Tag: data-breach
-
Conduent says data breach originally began with 2024 intrusion
The cyberattack, which impacted several state agencies, has also impacted multiple insurance providers. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/conduent-data-breach-began-2024-intrusion/803930/
-
Iranian Intel-Linked Cybersecurity School Hit by Data Breach
Ravin Academy Records Reveal Identities of More Than 1,000 Participants. A public database of internal records from Iran’s Ravin Academy – a cyber school linked to the Ministry of Intelligence – has been published online, exposing potentially sensitive data on over 1,000 trainees, including individuals reportedly tied to Western institutions. First seen on govinfosecurity.com Jump…
-
Google disputes false claims of massive Gmail data breach
Google was once again forced to announce that it had not suffered a data breach after numerous news outlets published sensational stories about a fake breach that purportedly exposed 183 million accounts. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/google-disputes-false-claims-of-massive-gmail-data-breach/
-
Sweden’s power grid operator confirms data breach claimed by ransomware gang
The utility responsible for operating Sweden’s power grid is investigating a data breach after a ransomware group threatened to leak hundreds of gigabytes of purportedly stolen internal data. First seen on therecord.media Jump to article: therecord.media/sweden-power-grid-operator-data
-
DomeWatch Leak Exposed Personal Data of Capitol Hill Applicants
Unsecured House Democrats’ resume bank (DomeWatch) exposed 7,000 records, including PII and “top secret” clearance status, raising identity theft fears. First seen on hackread.com Jump to article: hackread.com/domewatch-leak-capitol-hill-applicants-data/
-
Hundreds of People With ‘Top Secret’ Clearance Exposed by House Democrats’ Website
A database containing information on people who applied for jobs with Democrats in the US House of Representatives was left accessible on the open web. First seen on wired.com Jump to article: www.wired.com/story/hundreds-of-people-with-top-secret-clearance-exposed-by-house-democrats-website/
-
706,000+ BIND 9 DNS Resolvers Exposed to Cache Poisoning PoC Released
A critical vulnerability affecting more than 706,000 BIND 9 DNS resolvers worldwide has been disclosed with proof-of-concept exploit code now publicly available. The security flaw enables attackers to perform cache poisoning attacks by injecting malicious DNS records into vulnerable resolver caches, potentially redirecting users to attacker-controlled infrastructure. The vulnerability, tracked as CVE-2025-40778, was disclosed by…
-
NDSS 2025 Oreo: Protecting ASLR Against Micro-Architectural Attacks
Authors, Creators & Presenters: Shixin Song (Massachusetts Institute of Technology), Joseph Zhang (Massachusetts Institute of Technology), Mengjia Yan (Massachusetts Institute of Technology) PAPER Oreo: Protecting ASLR Against Microarchitectural Attacks Address Space Layout Randomization (ASLR) is one of the most prominently deployed mitigations against memory corruption attacks. ASLR randomly shuffles program virtual addresses to prevent attackers…
-
Uncovering Qilin attack methods exposed through multiple cases
Cisco Talos investigated the Qilin ransomware group, uncovering its frequent attacks on the manufacturing sector, use of legitimate tools for credential theft and data exfiltration, and sophisticated methods for lateral movement, evasion, and persistence. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/uncovering-qilin-attack-methods-exposed-through-multiple-cases/
-
Yale New Haven Health Will Pay $18M to Settle Hack Lawsuit
March Breach Affected Nearly 5.6 Million; NextGen Proposed Settlement Also Reached. Connecticut’s largest healthcare network – Yale New Haven Health System – has agreed to pay $18 million to settle class action litigation filed in the aftermath of a March hack affecting nearly 5.6 million people. The incident ranks as the biggest health data breach…
-
IIS Servers Hijacked via Exposed ASP.NET Machine Keys, Malicious Modules Injected in the Wild
Security researchers have uncovered a sophisticated cyberattack campaign that exploited publicly exposed ASP.NET machine keys to compromise hundreds of Internet Information Services (IIS) servers worldwide. The operation, detected in late August and early September 2025, deployed a previously undocumented malicious module dubbed >>HijackServer
-
IIS Servers Hijacked via Exposed ASP.NET Machine Keys, Malicious Modules Injected in the Wild
Security researchers have uncovered a sophisticated cyberattack campaign that exploited publicly exposed ASP.NET machine keys to compromise hundreds of Internet Information Services (IIS) servers worldwide. The operation, detected in late August and early September 2025, deployed a previously undocumented malicious module dubbed >>HijackServer
-
IIS Servers Hijacked via Exposed ASP.NET Machine Keys, Malicious Modules Injected in the Wild
Security researchers have uncovered a sophisticated cyberattack campaign that exploited publicly exposed ASP.NET machine keys to compromise hundreds of Internet Information Services (IIS) servers worldwide. The operation, detected in late August and early September 2025, deployed a previously undocumented malicious module dubbed >>HijackServer
-
3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation
A malicious network of YouTube accounts has been observed publishing and promoting videos that lead to malware downloads, essentially abusing the popularity and trust associated with the video hosting platform for propagating malicious payloads.Active since 2021, the network has published more than 3,000 malicious videos to date, with the volume of such videos tripling since…
-
Ransomware recovery perils: 40% of paying victims still lose their data
