Technology
Under Armour data breach claims trigger alerts for millions of users
NEWYou can now listen to Fox News articles!
Sportswear and fitness brand Under Armour is investigating claims of a massive data breach after customer records were posted on a hacker forum.
The breach became widely known after millions of people received alerts warning their information may have been compromised. While Under Armour says its investigation is ongoing, cybersecurity researchers reviewing the leaked data say it appears to include personal details potentially linked to customer purchases.
According to breach notification service Have I Been Pwned, the dataset contains email addresses linked to approximately 72 million people, prompting the organization to notify affected users directly. The scale of the exposure has raised new concerns about how consumer data can be misused long after a breach occurs.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS
Millions of Under Armour customers were alerted after stolen account data surfaced on a hacker forum, bringing the breach into public view. (Thomas Trutschel/Photothek via Getty Images)
What happened in the Under Armour data breach
The stolen data is reportedly linked to a ransomware attack that occurred in November 2025. At the time, the Everest ransomware group claimed responsibility and attempted to extort Under Armour by threatening to leak internal files. In January 2026, customer data from that incident appeared publicly on a popular hacking forum. Soon after, breach notification service Have I Been Pwned obtained a copy of the data and alerted affected users by email. According to reports, the seller claimed the stolen files came directly from the November breach and included millions of customer records.
What data was exposed
The leaked dataset reportedly includes a broad range of personal information. While payment card details have not been confirmed, the exposed data is still valuable to cybercriminals.
Compromised information may include:
Researchers also found email addresses belonging to Under Armour employees within the data. That increases the risk of targeted phishing and business email compromise scams.
Under Armour’s response so far
“We are aware of claims that an unauthorized third party obtained certain data,” an Under Armour spokesperson told CyberGuy. “Our investigation of this issue, with the assistance of external cybersecurity experts, is ongoing. Importantly, at this time, there’s no evidence to suggest this issue affected UA.com or systems used to process payments or store customer passwords. Any implication that sensitive personal information of tens of millions of customers has been compromised is unfounded. The security of our systems and data is a top priority for UA, and we take this issue very seriously.”
Why this breach matters
Even without passwords or payment details, this breach still poses serious risks. Names, email addresses, birth dates and purchase history can be used to create highly convincing scams. Cybercriminals often reference real purchases or account details to gain trust. As a result, phishing emails tied to this breach may appear legitimate and urgent. Over time, exposed data like this can also be combined with other breaches to build detailed identity profiles that are harder to protect against.
How to check if your passwords were stolen
To see if your email was affected, visit the Have I Been Pwned website. It is the first and official source for this newly added dataset. Enter your email address to find out if your information appears in the leak. When done, come back here for Step 1 below.
Ways to stay safe after the Under Armour data breach
If you received a breach alert or believe your information may be included, taking action now can reduce your risk later.
1) Change reused passwords and use a password manager
If you reused the same password on other sites, change those passwords right away. Even if Under Armour says passwords were not affected, exposed email addresses are often used in follow-up attacks. A password manager makes this easier. It creates strong, unique passwords for each account and stores them securely. That way, one breach cannot unlock multiple accounts.
The leaked data reportedly includes email addresses, birth dates and purchase details, which can be exploited in targeted phishing scams. (Kurt “CyberGuy” Knutsson)
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
2) Watch for phishing emails tied to Under Armour
Cybercriminals often move fast after a breach. As a result, emails that appear to come from Under Armour or fitness brands may land in your inbox. Be cautious of messages that claim there is an issue with your account or a recent purchase. Do not click links or open attachments in unexpected emails. Instead, go directly to the company’s official website if you need to check your account. Using strong antivirus software can also help block malicious links and attachments before they cause harm.
ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
3) Turn on two-factor authentication everywhere you can
Two-factor authentication (2FA) adds an extra layer of protection. Even if someone gets your password, they still need a second step to log in. Turn it on for email accounts first. Then enable it for shopping, fitness and financial accounts. This single step can stop many account takeover attempts linked to breached data.
4) Monitor for password reset attempts and account alerts
After a breach, attackers often test stolen email addresses across multiple sites. That activity can trigger password reset emails you did not request. Pay close attention to these alerts. If you see one, secure the account immediately by changing the password and reviewing recent activity.
5) Be skeptical of messages that reference past purchases
This breach included purchase information, which makes scams more convincing. Attackers may reference real products or order details to earn your trust. Treat any message that pressures you to act quickly as suspicious. Legitimate companies do not demand immediate action by email or text.
6) Reduce your exposure with a data removal service
Over time, exposed personal data often ends up with data brokers. These companies collect and sell profiles that scammers use for targeting. A data removal service can help you request the deletion of your information from these databases. Reducing what is publicly available makes it harder for criminals to build detailed profiles.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
Security experts warn that even without payment data, exposed personal information can fuel fraud long after a breach is discovered. (Cheng Xin/Getty Images)
Kurt’s key takeaways
The Under Armour data breach is a reminder that even major global brands can become targets. While payment systems appear unaffected, the exposure of personal data still creates long-term risks for millions of customers. Data breaches often unfold over time. What starts as leaked records can later fuel scams, identity theft and targeted attacks. Staying alert now can reduce the chance of bigger problems later.
