Tag: leak
-
VanHelsing ransomware builder leaked on hacking forum
The VanHelsing ransomware-as-a-service operation published the source code for its affiliate panel, data leak blog, and Windows encryptor builder after an old developer tried to sell it on the RAMP cybercrime forum. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/vanhelsing-ransomware-builder-leaked-on-hacking-forum/
-
Accenture Files Leak New Research Reveals Projects Controlling Billions of User Data
A new research report released today by Progressive International, Expose Accenture, and the Movement Research Unit uncovers the sprawling influence of Accenture, the world’s largest consultancy firm, in driving a global wave of surveillance, exclusion, and authoritarianism. The investigation reveals how Accenture has become essential to security states worldwide, channeling public resources into private ownership…
-
LockBit Leak Shows Affiliates Use Pressure Tactics, Rarely Get Paid
Weeks after LockBit ransomware breach, leaked data reveals how affiliates generate ransomware, set ransom demands, and often walk away unpaid. First seen on hackread.com Jump to article: hackread.com/lockbit-leak-affiliates-pressure-tactics-rarely-paid/
-
Serviceaide Leak Exposes Records of 500,000 Catholic Health Patients
Serviceaide data leak exposes sensitive health info of 500K Catholic Health patients due to misconfigured database; risk of ID theft and fraud. First seen on hackread.com Jump to article: hackread.com/serviceaide-leak-catholic-health-patients-records/
-
Agentic AI Tech Firm Says Health Data Leak Affects 483,000
Serviceaide Incident Exposed Patient Data of Catholic Health, a NY-Based Client. Serviceaide, a provider of agentic AI-based IT management and workflow software, reported to regulators that an inadvertent exposure of data on the web has affected more than 483,000 patients of client Catholic Health, a network of six hospitals and dozens of other facilities in…
-
Human Rights Group’s Complaint Forms Exposed on Internet
Australian Human Rights Commission Detected Leak of 670 Online Forms After a Month. The Australian Human Rights Commission said unprotected online complaint forms exposed the personal, healthcare and demographic information of Australians to the public internet for over a month. The data leak exposed 670 complaints and nominations online. First seen on govinfosecurity.com Jump to…
-
Australian Human Rights Commission Leaks Docs in Data Breach
An internal error led to public disclosure of reams of sensitive data that could be co-opted for follow-on cyberattacks. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/australian-human-rights-commission-leaks-data-breach
-
LockBit Leaks Reveal Drive to Recruit Ransomware Newbies
‘Lite Panel’ Offering Easy Access to Anyone for Just $777 Confirmed by Researcher. Ransomware groups continue to find innovative new ways to shake down organizations large and small in their pursuit of ransom payoffs. For the LockBit group, one tweak was to debut a lite version of its ransomware portal that appears to have amassed…
-
Coinbase Rejects $20M Ransom After Insider Data Leak, Faces Up to $400M in Fallout
Coinbase rejects $20M ransom after insider breach; customer data leaked, social scams follow. Fallout may cost up to $400M in reimbursements. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/coinbase-rejects-ransom-data-leak/
-
Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that the vulnerability known as Spectre continues to haunt computer systems after more than seven years.The vulnerability, referred to as Branch Privilege Injection (BPI), “can be exploited…
-
Tor Oniux Tool Offers Anonymous Linux App Traffic
Tor Project has unveiled oniux, a new command-line utility that provides comprehensive network isolation for Linux applications, ensuring all traffic routes exclusively through the Tor network. This tool aims to eliminate the risk of accidental data leaks that can occur with traditional SOCKS proxy configurations, offering enhanced privacy protection for users handling sensitive information. Oniux…
-
Leak confirms OpenAI’s ChatGPT will integrate MCP
ChatGPT is testing support for Model Context Protocol (MCP), which will allow the AI to connect to third-party services and use them as context. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/artificial-intelligence/leak-confirms-openais-chatgpt-will-integrate-mcp/
-
Xoxo to Prague
In this week’s newsletter, Thor inspects the LockBit leak, finding $10,000 “security tips,” ransom negotiations gone wrong and a rare glimpse into the human side of cybercrime. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/xoxo-to-prague/
-
Australian Human Rights Commission leaks docs to search engines
The Australian Human Rights Commission (AHRC) disclosed a data breach incident where private documents leaked online and were indexed by major search engines. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/australian-human-rights-commission-leaks-docs-to-search-engines/
-
Info leak hits Russian aviation center
First seen on scworld.com Jump to article: www.scworld.com/brief/info-leak-hits-russian-aviation-center
-
Twilio denies breach following leak of alleged Steam 2FA codes
