Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
APT threats: Prevention is better than cure
From insight to action: Securing APAC’s future with AI-driven cy...
Nexusguard Partners with DIMA to Provide Advanced DDoS Protection Serv...
Critical zero-day exploits dormant WinRAR vulnerability to target glob...
Survey finds 57% of respondents had experienced ransomware attacks in ...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      From insight to action: Securing APAC’s future with AI-driven cybersecurity

      From insight to action: Securing APAC's future with AI-driven cybersecurity

      Wednesday, August 13, 2025, 10:07 AM Asia/Singapore | Features
    • Featured

      Experts weigh in on Singapore’s response to UNC3886

      Experts weigh in on Singapore’s response to UNC3886

      Friday, August 8, 2025, 10:45 PM Asia/Singapore | Features, Newsletter, Opinions
    • Featured

      When legitimate URLs lead to dangerous destinations

      When legitimate URLs lead to dangerous destinations

      Wednesday, August 6, 2025, 11:04 AM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Features
    • Featured

      From insight to action: Securing APAC’s future with AI-driven cybersecurity

      From insight to action: Securing APAC's future with AI-driven cybersecurity

      Wednesday, August 13, 2025, 10:07 AM Asia/Singapore | Features
    • Featured

      Experts weigh in on Singapore’s response to UNC3886

      Experts weigh in on Singapore’s response to UNC3886

      Friday, August 8, 2025, 10:45 PM Asia/Singapore | Features, Newsletter, Opinions
    • Featured

      When legitimate URLs lead to dangerous destinations

      When legitimate URLs lead to dangerous destinations

      Wednesday, August 6, 2025, 11:04 AM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning
News

Haute couture, faible sécurité: luxury retailer’s data leak leaves customers with eye bags

By CybersecAsia editors | Friday, May 16, 2025, 1:19 PM Asia/Singapore

Haute couture, faible sécurité: luxury retailer’s data leak leaves customers with eye bags

A cyberattack exposes personal details of high-end shoppers, leaving them sleepless about privacy and phishing threat escalations in the near future.

On 7 May 2025, French luxury brand detected unauthorized access to a customer database, subsequently disclosing that a data breach had impacting customers in multiple countries, especially China and South Korea.

The compromised information includes names, gender, phone numbers, email addresses, mailing addresses, purchase history, and shopping preferences. No financial data such as bank account numbers, International Bank Account Numbers or credit card details had been stolen.

Upon discovering the incident, Dior had immediately taken steps to contain it, launched an investigation with cybersecurity experts, and begun notifying affected customers via SMS and other means.

The firm has also reported the breach to relevant regulatory authorities, and issued a formal apology for the incident. Affected customers will need to remain vigilant for suspicious communications, such as emails, calls, or messages that may attempt to exploit the leaked personal information.

While the exact number of affected customers has not been disclosed, only those whose data was compromised have received direct notifications.

Industry observers have pointed out that the Dior breach is part of a wider wave of cyberattacks targeting major retailers and luxury brands, with recent incidents affecting brands such as Marks & Spencer and Harrods.

Said Marijus Briedis, Chief Technology Officer, NordVPN: “Dior may have contained the damage, but the ripple effects land squarely in the customer’s inbox. Now is the time for consumers to get serious about password hygiene, watch for targeted scams, and treat every message skeptically.” This was in reference to the standard best practices for the aftermath of a data breach, such as tightening password hygiene, enabling multi-factor/biometric authentication features, and stepping up vigilance on all accounts that were accessible with the breached information.

According to other experts such as Jake Moore, Global Cybersecurity Advisor, ESET, retail and luxury brands are prime targets due to the high-value personal data they hold.

Share:

PreviousAdmitad Launches OEM Advertising Division to Drive Mobile Growth through Device Manufacturer Partnerships
NextExperts urge action on May 2025 Patch Tuesday zero-days, highlight legacy risks

Related Posts

APAC security predictions 2022

APAC security predictions 2022

Tuesday, December 14, 2021

Five cybersecurity trends in an increasingly complex 2025     

Five cybersecurity trends in an increasingly complex 2025     

Tuesday, January 7, 2025

Seven new IoT/IoMT vulnerabilities exposed in healthcare/manufacturing sectors

Seven new IoT/IoMT vulnerabilities exposed in healthcare/manufacturing sectors

Friday, March 11, 2022

Severe vulnerability of engineering stations by one manufacturer disclosed

Severe vulnerability of engineering stations by one manufacturer disclosed

Tuesday, March 2, 2021

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • PT Kereta Api Indonesia announces nationwide email and communication overhaul

    PT Kereta Api Indonesia announces nationwide email and communication overhaul

    The state railway operator’s upgraded email system improves privacy, operational reliability, and regulatory alignment for …Read more
  • Operationalizing sustainability in cybersecurity: Group-IB’s approach

    Operationalizing sustainability in cybersecurity: Group-IB’s approach

    See how the firm turned malware-group takedowns into measurements of sustainability and resilience gains: by …Read more
  • Thai government expands secure email management to close cybersecurity gaps

    Thai government expands secure email management to close cybersecurity gaps

    New measures address cybersecurity gaps in public sector communications, deploying advanced protections and operational support …Read more
  • How Iress optimized global DevSecOps

    How Iress optimized global DevSecOps

    Scaling compliance, security & efficiency – while seamlessly migrating to the cloud – with JFrog.Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.