protection authorities pursuant to the European Union’s new GDPR (General Data Protection Regulation) rules. It advised its employees to remain vigilant and to take all necessary precautions going forward.
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, data breach)
[adrotate banner=”5″] [adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.