Tag: data-breach
-
Opsec oopsie: Dutch navy frigate location outed by mailing it a Bluetooth tracker
Tags: data-breachOr, how public information and a Euro5 tracker exposed an avoidable opsec lapse First seen on theregister.com Jump to article: www.theregister.com/2026/04/17/dutch_navy_frigate_tracked/
-
Opsec oopsie: Dutch navy frigate location outed by mailing it a Bluetooth tracker
Tags: data-breachOr, how public information and a Euro5 tracker exposed an avoidable opsec lapse First seen on theregister.com Jump to article: www.theregister.com/2026/04/17/dutch_navy_frigate_tracked/
-
Operation PowerOFF: 53 DDoS domains seized and 3 Million criminal accounts uncovered
Operation PowerOFF shut down 53 DDoS-for-hire domains, arrested four suspects, and exposed data on over 3 million criminal user accounts. Operation PowerOFF is an international law enforcement action that dismantled 53 domains linked to DDoS-for-hire services used by over 75,000 cybercriminals. Authorities arrested four suspects, seized infrastructure, and gained access to databases containing more than…
-
Exposed LLM Infrastructure: How Attackers Find and Exploit Misconfigured AI Deployments
Exposed LLM servers are being actively scanned and exploited. Learn how attackers find misconfigured AI infrastructure and how to secure it fast. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/exposed-llm-infrastructure-how-attackers-find-and-exploit-misconfigured-ai-deployments/
-
SEO Poisoning Attack Uses Microsoft Binary to Install RMM Tool
New research has exposed a search engine poisoning campaign that delivers a trojanized TestDisk installer, abuses a Microsoft-signed binary for DLL sideloading, and silently deploys the ScreenConnect remote monitoring and management (RMM) client for hands-on keyboard access. The rogue domain copies the branding of the real open-source data recovery tool, presenting itself as “The Ultimate…
-
Europas Datenleck-Krise: Deutschland ist wieder Hauptziel für Cybererpressung in Europa
Die aktuelle Lage markiert einen Wendepunkt. Datenlecks sind kein Randphänomen mehr, sondern ein strukturelles Risiko für Wirtschaft und Gesellschaft. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/europas-datenleck-krise-deutschland-ist-wieder-hauptziel-fuer-cybererpressung-in-europa/a44683/
-
Recently leaked Windows zero-days now exploited in attacks
Threat actors are exploiting three recently disclosed Windows security vulnerabilities in attacks aimed at gaining SYSTEM or elevated administrator permissions. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/recently-leaked-windows-zero-days-now-exploited-in-attacks/
-
Censys Warns 6 Million Public-Facing FTP Servers Are Still Exposed in 2026
A new security brief from internet intelligence firm Censys reveals that the 55 year old File Transfer Protocol continues to run on nearly 6 million internet facing hosts. As of April 2026, the dominant story of FTP exposure is not purpose built file transfer infrastructure, but rather a dangerous accumulation of platform defaults. Censys researchers…
-
Article 12 and the Logging Mandate: What the EU AI Act Actually Requires FireTail Blog
Tags: access, ai, breach, ciso, cloud, compliance, control, data, data-breach, finance, GDPR, grc, healthcare, infrastructure, insurance, jobs, metric, monitoring, regulation, risk, saas, service, toolApr 16, 2026 – Lina Romero – When GDPR arrived, the organisations that had mistaken documentation for capability were the ones that struggled the most. They had policies about data retention but no technical controls enforcing those policies. They had breach notification procedures but no systems capable of detecting a breach in time to use…
-
Critical nginx UI tool vulnerability opens web servers to full compromise
Tags: access, ai, api, attack, authentication, ceo, credentials, data-breach, endpoint, exploit, infrastructure, Internet, risk, service, software, threat, tool, update, vulnerability/mcp_message, was implemented without authentication, a weakness Pluto Security dubbed ‘MCPwn’.”This exposes 12 MCP tools, including config writes with automatic nginx reload, to any host on the network. One unauthenticated API call is all it takes to inject a config and take over nginx,” said Pluto Security.Leveraging MCPwn, an attacker would be able to intercept…
-
Cookeville Regional Medical Center hospital data breach impacts 337,917 people
A ransomware attack on Cookeville Regional Medical Center hospital (Tennessee) exposed data of 337,000 people after hackers stole 500GB of sensitive information from its systems. A ransomware attack on Cookeville Regional Medical Center (CRMC) in Tennessee led to a major data breach affecting about 337,000 people. The attack, carried out by the Rhysida group, involved…
