Tag: data
-
California fines Disney $2.75 million for data privacy violations
Disney has agreed to pay a $2.75 million to the state of California over allegations that it broke the state’s landmark privacy law by making it exceedingly difficult for consumers to opt out of having their data shared and sold. First seen on therecord.media Jump to article: therecord.media/california-fines-disney-data-privacy
-
Outlook add-in goes rogue and steals 4,000 credentials and payment data
The once popular Outlook add-in AgreeTo was turned into a powerful phishing kit after the developer abandoned the project. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/outlook-add-in-goes-rogue-and-steals-4000-credentials-and-payment-data/
-
Gartner® Names Tenable as the Current Company to Beat for AI-Powered Exposure Assessment in a 2025 Report
Tags: access, ai, api, attack, automation, business, cloud, container, cyber, cybersecurity, data, exploit, finance, flaw, gartner, governance, identity, intelligence, iot, leak, network, risk, service, technology, threat, tool, update, vulnerability“Tenable’s asset and attack surface coverage, its application of AI and its reputation for vulnerability assessment makes it the front-runner in AI-powered exposure assessment,” Gartner writes in “AI Vendor Race: Tenable Is the Company to Beat for AI-Powered Exposure Assessment.” Key Takeaways from Tenable: This is the latest among a recent string of recognitions Tenable…
-
Viral AI Caricatures Highlight Shadow AI Dangers
A viral AI caricature trend is spotlighting shadow AI risks, exposing how public LLM use can lead to data leakage and targeted attacks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/viral-ai-caricatures-highlight-shadow-ai-dangers/
-
Viral AI Caricatures Highlight Shadow AI Dangers
A viral AI caricature trend is spotlighting shadow AI risks, exposing how public LLM use can lead to data leakage and targeted attacks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/viral-ai-caricatures-highlight-shadow-ai-dangers/
-
Viral AI Caricatures Highlight Shadow AI Dangers
A viral AI caricature trend is spotlighting shadow AI risks, exposing how public LLM use can lead to data leakage and targeted attacks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/viral-ai-caricatures-highlight-shadow-ai-dangers/
-
287 Malicious Chrome Extensions Steal Browsing Data from 37.4 Million Users
A new security investigation has uncovered 287 Chrome extensions that appear to secretly send users’ browsing data to remote servers, impacting an estimated 37.4 million installs. That is roughly 1%1% of the global Chrome user base, based on the researchers’ estimate. The researchers built an automated testing pipeline to catch “spying” behavior at scale. They ran Chrome inside a…
-
Phishing campaign chains old Office flaw with fileless XWorm RAT to evade detection
Fileless .NET stage and a modular XWorm core: Beyond initial access, Fortinet observed a fileless .NET stage loaded directly into memory, followed by process hollowing into msbuild.exe, a legitimate Microsoft build tool capable of executing .NET code. The choice of msbuild.exe aligns with the malware’s runtime requirements while helping it blend into normal system activity.”A…
-
Phishing campaign chains old Office flaw with fileless XWorm RAT to evade detection
Fileless .NET stage and a modular XWorm core: Beyond initial access, Fortinet observed a fileless .NET stage loaded directly into memory, followed by process hollowing into msbuild.exe, a legitimate Microsoft build tool capable of executing .NET code. The choice of msbuild.exe aligns with the malware’s runtime requirements while helping it blend into normal system activity.”A…
-
Phishing campaign chains old Office flaw with fileless XWorm RAT to evade detection
Fileless .NET stage and a modular XWorm core: Beyond initial access, Fortinet observed a fileless .NET stage loaded directly into memory, followed by process hollowing into msbuild.exe, a legitimate Microsoft build tool capable of executing .NET code. The choice of msbuild.exe aligns with the malware’s runtime requirements while helping it blend into normal system activity.”A…
-
Healthcare Networks, Financial Regulators, and Industrial Systems on the Same Target List
More than 25 million individuals are now tied to the Conduent Business Services breach as investigations continue to expand its scope. In Canada, approximately 750,000 investors were affected in the CIRO data breach. During roughly the same period, 2,451 vulnerabilities specific to industrial control systems were disclosed by 152 vendors. The latest ColorTokens Threat Advisory……
-
The ephemeral infrastructure paradox: Why short-lived systems need stronger identity governance
Tags: access, automation, cloud, container, credentials, data, framework, github, governance, identity, infrastructure, jobs, network, risk, service, software, toolFigure 1: Governance must move from static reviews to a continuous lifecycle of issuance, verification and automated expiration. Niranjan Kumar Sharma 1. Identity must be cryptographic We must stop relying on IP allowlists. In a world of dynamic containers, network location is a poor proxy for trust.We need to move toward cryptographic identity. Every workload…
-
The FBI Recovered “Deleted” Nest Cam Footage, Here’s Why Every CISO Should Panic
