Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      10 Benefits of Hiring a React.js Development Company (2025–2026 Edition)

      August 13, 2025

      From Line To Layout: How Past Experiences Shape Your Design Career

      August 13, 2025

      Hire React.js Developers in the US: How to Choose the Right Team for Your Needs

      August 13, 2025

      Google’s coding agent Jules gets critique functionality

      August 13, 2025

      The best smartphones without AI features in 2025: Expert tested and recommended

      August 13, 2025

      GPT-5 was supposed to simplify ChatGPT but now it has 4 new modes – here’s why

      August 13, 2025

      Gemini just got two of ChatGPT’s best features – and they’re free

      August 13, 2025

      The HP OmniBook 5 laptop offers 34 hours of battery life – and it’s 60% off today only

      August 13, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel Boost is released

      August 13, 2025
      Recent

      Laravel Boost is released

      August 13, 2025

      Frontend Standards for Optimizely Configured Commerce: Clean & Scalable Web Best Practices

      August 13, 2025

      Live Agent Escalation in Copilot Studio Using D365 Omnichannel – Architecture and Use Case

      August 13, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      OpenAI’s Sam Altman: GPT-5 fails to meet AGI standards amid Microsoft’s fading partnership — “it’s still missing something”

      August 13, 2025
      Recent

      OpenAI’s Sam Altman: GPT-5 fails to meet AGI standards amid Microsoft’s fading partnership — “it’s still missing something”

      August 13, 2025

      You Think You Need a Monster PC to Run Local AI, Don’t You? — My Seven-Year-Old Mid-range Laptop Says Otherwise

      August 13, 2025

      8 Registry Tweaks that will Make File Explorer Faster and Easier to Use on Windows 11

      August 13, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»WestJet Confirms Passenger Data Breach in June 2025 Cyberattack

    WestJet Confirms Passenger Data Breach in June 2025 Cyberattack

    August 13, 2025

    WestJet data breach

    Earlier this year, WestJet revealed that some of its passengers were affected by a cyberattack that resulted in the theft of personal information. The WestJet data breach, which took place in June 2025, has now been confirmed to be targeting passenger data.  

    While the airline has confirmed that no credit card numbers, debit card details, or user passwords were compromised, the breach involved sensitive information such as passports and other travel-related data. 

    The WestJet Data Breach 

    The WestJet data breach was discovered on June 13, 2025, when the airline detected suspicious activity within its systems. A subsequent investigation confirmed that an unauthorized third party had gained access to parts of the airline’s infrastructure. 

    The stolen data varies for each affected individual, but it includes personal details such as names, dates of birth, email addresses, phone numbers, and mailing addresses. Additionally, recent travel booking information, including booking numbers, was also compromised.  

    More concerning, however, is the exposure of travel documents, such as passports or other government-issued identification information, which are highly sensitive and valuable to criminals. 

    WestJet clarified that no credit card or debit card numbers were obtained during the cyberattack. Similarly, user passwords associated with accounts were not part of the breach. Despite these reassurances, the stolen personal data, including travel history and passport information, could still be used for identity theft or fraud. 

    Response to the WestJet Cyberattack 

    Upon discovering the WestJet data breach, the airline immediately took steps to contain the incident. The airline worked with both internal and external cybersecurity experts to investigate the nature and scope of the breach. Although the airline confirmed that no flight operations were disrupted, it acknowledged that certain personal data had been stolen. 

    WestJet also offered affected passengers complimentary identity theft protection and monitoring services for 24 months, to help mitigate the potential risks stemming from the breach. 

    Regulatory Oversight and Ongoing Investigation 

    Following the WestJet data breach, the airline notified the relevant authorities, including Canada’s Privacy Commissioner, Transport Canada, and other provincial and international bodies.  

    The breach is under investigation by the Office of the Privacy Commissioner of Canada, which will assess whether the airline met its legal obligations regarding data protection. In addition, WestJet has worked closely with law enforcement agencies and the Canadian Centre for Cyber Security to identify the perpetrators behind the attack. 

    While WestJet has contained the breach, the investigation is still ongoing. The airline has implemented additional security measures to strengthen its systems and prevent similar incidents in the future. The company has also made further updates to its cybersecurity protocols as part of its ongoing response to the attack. 

    Conclusion 

    The Cyber Express has reached out to the airline to learn more about this cyberattack. However, at the time of writing this, no official information or statement has been received. This is an ongoing story, and The Cyber Express will be closely monitoring the situation.  

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAdobe Patch Tuesday Fixes Over 60 Vulnerabilities Across 13 Products
    Next Article Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics

    Related Posts

    Development

    Laravel Boost is released

    August 13, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    August 13, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    I don’t play my handheld gaming PCs without this $10 accessory — Here’s why it’s a must-have for anyone who owns an ROG Ally, Steam Deck, or Legion Go

    News & Updates

    CVE-2025-48115 – Javier Revilla ValidateCertify CSRF

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-29534 – PowerStick Wave Dual-Band Wifi Extender Remote Code Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    How to Unblock and Access Pornhub in Arkansas [2025]

    Operating Systems

    Highlights

    Linux

    Rilasciato Archinstall 3.0.5: sicurezza migliorata e nuove funzionalità

    May 15, 2025

    Archinstall è un programma di installazione testuale interattivo per Arch Linux, progettato per semplificare il…

    CVE-2025-44184 – SourceCodester Best Employee Management System Cross Site Scripting

    May 14, 2025

    CVE-2025-5597 – Airleader MASTER Authentication Bypass

    June 4, 2025

    CVE-2025-5380 – Ashinigit XueShengZhuSu Image File Upload Remote Path Traversal Vulnerability

    May 31, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.