Australia-based HR software provider PageUp recently shared another update on the data breach disclosed earlier this year. The company says it has found no evidence that the attackers have actually stolen any data from its systems.
The security incident was identified on May 23 after the firm detected suspicious activity on its IT infrastructure. Roughly two weeks later, it notified customers that contact information, usernames, password hashes and other data may have been taken.
Specifically, the attacker may have gained access to information belonging to current and former employees of PageUp clients, PageUp client job applicants, and agencies.
PageUp says it has 2.6 million active users across over 190 countries, and the incident resulted in some of the company’s customers shutting down their online recruitment pages.
PageUp informed customers last week that its investigation had been completed and there was no evidence that any data was actually stolen.
“A detailed forensic investigation on the PageUp security incident in May this year has concluded that while an attacker was successful in installing tools that could exfiltrate data, no specific evidence was found that data was exfiltrated,” the company said.
PageUp notified data regulators in both the UK and Australia shortly after discovering the breach. A statement issued by Australian authorities following public disclosure noted that the risk of identity theft was low, but warned that the compromised information could be more useful for phishing emails and phone scams.
The Australian Cyber Security Centre (ACSC) highlighted at the time that “there is a significant distinction between information being accessed (which means there has been a systems breach) and information being exfiltrated by the offender.”
A few weeks after PageUp disclosed the breach to customers, Florida-based HR services provider ComplyRight revealed that its tax reporting platform was involved in a cybersecurity incident that resulted in the exposure of personal information.
Related: OSIsoft Warns Employees, Contractors of Data Breach

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
Latest News
- Italy Temporarily Blocks ChatGPT Over Privacy Concerns
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Report: Chinese State-Sponsored Hacking Group Highly Active
- Votiro Raises $11.5 Million to Prevent File-Borne Threats
- Lumen Technologies Hit by Two Cyberattacks
- Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Severe Azure Vulnerability Led to Unauthenticated Remote Code Execution
