Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Will robocall fraud start to decline in 2026 with stronger regulations...
Zero-click vulnerability in the Apple ecosystem still a lingering conc...
‘Want to avoid Swiss Cheese cybersecurity? Heed Hammurabi’s Code!
EnGenius Networks Japan Wins Judges’ Special Award at Interop To...
Reolink Celebrates 16 Years with 10s Pre-Recording Altas Battery Camer...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Will your organization’s defenses be breached due to your suppliers’ weak cybersecurity?

      Will your organization’s defenses be breached due to your suppliers’ weak cybersecurity?

      Thursday, May 29, 2025, 5:04 PM Asia/Singapore | Features
    • Featured

      How the UAE proactively protects its digital economy

      How the UAE proactively protects its digital economy

      Monday, May 19, 2025, 2:16 PM Asia/Singapore | Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Features
    • Featured

      Will your organization’s defenses be breached due to your suppliers’ weak cybersecurity?

      Will your organization’s defenses be breached due to your suppliers’ weak cybersecurity?

      Thursday, May 29, 2025, 5:04 PM Asia/Singapore | Features
    • Featured

      How the UAE proactively protects its digital economy

      How the UAE proactively protects its digital economy

      Monday, May 19, 2025, 2:16 PM Asia/Singapore | Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning
News

Haute couture, faible sécurité: luxury retailer’s data leak leaves customers with eye bags

By CybersecAsia editors | Friday, May 16, 2025, 1:19 PM Asia/Singapore

Haute couture, faible sécurité: luxury retailer’s data leak leaves customers with eye bags

A cyberattack exposes personal details of high-end shoppers, leaving them sleepless about privacy and phishing threat escalations in the near future.

On 7 May 2025, French luxury brand detected unauthorized access to a customer database, subsequently disclosing that a data breach had impacting customers in multiple countries, especially China and South Korea.

The compromised information includes names, gender, phone numbers, email addresses, mailing addresses, purchase history, and shopping preferences. No financial data such as bank account numbers, International Bank Account Numbers or credit card details had been stolen.

Upon discovering the incident, Dior had immediately taken steps to contain it, launched an investigation with cybersecurity experts, and begun notifying affected customers via SMS and other means.

The firm has also reported the breach to relevant regulatory authorities, and issued a formal apology for the incident. Affected customers will need to remain vigilant for suspicious communications, such as emails, calls, or messages that may attempt to exploit the leaked personal information.

While the exact number of affected customers has not been disclosed, only those whose data was compromised have received direct notifications.

Industry observers have pointed out that the Dior breach is part of a wider wave of cyberattacks targeting major retailers and luxury brands, with recent incidents affecting brands such as Marks & Spencer and Harrods.

Said Marijus Briedis, Chief Technology Officer, NordVPN: “Dior may have contained the damage, but the ripple effects land squarely in the customer’s inbox. Now is the time for consumers to get serious about password hygiene, watch for targeted scams, and treat every message skeptically.” This was in reference to the standard best practices for the aftermath of a data breach, such as tightening password hygiene, enabling multi-factor/biometric authentication features, and stepping up vigilance on all accounts that were accessible with the breached information.

According to other experts such as Jake Moore, Global Cybersecurity Advisor, ESET, retail and luxury brands are prime targets due to the high-value personal data they hold.

Share:

PreviousAdmitad Launches OEM Advertising Division to Drive Mobile Growth through Device Manufacturer Partnerships
NextExperts urge action on May 2025 Patch Tuesday zero-days, highlight legacy risks

Related Posts

Synthetic fraud is escalating: identity intelligence in SEA requires overhauling

Synthetic fraud is escalating: identity intelligence in SEA requires overhauling

Tuesday, May 6, 2025

Hackers are now abusing emails from legitimate online services to snare victims

Hackers are now abusing emails from legitimate online services to snare victims

Wednesday, April 5, 2023

The 2022/2023 cat-and-mouse cybercrime war continues

The 2022/2023 cat-and-mouse cybercrime war continues

Friday, October 20, 2023

Over 400 vulnerabilities discovered in Qualcomm Snapdragon Chips

Over 400 vulnerabilities discovered in Qualcomm Snapdragon Chips

Wednesday, August 12, 2020

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    With only a small IT team, the digital transformation has united operations across 30 locations, …Read more
  • Automating border control and security with facial recognition technology

    Automating border control and security with facial recognition technology

    Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam …Read more
  • Securing wealth advisory services without unnecessary friction: Endowus

    Securing wealth advisory services without unnecessary friction: Endowus

    The wealth advisory platform demonstrates its non-negotiable commitment to a robust security posture through partnering …Read more
  • LifeTech group sets up next-gen security operations center in Malaysia

    LifeTech group sets up next-gen security operations center in Malaysia

    By partnering with a unified cybersecurity platform, the firm will be offering cost-effective advanced SOC …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.