-
Critical nginx UI tool vulnerability opens web servers to full compromise
Tags: access, ai, api, attack, authentication, ceo, credentials, data-breach, endpoint, exploit, infrastructure, Internet, risk, service, software, threat, tool, update, vulnerability/mcp_message, was implemented without authentication, a weakness Pluto Security dubbed ‘MCPwn’.”This exposes 12 MCP tools, including config writes with automatic nginx reload, to any host on the network. One unauthenticated API call is all it takes to inject a config and take over nginx,” said Pluto Security.Leveraging MCPwn, an attacker would be able to intercept…
-
Breach Roundup: Mr. Raccoon Wants Your Password
Tags: breach, china, data, data-breach, flaw, fortinet, healthcare, leak, password, phishing, ransomware, scamAlso, Eurail Breach, ChipSoft Hospital Disruptions, W3LL Phishing Takedown. This week, a Raccoon-linked actor hit help desks, Eurail exposed 308K users, Fortinet patched critical flaws, Pushpaganda scams, major data leaks hit healthcare and China, ransomware and phishing ops surged, and multiple breaches impacted firms and hospitals. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/breach-roundup-mr-raccoon-wants-your-password-a-31450
-
Critical nginx UI tool vulnerability opens web servers to full compromise
Tags: access, ai, api, attack, authentication, ceo, credentials, data-breach, endpoint, exploit, infrastructure, Internet, risk, service, software, threat, tool, update, vulnerability/mcp_message, was implemented without authentication, a weakness Pluto Security dubbed ‘MCPwn’.”This exposes 12 MCP tools, including config writes with automatic nginx reload, to any host on the network. One unauthenticated API call is all it takes to inject a config and take over nginx,” said Pluto Security.Leveraging MCPwn, an attacker would be able to intercept…
-
Danske Bank upgrade error exposed 20,000 customer addresses
Danish bank revealed details of a customer data leak last year which affected thousands of customers First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641711/Danske-Bank-upgrade-error-exposed-20000-customer-addresses
-
The deepfake dilemma: From financial fraud to reputational crisis
Tags: ai, authentication, business, ceo, communications, control, cyber, data-breach, deep-fake, exploit, finance, fraud, malicious, phone, resilience, risk, threat, toolDeepfakes as tools for financial fraud: Deepfakes have quickly become a powerful enabler of financial fraud. This is largely because most business communication channels, like video and voice calls, remain unauthenticated. A single convincing audio or video call, seemingly from a trusted executive, can bypass established controls in minutes. Employees in these scenarios often follow…
-
Danske Bank upgrade error exposed 20,000 customer addresses
Danish bank revealed details of a customer data leak last year which affected thousands of customers First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641711/Danske-Bank-upgrade-error-exposed-20000-customer-addresses
-
The deepfake dilemma: From financial fraud to reputational crisis
Tags: ai, authentication, business, ceo, communications, control, cyber, data-breach, deep-fake, exploit, finance, fraud, malicious, phone, resilience, risk, threat, toolDeepfakes as tools for financial fraud: Deepfakes have quickly become a powerful enabler of financial fraud. This is largely because most business communication channels, like video and voice calls, remain unauthenticated. A single convincing audio or video call, seemingly from a trusted executive, can bypass established controls in minutes. Employees in these scenarios often follow…
-
McGraw-Hill Confirms Data Exposure, Hackers Claim 45M Salesforce Records Leaked
McGraw-Hill confirms a data exposure tied to a Salesforce misconfiguration as hackers claim 45M records, raising concerns over SaaS security risks. The post McGraw-Hill Confirms Data Exposure, Hackers Claim 45M Salesforce Records Leaked appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-mcgraw-hill-salesforce-data-exposure-45m-records/
-
7 biggest healthcare security threats
