BP joins Sun Microsystems, Cisco and IBM on the list of companies that had personal information leaked when a laptop was stolen from Ernst & Young in January, The Register reports.Ernst & Young reportedly distributed a letter to all of BP’s 38,000 U.S. workers, informing them that their names and Social Security numbers were contained in a stolen laptop, according to The Register.Though personal information on all 38,000 was leaked, the company said the file containing the information did not say what was contained within, and the computer was password protected, according to the Register.The stolen laptop is the same machine that contained personal information on Sun, IBM and Cisco workers, the Register reports. Ernst & Young also recently lost four additional laptops in Miami, according to The Register, but it did not detail which specific customers may have had information stored on the machines. The company has largely remained mum on the subject, saying only that the computer that contained BP/Cisco/IBM/Sun personal information was protected with a password, The Register reports.Though no definite figures have been released as to how many people were affected, and to what extent, The Register estimates that since it has been confirmed the breach exposed all current and former IBM staffers who spent time working overseas, at least 100,000 people had information compromised in that one incident alone. For related coverage, read Stolen Fidelity Laptop Contained Info on 196,000 HP Staffers.Keep checking in at our CSO Security Feed page for updated news coverage. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe