Privacy and Security \ Lynda Not following

Product name

Lynda

ISO 27001 certified

not detected

HIPAA certified

not detected

SOC2 type1 certified

not detected

SOC2 type2 certified

not detected

Dataprotectionofficer contact

not detected

Security page(s)

No security pages detected

Typically contains the following data

Unknown

Compliance documentation

We don't have documentation available yet.

Suppliers

Not detected

Additional information

Not detected

Known data breaches

1. LinkedIn Scraped and Faked Data (2023) breach on 2023-11-04

Description
In November 2023, a post to a popular hacking forum alleged that millions of LinkedIn records had been scraped and leaked. On investigation, the data turned out to be a combination of legitimate data scraped from LinkedIn and email addresses constructed from impacted individuals' names.
Records affected
19788753
Type of data leaked
Email addresses, Genders, Geographic locations, Job titles, Names, Professional skills, Social media profiles
Source

2. LinkedIn Scraped Data (2021) breach on 2021-04-08

Description
During the first half of 2021, LinkedIn was targeted by attackers who scraped data from hundreds of millions of public profiles and later sold them online. Whilst the scraping did not constitute a data breach nor did it access any personal data not intended to be publicly accessible, the data was still monetised and later broadly circulated in hacking circles. The scraped data contains approximately 400M records with 125M unique email addresses, as well as names, geographic locations, genders and job titles. LinkedIn specifically addresses the incident in their post on An update on report of scraped data.
Records affected
125698496
Type of data leaked
Education levels, Email addresses, Genders, Geographic locations, Job titles, Names, Social media profiles
Source

3. LinkedIn breach on 2012-05-05

Description
In May 2016, LinkedIn had 164 million email addresses and passwords exposed. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data.
Records affected
164611595
Type of data leaked
Email addresses, Passwords
Source

Last verified

2024-01-22 12:15:04 UTC
© 2024 Falcon Projects bv