Tags: access, ai, api, attack, breach, business, cloud, control, credentials, cyber, cyberattack, cybersecurity, dark-web, data, data-breach, email, endpoint, google, government, hacking, healthcare, HIPAA, infrastructure, injection, insurance, Internet, phishing, risk, security-incident, service, software, spam, sql, threat, tool, vulnerabilityCloud vulnerabilities and misconfigurations: Many healthcare organizations have adopted cloud services as part of broader digital transformation initiatives. As a result, patient health information (PHI) and other sensitive data is increasingly being hosted in vendor cloud environments.The trend has broadened attack surface at healthcare organizations, says Anthony James, vice president of products at Infoblox, especially…
-
Massive Chrome Extension Scam Exposes 20,000 Users to Data Theft
Researchers linked 108 malicious Chrome extensions to a coordinated campaign that exposed about 20,000 users to data theft, backdoors, and ad injection. The post Massive Chrome Extension Scam Exposes 20,000 Users to Data Theft appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-malicious-chrome-extensions-data-theft/
-
7 biggest healthcare security threats
Tags: access, ai, api, attack, breach, business, cloud, control, credentials, cyber, cyberattack, cybersecurity, dark-web, data, data-breach, email, endpoint, google, government, hacking, healthcare, HIPAA, infrastructure, injection, insurance, Internet, phishing, risk, security-incident, service, software, spam, sql, threat, tool, vulnerabilityCloud vulnerabilities and misconfigurations: Many healthcare organizations have adopted cloud services as part of broader digital transformation initiatives. As a result, patient health information (PHI) and other sensitive data is increasingly being hosted in vendor cloud environments.The trend has broadened attack surface at healthcare organizations, says Anthony James, vice president of products at Infoblox, especially…
-
What to do When Your AI Guardrails Fail
I want to talk about a bug. Not because the bug itself was exceptional, but because what it exposed should change how every organisation architects AI governance. For several weeks earlier this year, Microsoft 365 Copilot read and summarised confidential emails despite sensitivity labels and Data Loss Prevention policies being correctly configured to block that…
-
We’re only seeing the tip of the chip-smuggling iceberg
A string of federal indictments has exposed a pervasive shadow network of data centers and fake products spanning Southeast Asia. To secure national security, the U.S. must move enforcement from the airport gate to the factory floor. First seen on cyberscoop.com Jump to article: cyberscoop.com/ai-chip-smuggling-china-export-controls-enforcement-op-ed/
-
Data breach at edtech giant McGraw Hill affects 13.5 million accounts
The ShinyHunters extortion group has leaked data from 13.5 million McGraw Hill user accounts, stolen after breaching the company’s Salesforce environment earlier this month. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/data-breach-at-edtech-giant-mcgraw-hill-affects-135-million-accounts/
-
Smashing Security podcast #463: This AI company leaked its own code. It’s also built something terrifying
A hacking group claims to have broken into the flood defence system protecting Venice’s Piazza San Marco – and is offering to sell access to whoever wants it. The asking price? A frankly insulting $600. First seen on grahamcluley.com Jump to article: grahamcluley.com/smashing-security-podcast-463/
-
Fashion retailer Express left customers’ personal data and order details exposed to the internet
Retail giant Express was publicly spilling customer information to the open web. The bug is now fixed after TechCrunch alerted Express, but the company would not say if it plans to notify customers. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/16/fashion-retailer-express-left-customers-personal-data-and-order-details-exposed-to-the-internet/
-
“I’m Just Scared”: Teen Hacker Jailed After Massive U.S. School Data Breach
Hacker Matthew Lane, now 20, played a central role in the PowerSchool data breach, one of the largest cyberattacks in U.S. education history. As he headed to federal prison in Connecticut, he admitted fear and regret, writing, “It’s extremely sad, and I’m just scared.” First seen on thecyberexpress.com Jump to article: thecyberexpress.com/hacker-matthew-lane-powerschool-data-breach/
-
“I’m Just Scared”: Teen Hacker Jailed After Massive U.S. School Data Breach
Hacker Matthew Lane, now 20, played a central role in the PowerSchool data breach, one of the largest cyberattacks in U.S. education history. As he headed to federal prison in Connecticut, he admitted fear and regret, writing, “It’s extremely sad, and I’m just scared.” First seen on thecyberexpress.com Jump to article: thecyberexpress.com/hacker-matthew-lane-powerschool-data-breach/