Twilio has denied in a statement for BleepingComputer that it was breached after a threat actor claimed to be holding over 89 million Steam user records with one-time access codes. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/twilio-denies-breach-following-leak-of-alleged-steam-2fa-codes/
-
Why Your Biggest Secret Leaks Happen Behind the Firewall: Private vs. Public Repos
Private repos leak plaintext secrets 8x more often than public ones. Learn why internal codebases are the biggest blind spot in your secrets management strategy. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/why-your-biggest-secret-leaks-happen-behind-the-firewall-private-vs-public-repos/
-
New Intel CPU flaws leak sensitive data from privileged memory
A new “Branch Privilege Injection” flaw in all modern Intel CPUs allows attackers to leak sensitive data from memory regions allocated to privileged software like the operating system kernel. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-intel-cpu-flaws-leak-sensitive-data-from-privileged-memory/
-
Did LockBit Just Get Locked Out? The Walmart of Ransomware’s Massive Leak
Has the notorious LockBit ransomware gang finally met its end? In a shocking turn of events, LockBit, one of the most notorious ransomware groups, has had its own site defaced and a massive amount of data dumped. LockBit’s own leak site was defaced with a bold message: “Do not crime. Crime is bad.” Alongside that,……
-
Sicherheit ist mehr als Verschlüsselung: Drei Tipps, wie Unternehmen ihre Kommunikation sicherer machen
Der aktuelle Signal-Leak der US-Regierung zeigt ein grundsätzliches Problem: Sicherheit in der Kommunikation ist nicht nur äußerst wichtig, sondern auch sehr komplex. Wird sie missachtet, entstehen Image- und Vertrauensverluste oder finanzielle oder Wettbewerbsrisiken. Wie können sich Unternehmen schützen und vorbereiten? Was sollten sie beachten? Wildix, Anbieter von Unified Communications as a Service, gibt drei Praxistipps……
-
What the LockBit 3.0 data leak reveals
An administration interface instance for the ransomware franchise’s affiliates was attacked on 29 April. Data from its SQL database has been extracted and disclosed First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366623780/Ransomware-What-the-LockBit-30-data-leak-reveals
-
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences. But with this power comes new risks, like data leaks, identity theft, and malicious misuse.If your company is exploring or already using AI agents, you need to ask: Are they secure?AI agents work with sensitive data…
-
Hackers hit deportation airline GlobalX, leak flight manifests, and leave an unsubtle message for >>Donnie<< Trump
GlobalX Airlines, a charter airline being used by the US government for deportation flights, has been attacked by hacktivists who have made off with what they claim are detailed flight records and passenger manifests. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/hackers-globalx-message-trump
-
Qilin Ransomware Ranked Highest in April 2025 with 72 Data Leak Disclosures
Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign observed in November 2024.”NETXLOADER is a new .NET-based loader that plays a critical role in cyber attacks,” Trend Micro researchers Jacob Santos, Raymart Yambot, John…
-
LLM02: Sensitive Information Disclosure FireTail Blog
May 08, 2025 – Lina Romero – In 2025, AI security is a relevant issue. With the landscape changing so rapidly and new risks emerging every day, it is difficult for developers and security teams to stay on top of AI security. The OWASP Top 10 Risks for LLM attempts to break down the most prevalent…
-
The LockBit ransomware site was breached, database dump was leaked online
Lockbit ransomware group has been compromised, attackers stole and leaked data contained in the backend infrastructure of their dark web site. Hackers compromised the dark web leak site of the LockBit ransomware gang and defaced it, posting a message and a link to the dump of the MySQL database of its backend affiliate panel. >>Don’t…
-
Hacker Leaks Stolen LockBit Ransomware Operation Database
Exposes Details of Victims, ‘Aggressive’ Negotiations, Cryptocurrency Addresses. One year to the day after an international law enforcement operation unmasked and indicted the leader of the notorious LockBit ransomware group, a hacker has sent the group another love letter. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/hacker-leaks-stolen-lockbit-ransomware-operation-database-a-28350
-
Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures
Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign observed in November 2024.”NETXLOADER is a new .NET-based loader that plays a critical role in cyber attacks,” Trend Micro researchers Jacob Santos, Raymart Yambot, John…
-
xAI Secret Leak: The Story of a Disclosure
AI adoption accelerates secret sprawl as organizations connect to multiple providers. Our investigation of a leaked xAI API key, which granted access to unreleased Grok models, reveals critical flaws in their disclosure process, highlighting necessary improvements in this domain. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/xai-secret-leak-the-story-of-a-disclosure/