The Nancy Guthrie case reveals data retention issues in cloud technology, as investigators recovered footage from a Google Nest camera that should have been deleted, emphasizing the need for stronger cybersecurity measures for IoT devices First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/the-fbi-recovered-deleted-nest-cam-footage-heres-why-every-ciso-should-panic/
-
Senegalese Data Breaches Expose Lack of ‘Security Maturity’
Green Blood Group steals personal records and biometric data of the West African nation’s nearly 20 million residents. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/hackers-breach-senegal-national-biometric-database
-
Polish hacker charged seven years after massive Morele.net data breach
A 29-year-old Polish man has been charged in connection with a data breach that exposed the personal details of around 2.5 million customers of the popular Polish e-commerce website Morele.net. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/polish-hacker-charged-seven-years-after-massive-morele-net-data-breach
-
Fake CAPTCHA Attacks Exploit Key Entry Point for LummaStealer Malware
Fake CAPTCHA attacks are now a key entry point for a new wave of LummaStealer infections, with CastleLoader loaders turning simple web clicks into full system compromise. Less than a year after a major law-enforcement takedown, the infostealer’s operators have rebuilt at scale and are again harvesting credentials, crypto wallets, and personal data worldwide. LummaStealer…
-
Login Instructions for Various Platforms
Learn how to implement and manage login instructions for various platforms using enterprise SSO, saml, and oidc to prevent data breach risks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/login-instructions-for-various-platforms/
-
Login Instructions for Various Platforms
Learn how to implement and manage login instructions for various platforms using enterprise SSO, saml, and oidc to prevent data breach risks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/login-instructions-for-various-platforms/
-
What elements ensure stability in NHI Lifecycle Management
How Can Organizations Achieve Stability Through NHI Lifecycle Management? How can organizations secure their digital infrastructures effectively? Managing Non-Human Identities (NHIs) presents a formidable challenge, when they necessitate a nuanced approach that addresses every stage of their lifecycle. With technology advances, these machine identities become critical components in safeguarding sensitive data and maintaining robust cybersecurity……
-
Singapore Mounts Largest-Ever Coordinated Cyber Defense
Singapore Signals Heightened Vigilance Against State-Linked Threat Actors. Singapore conducted a yearlong, multi-agency cyber defense operation to expel UNC3886 from all four major telecom providers after the advanced threat actor accessed segments of critical communications infrastructure and extracted limited technical data without disrupting services. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/singapore-mounts-largest-ever-coordinated-cyber-defense-a-30737
-
Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers
Add-ons with 37M installs leak visited URLs to 30+ recipients, researcher says First seen on theregister.com Jump to article: www.theregister.com/2026/02/11/security_researcher_287_chrome_extensions_data_leak/
-
A New Data Theft Gang for the Health Sector to Lose Sleep Over
Newcomer ‘Insomnia’ Appears to Favor US Healthcare-Related Entities. A new cybercriminal gang, Insomnia, appears to have its eyes wide open for potential healthcare-related targets. Since surfacing on the darkweb in recent weeks, the apparent data theft group has chalked up 18 alleged victims on its data leak site, with more than half having ties to…
-
AWS penetration testing: Definition, Policy Tools, and process
Amazon Web Services (AWS) is a cloud-computing platform offered by Amazon, which provides cloud services such as computing power, storage, databases, networking, and automated intelligence. AWS replaces data centres, builds applications, and offers pay-as-you-go. The unique features of AWS are scalability, global infrastructure, security, cost-effectiveness, and flexibility. AWS penetration testing involves a planned attempt to……
-
AWS penetration testing: Definition, Policy Tools, and process
Amazon Web Services (AWS) is a cloud-computing platform offered by Amazon, which provides cloud services such as computing power, storage, databases, networking, and automated intelligence. AWS replaces data centres, builds applications, and offers pay-as-you-go. The unique features of AWS are scalability, global infrastructure, security, cost-effectiveness, and flexibility. AWS penetration testing involves a planned attempt to……
-
Your AI doctor doesn’t have to follow the same privacy rules as your real one
AI apps are making their way into healthcare. It’s not clear that rigorous data security or privacy practices will be part of the package. First seen on cyberscoop.com Jump to article: cyberscoop.com/ai-healthcare-apps-hipaa-privacy-risks-openai-anthropic/
-
Volvo Group hit in massive Conduent data breach
A Conduent breach exposed data of nearly 17,000 Volvo Group North America employees as the total impact rises to 25 million people. A data breach at business services provider Conduent has impacted at least 25 million people, far more than initially reported. Volvo Group North America confirmed that the security breach exposed data of nearly…