If your personal shopping or fitness data were exposed in a breach like this, would you keep using the brand or move on to a competitor? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Dyson’s powerful 360 Vis Nav robovac is down to $279.99 for a limited time
If you’re tired of running your vacuum multiple times just to get the dirt and debris out of the carpets in your living room, Dyson’s 360 Vis Nav is worth a look. It’s one of the more powerful robot vacuums currently available, and now through May 11th (or while supplies last), it’s on sale at Woot for an all-time low of $279.99 ($919 off) with a full two-year warranty.
The last-gen 360 Vis Nav offers a whopping 65 air watts of suction, allowing it to pull dirt, dust, and pet hair from carpets impressively well. In her brief time testing the robovac, my colleague Jennifer Pattison Tuohy said the Dyson “demolished a pile of dry oatmeal in seconds,” adding that she briefly worried it might even suck up the tassels on her large rug (it didn’t). By comparison, many robot vacuums — including Dyson’s new $1,200 Spot + Scrub AI — require multiple passes to fully eradicate the same kind of mess on your floor.
What’s more, the robovac’s small, D-shaped design and the location of its ultra-fluffy brush allow it to dig into edges and corners more effectively than many of the more roundish robot vacuums, while its lower profile lets it easily get under most beds and sofas. The roomy 500ml dustbin also means you likely won’t need to empty it too often, while Dyson’s built-in handle and terrific quick-release button make removing said bin a relatively simple task when it’s time to do so.
While it is undeniably powerful, it’s worth noting that the 360 Vis Nav lacks a few features found on some of its more modern rivals. Although its navigation worked well enough during our testing, it lacks AI-powered obstacle avoidance and doesn’t come with a self-emptying dock. Battery life is also relatively short at around 65 minutes per charge. Nonetheless, if your top priority is quickly removing dust, dirt, and pet hair from carpets without multiple passes, the Dyson remains an option worth considering, especially at this discounted price.
Technology
Global scam crackdown leads to 276 arrests
NEWYou can now listen to Fox News articles!
We’ve often warned you about romance scams and crypto “investment” opportunities that feel too good to pass up. Now, there’s a major update that shows just how organized these operations have become.
The Department of Justice and Federal Bureau of Investigation announced a sweeping international operation that led to at least 276 arrests and the shutdown of multiple scam centers tied to cryptocurrency fraud. These networks targeted Americans and drained millions of dollars from victims.
The operation spanned continents and involved coordinated efforts by law enforcement and tech companies.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
TOP 5 SCAMS SPREADING RIGHT NOW
The Department of Justice and FBI say international scam networks used romance and fake crypto investment schemes to steal millions from victims. (Helena Dolderer/Picture Alliance)
How the cryptocurrency scam crackdown unfolded
Authorities worked with partners around the world, including the Dubai Police and law enforcement agencies in Thailand and beyond. Together, they dismantled at least nine scam centers linked to large-scale crypto fraud.
Several suspects now face federal charges in the United States, including wire fraud and money laundering. Investigators say these operations functioned like businesses, with recruitment, management layers and structured systems designed to deceive victims.
Officials made it clear that this effort sends a message. Fraud crosses borders, and enforcement is now doing the same.
How crypto investment scams target victims
These schemes often follow a pattern known as “pig-butchering.” It is a slow, calculated tactic that builds trust before any money is involved.
A scammer may reach out through social media or a messaging app and start a casual conversation. Over time, that interaction turns more personal. In some cases, it feels like a real relationship. Once trust is established, the topic shifts toward investing, often framed as a unique crypto opportunity.
Victims are guided through setting up accounts and transferring funds to platforms that appear legitimate. The dashboards may even show fake gains to build confidence. At that point, control of the money is already gone. Funds are quickly moved through multiple accounts and eventually end up with the scammers.
Many victims are encouraged to keep going, sometimes borrowing money or taking out loans to invest more. By the time the truth becomes clear, the losses can be devastating.
How Meta Platforms, Inc. helped track scam networks
Meta Platforms, Inc. played a key role in the investigation by providing data that helped law enforcement identify and track these networks.
The company says it has taken aggressive action across its platforms. In 2025 alone, Meta removed more than 159 million scam ads and shut down 10.9 million accounts linked to scam centers. More recently, it disabled over 150,000 accounts connected to these networks as part of a coordinated enforcement effort.
“Meta is committed to combatting online fraud and scams, and we are proud to partner with law enforcement in these efforts,” Chris Sonderby, Meta’s vice president and deputy general counsel, said. “We applaud the DOJ and FBI for their leadership in holding criminal scammers accountable and protecting American consumers.”
FROM FRIENDLY TEXT TO FINANCIAL TRAP: THE NEW SCAM TREND
Federal authorities announced a sweeping international crackdown that led to at least 276 arrests tied to cryptocurrency scam centers targeting Americans. (Kurt “CyberGuy” Knutsson)
New tools to stop cryptocurrency scams in real time
Meta is also rolling out new protections across its apps to help users spot scams before they get pulled in.
