Tag: leak
-
Xoxo to Prague
by
in SecurityNewsIn this week’s newsletter, Thor inspects the LockBit leak, finding $10,000 “security tips,” ransom negotiations gone wrong and a rare glimpse into the human side of cybercrime. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/xoxo-to-prague/
-
Australian Human Rights Commission leaks docs to search engines
by
in SecurityNewsThe Australian Human Rights Commission (AHRC) disclosed a data breach incident where private documents leaked online and were indexed by major search engines. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/australian-human-rights-commission-leaks-docs-to-search-engines/
-
Info leak hits Russian aviation center
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/info-leak-hits-russian-aviation-center
-
Twilio denies breach following leak of alleged Steam 2FA codes
Twilio has denied in a statement for BleepingComputer that it was breached after a threat actor claimed to be holding over 89 million Steam user records with one-time access codes. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/twilio-denies-breach-following-leak-of-alleged-steam-2fa-codes/
-
Why Your Biggest Secret Leaks Happen Behind the Firewall: Private vs. Public Repos
by
in SecurityNewsPrivate repos leak plaintext secrets 8x more often than public ones. Learn why internal codebases are the biggest blind spot in your secrets management strategy. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/why-your-biggest-secret-leaks-happen-behind-the-firewall-private-vs-public-repos/
-
New Intel CPU flaws leak sensitive data from privileged memory
by
in SecurityNewsA new “Branch Privilege Injection” flaw in all modern Intel CPUs allows attackers to leak sensitive data from memory regions allocated to privileged software like the operating system kernel. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-intel-cpu-flaws-leak-sensitive-data-from-privileged-memory/
-
Did LockBit Just Get Locked Out? The Walmart of Ransomware’s Massive Leak
by
in SecurityNewsHas the notorious LockBit ransomware gang finally met its end? In a shocking turn of events, LockBit, one of the most notorious ransomware groups, has had its own site defaced and a massive amount of data dumped. LockBit’s own leak site was defaced with a bold message: “Do not crime. Crime is bad.” Alongside that,……
-
Sicherheit ist mehr als Verschlüsselung: Drei Tipps, wie Unternehmen ihre Kommunikation sicherer machen
by
in SecurityNewsDer aktuelle Signal-Leak der US-Regierung zeigt ein grundsätzliches Problem: Sicherheit in der Kommunikation ist nicht nur äußerst wichtig, sondern auch sehr komplex. Wird sie missachtet, entstehen Image- und Vertrauensverluste oder finanzielle oder Wettbewerbsrisiken. Wie können sich Unternehmen schützen und vorbereiten? Was sollten sie beachten? Wildix, Anbieter von Unified Communications as a Service, gibt drei Praxistipps……
-
What the LockBit 3.0 data leak reveals
by
in SecurityNewsAn administration interface instance for the ransomware franchise’s affiliates was attacked on 29 April. Data from its SQL database has been extracted and disclosed First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366623780/Ransomware-What-the-LockBit-30-data-leak-reveals
-
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences. But with this power comes new risks, like data leaks, identity theft, and malicious misuse.If your company is exploring or already using AI agents, you need to ask: Are they secure?AI agents work with sensitive data…
-
Hackers hit deportation airline GlobalX, leak flight manifests, and leave an unsubtle message for >>Donnie<< Trump
by
in SecurityNewsGlobalX Airlines, a charter airline being used by the US government for deportation flights, has been attacked by hacktivists who have made off with what they claim are detailed flight records and passenger manifests. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/hackers-globalx-message-trump
-
Qilin Ransomware Ranked Highest in April 2025 with 72 Data Leak Disclosures
by
in SecurityNewsThreat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign observed in November 2024.”NETXLOADER is a new .NET-based loader that plays a critical role in cyber attacks,” Trend Micro researchers Jacob Santos, Raymart Yambot, John…
-
LLM02: Sensitive Information Disclosure FireTail Blog
by
in SecurityNewsMay 08, 2025 – Lina Romero – In 2025, AI security is a relevant issue. With the landscape changing so rapidly and new risks emerging every day, it is difficult for developers and security teams to stay on top of AI security. The OWASP Top 10 Risks for LLM attempts to break down the most prevalent…
-
The LockBit ransomware site was breached, database dump was leaked online
by
in SecurityNewsLockbit ransomware group has been compromised, attackers stole and leaked data contained in the backend infrastructure of their dark web site. Hackers compromised the dark web leak site of the LockBit ransomware gang and defaced it, posting a message and a link to the dump of the MySQL database of its backend affiliate panel. >>Don’t…
-
Hacker Leaks Stolen LockBit Ransomware Operation Database
by
in SecurityNewsExposes Details of Victims, ‘Aggressive’ Negotiations, Cryptocurrency Addresses. One year to the day after an international law enforcement operation unmasked and indicted the leader of the notorious LockBit ransomware group, a hacker has sent the group another love letter. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/hacker-leaks-stolen-lockbit-ransomware-operation-database-a-28350