Tags: access, attack, authentication, backup, breach, business, ceo, crypto, cyber, cybersecurity, data, data-breach, encryption, extortion, finance, GDPR, group, incident response, insurance, leak, mfa, privacy, ransom, ransomware, resilience, risk, risk-management, service, threat, updateAdditional recovery pressures: Modern ransomware attacks now routinely involve double or triple extortion whereby attackers threaten to leak stolen data or launch distributed denial of service (DDoS) attacks even after payment.This fundamentally changes the calculus on what victims can expect in cases where they decide to make a ransomware payment, which more often than not…
-
Ransomware recovery perils: 40% of paying victims still lose their data
Tags: access, attack, authentication, backup, breach, business, ceo, crypto, cyber, cybersecurity, data, data-breach, encryption, extortion, finance, GDPR, group, incident response, insurance, leak, mfa, privacy, ransom, ransomware, resilience, risk, risk-management, service, threat, updateAdditional recovery pressures: Modern ransomware attacks now routinely involve double or triple extortion whereby attackers threaten to leak stolen data or launch distributed denial of service (DDoS) attacks even after payment.This fundamentally changes the calculus on what victims can expect in cases where they decide to make a ransomware payment, which more often than not…
-
Prosper Marketplace Data Breach Expands: 17.6 Million Users Impacted in Database Intrusion
In a significant development in one of the year’s largest fintech breaches, new reports released today confirm that Prosper Marketplace, the San Franciscobased peer-to-peer lending platform, suffered a data compromise affecting roughly 17.6 million people. The updated figure, first published by TechRadar and Tom’s Guide, sheds light on the scale of the incident and reveals……
-
Toys “R” Us Canada warns customers’ info leaked in data breach
Toys “R” Us Canada has sent notices of a data breach to customers informing them of a security incident where threat actors leaked customer records they had previously stolen from its systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/toys-r-us-canada-warns-customers-info-leaked-in-data-breach/
-
Prompt hijacking puts MCP-based AI workflows at risk
oatpp-mcp, the MCP implementation for Oat++ (oatpp), a popular framework for developing web applications in C++. Tracked as CVE-2025-6515, the flaw stems from the fact that oatpp-mcp generates guessable session IDs for use in its communication with MCP clients, an issue that other MCP servers might have as well. The Model Context Protocol was developed…
-
F5 Networks Breach: A Wake-Up Call for Supply Chain Cybersecurity
When a foundational technology provider like F5 Networks, whose systems power government agencies, critical infrastructure, and enterprises worldwide, suffers a cyber breach, the ripple effects extend far beyond a single organization. This latest attack has once again exposed the growing vulnerabilities within global technology supply chains and the urgent need for unified, proactive cybersecurity visibility.…
-
F5 Networks Breach: A Wake-Up Call for Supply Chain Cybersecurity
When a foundational technology provider like F5 Networks, whose systems power government agencies, critical infrastructure, and enterprises worldwide, suffers a cyber breach, the ripple effects extend far beyond a single organization. This latest attack has once again exposed the growing vulnerabilities within global technology supply chains and the urgent need for unified, proactive cybersecurity visibility.…
-
FinWise data breach shows why encryption is your last defense
The FinWise breach shows that when insider threats strike, encryption is the last line of defense. Penta Security’s D.AMO platform unites encryption, key management, and access control to keep sensitive data secure. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/finwise-data-breach-shows-why-encryption-is-your-last-defense/
-
From Path Traversal to Supply Chain Compromise: Breaking MCP Server Hosting
We found a path traversal vulnerability in Smithery.ai that compromised over 3,000 MCP servers and exposed thousands of API keys. Here’s how a single Docker build bug nearly triggered one of the largest AI supply chain attacks to date. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/from-path-traversal-to-supply-chain-compromise-breaking-mcp-server-hosting/
-
From Path Traversal to Supply Chain Compromise: Breaking MCP Server Hosting
We found a path traversal vulnerability in Smithery.ai that compromised over 3,000 MCP servers and exposed thousands of API keys. Here’s how a single Docker build bug nearly triggered one of the largest AI supply chain attacks to date. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/from-path-traversal-to-supply-chain-compromise-breaking-mcp-server-hosting/
-
Bridging the Remediation Gap: Introducing Pentera Resolve
From Detection to Resolution: Why the Gap PersistsA critical vulnerability is identified in an exposed cloud asset. Within hours, five different tools alert you about it: your vulnerability scanner, XDR, CSPM, SIEM, and CMDB each surface the issue in their own way, with different severity levels, metadata, and context.What’s missing is a system of action.…
-
CAASM and EASM: Top 12 attack surface discovery and management tools
Tags: access, ai, api, attack, automation, blockchain, business, cloud, control, corporate, credentials, cyber, cybersecurity, dark-web, data, data-breach, detection, dns, endpoint, exploit, framework, guide, hacking, HIPAA, incident response, infrastructure, intelligence, Internet, leak, marketplace, microsoft, monitoring, network, open-source, PCI, risk, risk-assessment, service, soc, software, supply-chain, technology, threat, tool, update, vulnerabilityCAASM and EASM tools for attack surface discovery and management: Periodic scans of the network are no longer sufficient for maintaining a hardened attack surface. Continuous monitoring for new assets and configuration drift are critical to ensure the security of corporate resources and customer data.New assets need to be identified and incorporated into the monitoring…
-
UK data regulator defends decision not to investigate MoD Afghan data breach
ICO says probe unnecessary after reviewing ministry’s handling of leak First seen on theregister.com Jump to article: www.theregister.com/2025/10/22/ico_afghan_leak_probe/

