Tag: leak
-
CISOs tackle the AI visibility gap
Tags: ai, business, ciso, control, data, framework, governance, leak, risk, service, software, strategy, technology, tool, vulnerabilityGaining visibility: CISOs say they’re aware of the consequences of having blind spots, with data leaks and problematic AI outputs being common ones.They’re now working to gain the needed visibility to prevent such issues, says Aaron Momin, CISO and chief risk officer for Synechron, a digital consulting and technology services firm.”The business has a mandate…
-
The Dark Web Explained with John Hammond
The dark web is often misunderstood, but it plays an important role in both privacy technology and cybercrime activity. In this episode, Tom Eston speaks with cybersecurity researcher and educator John Hammond about what the dark web actually is and how it has evolved in recent years. The discussion covers underground marketplaces, ransomware leak sites,……
-
ShinyHunters Claims Rockstar Games Snowflake Breach via Anodot
ShinyHunters claims access to Rockstar Games Snowflake data via Anodot breach, threatening a data leak on April 14 if ransom demands are not met. First seen on hackread.com Jump to article: hackread.com/shinyhunters-rockstar-games-snowflake-breach-anodot/
-
What to Know About CyberAv3ngers: The IRGC-Linked Group Targeting Critical Infrastructure
Tags: access, advisory, ai, attack, authentication, automation, backup, cctv, chatgpt, cisa, communications, compliance, control, credentials, crypto, cve, cyber, cybersecurity, data, data-breach, defense, detection, dns, email, exploit, finance, firewall, flaw, government, group, healthcare, infrastructure, intelligence, international, Internet, iot, iran, kev, leak, linux, malicious, malware, mitigation, mitre, monitoring, network, office, openai, password, radius, resilience, risk, router, service, siem, software, strategy, switch, technology, threat, tool, update, vpn, vulnerability, vulnerability-managementAn Iran-affiliated threat group has evolved from defacing water utility displays to deploying custom ICS malware and exploiting Rockwell Automation PLCs across multiple U.S. critical infrastructure sectors. Key takeaways: CyberAv3ngers is a state-directed threat group operating under Iran’s IRGC Cyber-Electronic Command. The U.S. Treasury sanctioned six named officials in February 2024 and the State Department…
-
Der Leak des Claude-Codes von Anthropic zieht Malware-Kampagnen nach sich
Ende März 2026 wurde der vollständige Quellcode von Claude, dem terminal-basierten KI-Programmier-Agenten von Anthropic, versehentlich der Öffentlichkeit preisgegeben. Ausgelöst durch einen einfachen, aber gravierenden Fehler bei der Software-Paketierung hat dieses Datenleck weitreichende Konsequenzen für die IT-Sicherheitslandschaft und die Software-Supply-Chain. Das Zscaler-ThreatLabz-Team hat die Auswirkungen des Vorfalls analysiert und warnt aktuell vor aktiven Bedrohungskampagnen. Hacker und…
-
NSFW app leak exposes 70,000 prompts linked to individual users
MyLovely.AI leaked personal data, explicit prompts, and images of over 100,000 users, exposing many to sextortion and doxxing. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/nsfw-app-leak-exposes-70000-prompts-linked-to-individual-users/
-
NSFW app leak exposes 70,000 prompts linked to individual users
MyLovely.AI leaked personal data, explicit prompts, and images of over 100,000 users, exposing many to sextortion and doxxing. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/nsfw-app-leak-exposes-70000-prompts-linked-to-individual-users-2/
-
Sicherheitsrisiko Source Code: Was hinter dem Claude-Vorfall steckt
Der Claude-Code-Leak zeigt eindrücklich, wie schnell aus einem simplen Fehler ein globales Sicherheitsproblem entstehen kann – die gesamte Supply Chain gerät ins Wanken First seen on infopoint-security.de Jump to article: www.infopoint-security.de/sicherheitsrisiko-source-code-was-hinter-dem-claude-vorfall-steckt/a44548/
-
Leak bei CGI Sverige trifft Schwedens BankID-Umfeld
Tags: leakEin Leak beim IT-Dienstleister CGI Sverige trifft Schwedens BankID-Umfeld. Das ist brisant, wenige Monate vor der Einführung der Sverige-ID. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/cyberangriffe/leak-bei-cgi-sverige-trifft-schwedens-bankid-umfeld-328052.html
-
Your extensions leak clues about you, so we made sure Browser Guard doesn’t
Tags: leakYour browser extensions can be used to build a profile of you for advertisers and scammers. We’re making sure our Browser Guard extension stays private. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/your-extensions-leak-clues-about-you-so-we-made-sure-browser-guard-doesnt/
-
Hackers steal and leak sensitive LAPD police documents
The LAPD said the breach affected “a digital storage system” belonging to the city’s Attorney’s Office. The World Leaks extortion gang was reported to be behind the attack. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/08/hackers-steal-and-leak-sensitive-lapd-police-documents/
-
Project Glasswing powered by Claude Mythos: defending software before hackers do
Anthropic unveiled Claude Mythos, a powerful AI for cybersecurity that could also be misused to enhance cyberattacks. Anthropic has unveiled Claude Mythos, a new AI model designed to strengthen cybersecurity through Project Glasswing, aiming to secure critical software before it can be abused. Interest in Mythos grew after a leak of nearly 3,000 internal files…
-
The zero-day timeline just collapsed. Here’s what security leaders do next
Tags: access, ai, api, attack, authentication, breach, cio, ciso, control, cyber, cybersecurity, data, data-breach, defense, endpoint, exploit, google, Internet, Intruder, leak, least-privilege, open-source, penetration-testing, resilience, service, strategy, tactics, update, vulnerability, zero-dayScaling vulnerability discovery to machine speed: Agentic AI is AI that can act, not just advise. Give it an objective, and it will plan steps, run them, learn from what happens and adjust until it succeeds or hits a hard stop. In cybersecurity, that looks like an automated operator. It can probe an application, test…