-
Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures
by
in SecurityNewsThreat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign observed in November 2024.”NETXLOADER is a new .NET-based loader that plays a critical role in cyber attacks,” Trend Micro researchers Jacob Santos, Raymart Yambot, John…
-
xAI Secret Leak: The Story of a Disclosure
by
in SecurityNewsAI adoption accelerates secret sprawl as organizations connect to multiple providers. Our investigation of a leaked xAI API key, which granted access to unreleased Grok models, reveals critical flaws in their disclosure process, highlighting necessary improvements in this domain. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/xai-secret-leak-the-story-of-a-disclosure/
-
ClickFunnels Investigates Breach After Hackers Leak Business Data
by
in SecurityNewsClickFunnels is investigating a data breach after hackers leaked detailed business data, including emails, phone numbers, and company… First seen on hackread.com Jump to article: hackread.com/clickfunnels-investigate-breach-hackers-leak-business-data/
-
Helm Charts Flaw Could Let Hackers Access Kubernetes Clusters, Microsoft Finds
by
in SecurityNewsDefault Helm charts for Kubernetes may expose clusters to attacks, Microsoft warns. Misconfigurations risk data leaks, code execution, and takeovers. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/microsoft-helm-charts-kubernetes-clusters/
-
Microsoft Alerts That Default Helm Charts May Expose Kubernetes Apps to Data Leaks
by
in SecurityNewsMicrosoft’s cybersecurity research team has issued a stark warning about the risks of using default Helm charts and Kubernetes deployment templates, revealing that popular cloud-native applications like Apache Pinot, Meshery, and Selenium Grid are being deployed with critical security gaps. These misconfigurations-often prioritizing convenience over protection-allow attackers to hijack databases, execute arbitrary code, and gain…
-
Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks
by
in SecurityNewsMicrosoft has warned that using pre-made templates, such as out-of-the-box Helm charts, during Kubernetes deployments could open the door to misconfigurations and leak valuable data.”While these ‘plug-and-play’ options greatly simplify the setup process, they often prioritize ease of use over security,” Michael Katchinskiy and Yossi Weizman from the Microsoft Defender for Cloud Research team First…
-
Phony Hacktivist Pleads Guilty to Disney Data Leak
by
in SecurityNewsAfter stealing sensitive data from Disney, Ryan Mitchell Kramer claimed to be part of a Russian hacktivist group protecting artists’ rights and ensuring they receive fair compensation for their work. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/phony-hacktivist-pleads-guilty-disney-leak
-
xAI Developer Accidentally Leaks API Key Granting Access to SpaceX, Tesla, and X LLMs
by
in SecurityNewsAn employee at Elon Musk’s artificial intelligence venture, xAI, inadvertently disclosed a sensitive API key on GitHub, potentially exposing proprietary large language models (LLMs) linked to SpaceX, Tesla, and Twitter/X. Cybersecurity specialists estimate the leak remained active for two months, offering outsiders the capability to access and query highly confidential AI systems engineered with internal…
-
Attackers Ramp Up Efforts Targeting Developer Secrets
by
in SecurityNewsSoftware teams need to follow security best practices to eliminate the leak of secrets, as threat actors increase their scanning for configuration and repository files. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/attackers-targeting-developer-secrets
-
Patients left in the dark months after cybercriminals leak testing lab data
by
in SecurityNewsIt’s been almost a year since the Qilin cybercrime group breached sensitive data from U.K. pathology services company Synnovis, and its patient information page is still short on details about what was exposed and how many people were affected. First seen on therecord.media Jump to article: therecord.media/synnovis-health-data-breach-investigation-onging
-
Waltz’ letzter Tanz: Signal-Leak kostet Trump-Berater den Job
by
in SecurityNewsMike Waltz, nationaler Sicherheitsberater von US-Präsident Donald Trump, hat seinen Posten verloren. Waltz und sein Vertreter müssen ihre Ämter abgeben. First seen on golem.de Jump to article: www.golem.de/news/waltz-letzter-tanz-signal-leak-kostet-trump-berater-den-job-2505-195847.html
-
Prolific RansomHub Operation Goes Dark
by
in SecurityNewsThe chat infrastructure and data-leak site of the notorious ransomware-as-a-service group has been inactive since March 31, according to security vendors. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/prolific-ransomhub-operation-goes-dark
-
A Look Into the Secrets of MCP: The New Secret Leak Source
by
in SecurityNewsMCP rapidly enhances AI capabilities but introduces security challenges through its distributed architecture. Especially, the distributed nature of MCP requires a lot of NHIs and their secrets. Our research shows that MCP is a new source of leaks that already discloses real-world secrets. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/04/a-look-into-the-secrets-of-mcp-the-new-secret-leak-source/