A further dump of Sony Pictures corporate secrets appears to have been put on the Internet over the weekend, with hackers warning of more to come.A message pointing to 5 gigabytes of data was posted to the Pastebin website and signed by GOP. Thats presumably the same “Guardians of Peace” group or person that claimed responsibility for the Sony Pictures hack.“We are preparing for you a Christmas gift,” said the message. The gift will be larger quantities of data. And it will be more interesting. The gift will surely give you much more pleasure and put Sony Pictures into the worst state.The message asked Sony to send an email to one of five anonymous addresses “to tell us what you want in our Christmas gift.” The files carried the same password as previous releases and were entitled “My Life At The Company – Part 2.”The post was subsequently removed from Pastebin. It pointed to five websites hosting BitTorrent tracker files, which are used by BitTorrent software to locate files on the global file-sharing network. Several of the sites hosting the tracker files appear to have removed them.It was not immediately possible to determine the contents of the files in the latest data dump.Sony Pictures was hacked in late November and has had to endure two weeks of embarrassing leaks of corporate information onto the Internet.The major Hollywood movie studio first saw several unreleased movies uploaded then salary information about its employees. Leaks have also included medical information about employees, financial data, contracts for TV shows and, last week, the Outlook email boxes of two senior executives. Those email leaks revealed embarassing message exchanges with executives at Sony and other Hollywood studios.Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn’s e-mail address is martyn_williams@idg.com Related content news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Security feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe