Advertisement
Top

Data loss, Threats & Malware

Mintlify Data Breach Leads to Exposure of Customer GitHub Tokens

March 19, 2024

Via: Security Week

Mintlify helps developers generate code documentation. It requires access to the source code, such as GitHub repositories, to analyze it, understand its purpose, and create descriptions. In an incident notice on its website, the San Francisco-based company says that 91 […]


Hacker, Threats & Malware

Ukraine cyber police arrested crooks selling 100 million compromised accounts

March 19, 2024

Via: Security Affairs

The Ukraine cyber police and the national police have arrested three individuals who are suspected to have hacked over 100 million emails and Instagram accounts worldwide and offered them for sale. The three men obtained the account credentials by carrying […]


Threats & Malware, Vulnerabilities

New Attack Shows Risks of Browsers Giving Websites Access to GPU 

March 18, 2024

Via: Security Week

The research focused on WebGPU, an API that enables web developers to use the underlying system’s GPU to carry out high-performance computations in a web browser. By leveraging this API, they have demonstrated an attack that works entirely from the […]


Data loss, Threats & Malware

Fujitsu Data Breach Impacts Personal, Customer Information

March 18, 2024

Via: Security Week

According to the company, it discovered that multiple work computers within its environment were infected with malware and disconnected them from the network. Furthermore, Fujitsu said in an incident notification written in Japanse, the investigation into the attack has revealed […]


Editorial

The Power of Zero Trust for Business Security

March 15, 2024

Via: Caitlin Simmons

Cybersecurity has always been a game of cat and mouse, with all of us constantly having to brush up on the latest threats and defenses to be able to stand a chance at safety. Initially, businesses’ security efforts were pointed […]


Data loss, Threats & Malware

Millions of users may have had data leaked in new French government agency security breach

March 15, 2024

Via: TechRadar

A French government agency suffered a cyberattack which has apparently resulted in the country’s largest-ever data leak incident, affecting as many as 43 million victims. The agency is called France Travail, the country’s unemployment registry and assistance organization, which helps […]


Cyber-crime, Data loss, Malware, Threats & Malware

Nissan Oceania data breach impacted roughly 100,000 people

March 14, 2024

Via: Security Affairs

Nissan Oceania, the regional division of the multinational carmaker, announced in December 2023 that it had suffered a cyber attack and launched an investigation into the incident. Nissan immediately notified the Australian Cyber Security Centre and the New Zealand National […]


Threats & Malware, Vulnerabilities

Fortinet Warns of Severe SQLi Vulnerability in FortiClientEMS Software

March 14, 2024

Via: The Hacker News

Fortinet has warned of a critical security flaw impacting its FortiClientEMS software that could allow attackers to achieve code execution on affected systems. “An improper neutralization of special elements used in an SQL Command (‘SQL Injection’) vulnerability [CWE-89] in FortiClientEMS […]


Cyber-crime, Malware

Ande Loader Malware Targets Manufacturing Sector in North America

March 14, 2024

Via: The Hacker News

The threat actor known as Blind Eagle has been observed using a loader malware called Ande Loader to deliver remote access trojans (RATs) like Remcos RAT and NjRAT. The attacks, which take the form of phishing emails, targeted Spanish-speaking users […]


Threats & Malware, Virus & Malware

Keyloggers, spyware, and stealers dominate SMB malware detections

March 13, 2024

Via: Help Net Security

In 2023, 50% of malware detections for SMBs were keyloggers, spyware and stealers, malware that attackers use to steal data and credentials, according to Sophos. Attackers subsequently use this stolen information to gain unauthorized remote access, extort victims, deploy ransomware, […]


Mobile, Wireless security

BSAM: Open-source methodology for Bluetooth security assessment

March 13, 2024

Via: Help Net Security

Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated last week at RootedCON in Madrid. “Many of the examples presented during the conference were […]


Data loss, Threats & Malware

EquiLend Ransomware Attack Leads to Data Breach 

March 12, 2024

Via: Security Week

On January 24, the company announced that some of its systems were taken offline due to “a technical issue” and that services would be disrupted for several days. EquiLend, which confirmed the next day that the disruption was caused by […]


Cyber warfare, Cyber-crime

Russia-aligned hackers take down French state services in massive DDoS attack

March 12, 2024

Via: CSO Online

Anonymous Sudan, a Russian-speaking hacktivist group, has claimed the severe distributed denial of service (DDoS) attacks that disrupted several French government services on Monday. In a statement issued on Monday, Prime Minister Gabriel Attal’s office confirmed that a series of […]


Hacker, Threats & Malware

Russian Hackers Gained Access to Microsoft Source Code, Customer Secrets

March 11, 2024

Via: SecureWorld

In a sobering update released March 8th, Microsoft has revealed that the Russian state-sponsored hacking group Midnight Blizzard, also tracked as Nobelium, has gained unauthorized access to some of the company’s source code repositories and internal systems. This follows an […]


Application security, Security

API sprawl: navigating the web of connectivity and security challenges

March 11, 2024

Via: TechRadar

In today’s fast evolving digital space, the proliferation of application programming interfaces (APIs) has been nothing short of explosive. One forecast predicts there will be nearly 1.7 billion active APIs by 2030 which ushers in unparalleled opportunities for innovation and […]


Threats & Malware, Virus & Malware

Change Healthcare Restores Pharmacy Services Disrupted by Ransomware

March 8, 2024

Via: Security Week

In an incident update on Thursday, the company revealed that it continues to work aggressively on restoring its systems and services and that key functionality is coming back online. “Electronic prescribing is now fully functional with claim submission and payment […]


Threats & Malware, Vulnerabilities

CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability

March 8, 2024

Via: The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting JetBrains TeamCity On-Premises software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2024-27198 (CVSS score: […]


Mobile, Mobile security

13 WhatsApp Scams to Know in 2024 + Tips to Stay Safe

March 7, 2024

Via: Panda Security

WhatsApp scams and text scams can deceive users into giving away personal information and trick them into paying money for fake services or products. According to Robokiller, there were 19.2 billion spam texts sent in January 2024 alone. This equates […]


Cyber-crime, Data loss, Malware, Threats & Malware

LockBit 3.0’s Bungled Comeback Highlights the Undying Risk of Torrent-Based (P2P) Data Leakage

March 6, 2024

Via: Security Affairs

While embattled ransomware gang LockBit 3.0 fights for its survival following Operation Cronos, a coordinated takedown of the syndicate’s web infrastructure by global authorities, the availability of victim data leaked by the gang persists via peer-to-peer (P2P) torrent networks. The […]


Cyber warfare, Cyber-crime

Ukraine’s GUR hacked the Russian Ministry of Defense

March 5, 2024

Via: Security Affairs

The Main Intelligence Directorate (GUR) of Ukraine’s Ministry of Defense announced it had breached the Russian Ministry of Defense servers as part of a special operation, and exfiltrated confidential documents. Stolen documents include: confidential documents, including orders and reports circulated […]