-
Claude Code Leak Exploited to Spread Vidar and GhostSocks via GitHub Releases
Hackers are turning the Claude Code source leak into an active malware-delivery channel, using GitHub Releases to push the Vidar stealer and GhostSocks under the guise of “leaked” Anthropic tooling. The incident shows how human and governance failures around AI development can rapidly cascade into both traditional compromise and new agentic-risk exposure. The 59.8 MB…
-
Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit
Exploit code has been released for an unpatched Windows privilege escalation flaw reported privately to Microsoft, allowing attackers to gain SYSTEM or elevated administrator permissions. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/
-
Hackers threaten to leak data after cyberattack on German party Die Linke
Die Linke confirmed in late March that its IT infrastructure had been hit by what it described as a “serious cyberattack.” First seen on therecord.media Jump to article: therecord.media/hackers-threaten-to-leak-german-political-party-data
-
6 ways attackers abuse AI services to hack your business
Tags: ai, api, attack, backdoor, breach, business, ceo, china, control, cve, cyber, cybercrime, cybersecurity, data, email, espionage, exploit, framework, group, hacking, injection, leak, LLM, malicious, malware, marketplace, microsoft, monitoring, open-source, openai, service, skills, software, startup, supply-chain, threat, tool, vulnerabilityAbusing AI platforms as covert C2 channels: Cybercriminals are also abusing AI platforms as covert command-and-control (C2) channels by turning AI services into proxies that hide malicious traffic inside the flow of legitimate content.Instead of running a dedicated C2 server, malware is programmed to fetch commands and exfiltrate data through AI services, circumventing traditional security…
-
Hackers Spread Vidar and GhostSocks Malware Through Claude Code Leak
What happened Hackers are weaponizing the leaked Claude Code source to spread Vidar and GhostSocks malware through malicious repositories that impersonate the exposed codebase. The campaign followed Anthropic’s March 31 packaging error, which exposed the source code for Claude Code in a public npm package through a JavaScript source map file containing more than half…The…
-
Hackers Claim Massive Forex Trading Data Leak Could Expose 438,000 User Records
What happened A claimed Forex data leak is raising concerns after a threat actor said it holds 438,000 user records and 185,000 transaction records allegedly taken from the trading platform. A limited sample was provided to support the claim, and researchers said the sample included one user record and 16 transaction entries. The alleged data…The…
-
Qilin ransomware group claims the hack of German political party Die Linke
Qilin ransomware claims it stole data from Germany’s Die Linke and threatens to leak it; the party confirmed the incident, but not a breach. The Qilin ransomware group claims it stole data from Die Linke, a German political party, and is threatening to release it. Die Linke is a left-wing political party in Germany. Its…
-
Hackers Are Posting the Claude Code Leak With Bonus Malware
Plus: The FBI says a recent hack of its wiretap tools poses a national security risk, attackers stole Cisco source code as part of an ongoing supply chain hacking spree, and more. First seen on wired.com Jump to article: www.wired.com/story/security-news-this-week-hackers-are-posting-the-claude-code-leak-with-bonus-malware/
-
Europe’s cyber agency blames hacking gangs for massive data breach and leak
CERT-EU blamed the cybercrime group TeamPCP for the recent hack on the European Commission, and said the notorious ShinyHunters gang was responsible for leaking the stolen data online. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/03/europes-cyber-agency-blames-hacking-gangs-for-massive-data-breach-and-leak/
-
Claude Source Code Leak Highlights Big Supply Chain Missteps
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/source-code-leaks-highlight-lack-supply-chain-oversight
-
Source Code Leaks Highlight Lack of Supply Chain Oversight
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/source-code-leaks-highlight-lack-supply-chain-oversight
-
Claude Code source leak exploited to spread malware
A source code leak involving Anthropic’s Claude Code tool quickly escalated into a cybersecurity threat, as attackers seized on the exposed files to lure developers into … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/03/claude-code-leak-github-malware/
-
Breach Roundup: Feds Confirm ‘Major’ Hack of FBI System
Also, Lloyds Data Leak, Dutch Treasury Breach, Citrix Bug Exploit, Pay2Key Activity. This week, Lloyds data leak hits 450K, Dutch treasury breach, Citrix flaw exploited, Iran-linked ransomware ops, TrueConf zero-day, Russian fraud ring sentenced, Romania targeted, patch gaps persist, and U.S. hospital breach affects 257K. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/breach-roundup-feds-confirm-major-hack-fbi-system-a-31329
-
Claude Code Leak Exposes AI Supply Chain Threats
A packaging error in Anthropic’s Claude Code exposed over 500,000 lines of source code. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/artificial-intelligence/claude-code-leak-exposes-ai-supply-chain-threats/
-
Claude Code leak used to push infostealer malware on GitHub
Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/claude-code-leak-used-to-push-infostealer-malware-on-github/
-
ShinyHunters Hackers Claim Theft of 3M+ Cisco Records, Threaten Public Leak
ShinyHunters hackers claim they stole 3 million+ Cisco records via Salesforce and AWS, warning of a public leak if demands are not met by April 3, 2026. First seen on hackread.com Jump to article: hackread.com/shinyhunters-hackers-cisco-records-data-leak/
-
Claude-Code-Leak: Anthropic legt versehentlich 500.000 Zeilen offen
Tags: leakFirst seen on t3n.de Jump to article: t3n.de/news/claude-code-leak-anthropic-legt-versehentlich-500-000-zeilen-offen-1736802/

