
Image by Kin Shing Lai, from Unsplash
Dior Data Breach Exposes Personal Info Of U.S. Clients
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
The French luxury brand Dior started informing its U.S. customers of a data breach which exposed their personal information..
In a rush? Here are the quick facts:
- Exposed data includes names, addresses, and in some cases, ID and Social Security numbers.
- Payment and bank information were not compromised in the incident.
- Dior is offering 24 months of free credit monitoring to affected individuals.
The company distributed notifications this week to reveal that unauthorized access occurred to Dior client database on January 26, 2025, as first reported by BleepingComputer . However, the breach was only discovered on May 7, prompting an internal investigation to assess its scope.
“Our investigation determined that an unauthorized party was able to gain access to a Dior database that contained information about Dior clients on January 26, 2025,” reads the notice sent to affected individuals.
“Dior promptly took steps to contain the incident, and we have no evidence of subsequent unauthorized access to Dior systems,” the notice reads.
The company revealed that the compromised data included full names, together with contact information, physical addresses, dates of birth, passport or government ID numbers, and Social Security Numbers in specific cases. The company stated that payment card and banking information remained unaffected by the breach.
The company notified law enforcement while bringing in third-party cybersecurity experts to assist with the incident. The affected customers need to stay alert for phishing scams while keeping their financial accounts under close observation.
BleepingComputer reports that Dior provides 24 months of free credit monitoring and identity theft protection services that customers can use until October 31, 2025.
The breach coincides with an earlier disclosure affecting Dior customers in South Korea and China, as noted by BleepingComputer.
It is believed to be linked to a broader cyberattack carried out by the ShinyHunters extortion group, which reportedly accessed LVMH customer data by breaching a third-party vendor.
The LVMH brand Louis Vuitton experienced a similar security incident which affected customers across the UK, South Korea, and Turkey. BleepingComputer received information from sources indicating that both Dior and Louis Vuitton suffered from the same cyberattack. The company has not revealed the number of U.S. customers who experienced the breach.

Image by Anastasiia Nelen, from Unsplash
Former #1 Movie Piracy Site Linked to Global Malware Outbreak
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
FMovies was found operating a worldwide malware campaign which exposed more than 32 million devices to severe security risks.
In a rush? Here are the quick facts:
- FMovies linked to global infostealer malware activity.
- Over 32 million devices reportedly infected worldwide.
- Microsoft traced malware to pirate streaming platforms.
A growing body of evidence is linking the now-defunct FMovies movie piracy site, which held the title of world’s most popular before its 2024 shutdown, as first reported by Torrent Freak (TF).
Microsoft researchers first identified in March 2025 that the malware spread through various pirate streaming sites , and had already infected more than one million devices.
TF reports that Fmovies campaign demonstrated strong connections to attacks which targeted users worldwide. The infostealers would silently extract sensitive data from compromised devices, including personal information, valuable credentials, stored credit card details, cookies/session tokens and crypto wallets.
Despite widespread anti-piracy campaigns warning users about malware threats, many users remained skeptical, as noted by TF. Users of piracy sites frequently dismiss corporate warnings because they believe that these alerts exist only to protect corporate financial interests.
However, TF reports that Hudson Rock’s Cavalier OSINT platform, combined with breach data from Infostealers.com, shows over 32.2 million infected machines and 4.8 million compromised employees. The majority of these infections originated from piracy-related vectors that included domains which the Alliance for Creativity and Entertainment previously seized.
FMovies, in particular, remains a notable case. Although shut down, data shows it still ranks high in infostealer-linked infection rates. In the end, vague warnings may not resonate, but hard data speaks volumes.