On Facebook, users may see alerts tied to suspicious friend requests, especially when an account shows unusual behavior such as limited connections or inconsistent location details.
On WhatsApp, new warnings are designed to prevent scammers from linking their own devices to someone else’s account, giving users a chance to pause before approving a risky request.
Messenger is also expanding its scam detection tools. When a conversation shows patterns linked to common fraud tactics, users may receive prompts that explain the risk and suggest actions like blocking or reporting the account.
Why this cryptocurrency scam crackdown matters to you
This operation highlights how organized these scam networks have become. These are not random messages from a single person. They are coordinated groups running structured operations designed to build trust, create urgency and move money quickly.
Even with hundreds of arrests, the threat remains. New networks continue to emerge, often using the same playbook with slight changes. That means staying informed is still one of the most effective ways to protect yourself.
Ways to stay safe from cryptocurrency scams
Scammers follow familiar patterns, which means there are clear warning signs you can watch for and simple steps you can take to protect yourself.
1) Slow down unexpected connections
If someone you do not know reaches out and quickly builds a personal connection, slow things down and question the situation. Scammers rely on momentum, so taking a pause can help you spot inconsistencies.
2) Verify investment platforms before sending money
Before sending money to any investment platform, take time to verify that it is legitimate. A professional-looking website or app does not guarantee it is real. Look for independent reviews and official registration details.
3) Avoid sending crypto to unknown sources
Avoid sending cryptocurrency to individuals or platforms you cannot confirm. Once those transactions go through, they are extremely difficult to recover.
4) Watch for pressure and urgency
Be aware of pressure. If someone pushes you to act quickly or invest more, that urgency is often a warning sign.
5) Use strong antivirus protection
Strong antivirus software can help block malicious links, fake investment sites and other threats before they reach you, adding another layer of defense against scam attempts. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
THE ONE THING SCAMMERS CHECK BEFORE TARGETING YOU ONLINE
Meta said it removed more than 159 million scam ads in 2025 and helped investigators track networks tied to cryptocurrency fraud. (Halfpoint/Getty Images)
6) Limit your personal data exposure
Scammers often rely on publicly available information to build trust. Reducing how much of your personal data appears online by using a data removal service can make it harder for them to target you in the first place. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.
7) Strengthen your account security
It also helps to strengthen your digital security. Enable two-factor authentication (2FA) on your accounts and use trusted security tools to reduce exposure to malicious links and messages.
8) Report scams as soon as possible
If you believe you have been targeted or defrauded, report it to the FBI’s Internet Crime Complaint Center at ic3.gov as soon as possible.
Kurt’s key takeaways
This global crackdown is a meaningful step forward. It shows what can happen when law enforcement, tech companies and international partners work together. At the same time, these scams are not going away. The tactics will continue to evolve, and new networks will take the place of those that were shut down. Awareness and caution remain your strongest defenses.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
We report a lot about scams but not so much about scammers getting caught. Does this make you feel like real progress is being made in stopping them? Let us know by writing to us at CyberGuy.com.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Asus chases Elgato with its own secondary touchscreen display
Asus’s latest gaming monitor is a little smaller than usual. The ROG Strix XG129C, announced on Friday, is a 12.3-inch touchscreen IPS display that’s intended to be a sidekick for a larger main monitor, similar to the 14.1-inch secondary display in the 2020 Asus ROG Zephyrus Duo 15. It’s a slightly smaller competitor to Corsair’s Xeneon Edge, which has a 14.5-inch display, but the same 720p resolution.
Asus says the XG129C covers 125 percent of the sRGB color gamut and 90 percent of the DCI-P3 color gamut. It also comes with a one-year subscription for the hardware monitoring tool AIDA64 Extreme, which would usually cost $65. Besides acting as a performance monitor for your PC, sidekick displays like this can also be handy as an extension for streaming or editing setups, much like Elgato’s Stream Deck.
Along with the little XG129C, Asus also announced the ROG Strix OLED XG34WCDMS, a 34-inch RGB Tandem QD-OLED gaming monitor. It features a 280Hz refresh rate and a 3440 x 1440p resolution, and, according to Asus, covers 99 percent of the DCI-P3 color gamut. Asus has not yet officially announced pricing for either display.
-
West Virginia1 second ago
wvnews.com | WVNews | Trusted West Virginia News, Sports & Local Coverage
-
Wyoming6 minutes ago(LETTERS) Sun Bucks and Wyoming GOP endorsement
-
Crypto12 minutes agoLagarde Blocks Euro Stablecoin Push, Calls $300B Market a Stability Risk for ECB Policy
-
Finance18 minutes agoBofA revises Harley-Davidson stock price after latest announcement
-
Fitness24 minutes agoStrategic Exercise Techniques to Maximize Mood Elevation – The Boca Raton Tribune
-
Movie Reviews36 minutes ago1986 Movie Reviews – Dangerously Close, Fire with Fire, Last Resort, and Short Circuit | The Nerdy
-
World48 minutes agoTop 50 English-language news sites in the world in April: Just three newsbrands grow traffic in past month
-
News54 minutes agoThe New Harvard Trend? Getting Punched in the Face.