Tag: leak
-
Belsen Group Leaks 15,000+ FortiGate Firewall Configurations
FortiGate firewall leak exposes 15,000+ configurations, impacting organizations globally. The actor behind the leak is Belsen Group. Learn… First seen on hackread.com Jump to article: hackread.com/belsen-group-leaks-fortigate-firewall-configurations/
-
HPE’s sensitive data exposed in alleged IntelBroker hack
IntelBroker has struck again. This time, the notorious BreachForums bigwig, which has a long list of high-profile victims, including Europol, Cisco, and GE, has claimed to have breached IT giant Hewlett Packard Enterprise (HPE).The suspected Serbian-origin hacker is offering to sell on BreachForums, sensitive data allegedly stolen from HPE including product source codes and personally…
-
Leaks zur Switch 2: Ex-Mitarbeiter sprechen über chaotische Situation bei Nintendo
First seen on t3n.de Jump to article: t3n.de/news/chaotische-situation-nintendo-ex-mitarbeiter-leak-switch-2-1668441/
-
Medusa ransomware group claims attack on UK’s Gateshead Council
Pastes allegedly stolen documents on leak site with £600K demand First seen on theregister.com Jump to article: www.theregister.com/2025/01/17/gateshead_council_cybersecurity_incident/
-
Ransomware Leak Sites Suggest Attacks Reached Record High
RansomHub, Play and Akira Appear to Dominate; Numerous Newcomers Join the Fray. While ransomware groups’ data-leak sites regularly lie, if taken at face value, in December 2024 they collectively listed the largest number of victims ever seen in a one-month period, dominated by RansomHub, Play and Akira operations, plus a bevy of newcomers, researchers report.…
-
University of Oklahoma isolates systems after ‘unusual activity’ on IT network
The school, which has more than 34,000 students, appeared on the leak site of a ransomware gang on Tuesday, with the group claiming to have stolen 91 GB of data that allegedly includes employee data, financial information and more.]]> First seen on therecord.media Jump to article: therecord.media/university-of-oklahoma-isolates-systems-unusual-activity
-
Ransomware-Attacke tarnt sich als GTA-Leak: Finger weg vom Download!
First seen on t3n.de Jump to article: t3n.de/news/gta-leak-ransomware-attacke-1667081/
-
Hackers Breach Telefonica Network, Leak 2.3 GB of Data Online
Telefónica faces a data breach impacting its internal systems, linked to hackers using compromised credentials. Learn more about this alarming cyber threat. First seen on hackread.com Jump to article: hackread.com/hackers-breach-telefonica-network-leak-data-online/
-
ZACROS Corporation Discloses Personal Information Leak Following Ransomware Attack
ZACROS Corporation, a leading manufacturer of packaging materials, announced that it has suffered a ransomware attack that has First seen on securityonline.info Jump to article: securityonline.info/zacros-corporation-discloses-personal-information-leak-following-ransomware-attack/
-
Cyberattacks, tech disruption rank as top threats to business growth
Two in five executives view data;breaches and leaks as;the most financially burdensome man-made threats, a Chubb study found. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cyberattacks-business-growth-threat/736893/
-
Telefónica confirms internal ticketing system breach after data leak
Spanish telecommunications company Telefónica confirms its internal ticketing system was breached after stolen data was leaked on a hacking forum. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/
-
Malware targets Mac users by using Apple’s security tool
A variant of the Banshee macOS infostealer was seen duping detection systems with new string encryption copied from Apple’s in-house algorithm.A Check Point research, which caught the variant after two months of successful evasion, said threat actors distributed Banshee using phishing websites and fake GitHub repositories, often impersonating popular software like Google Chrome, Telegram, and…
-
Space Bears ransomware: what you need to know
The Space Bears ransomware gang stands out from the crowd by presenting itself better than many legitimate companies, with corporate stock images and a professional-looking leak site. First seen on tripwire.com Jump to article: www.tripwire.com/state-of-security/space-bears-ransomware-what-you-need-know
-
PowerSchool Reportedly Pays Ransom to Prevent Student Data Leak
A school district said that PowerSchool paid a ransom to prevent the attackers releasing data it accessed of students and teachers in North America First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/powerschool-pays-ransom-data-leak/
-
New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption
Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer.”Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple’s XProtect,” Check Point Research said in a new analysis shared with The Hacker News. “This development allows it to…
-
New Great Morpheus Hacker Group Claims Hacking Into Arrotex Pharmaceuticals And PUS GmbH
A Data Leak Site (DLS) belonging to a new extortion group named Morpheus, which has stolen data from Arrotex Pharmaceuticals (Australia) on December 12th and PUS GmbH (Germany) on December 20th. Morpheus offers stolen data for sale on the DLS, requiring buyers to create accounts. While a researcher suggests a link to Hellcat ransomware, there…
-
DNA sequencer vulnerabilities signal firmware issues across medical device industry
Tags: access, advisory, attack, best-practice, computer, computing, control, credentials, data, exploit, firmware, flaw, Hardware, iot, leak, malicious, malware, mitigation, privacy, rce, remote-code-execution, risk, side-channel, software, supply-chain, update, vulnerability, windowsIn highlighting vulnerabilities in a widely used DNA gene sequencing device, security researchers have brought further attention to the likely poor state of security in the medical device industry, where hardware and firmware development is often outsourced to external equipment manufacturers under questionable support contracts.The device, Illumina’s iSeq 100 compact DNA sequencer, is used by…
-
Casio warns employees, customers about data leak from October ransomware attack
In a notice on Wednesday, Casio provided a post-mortem on an October attack, explaining that 6,456 employees, 1,931 business partners and 91 customers were impacted by the ransomware incident. ]]> First seen on therecord.media Jump to article: therecord.media/casio-warns-employees-customers-ransomware-attack-october
-
Casio Admits Security Failings as Attackers Leak Employee and Customer Data
Electronics firm Casio revealed that ransomware attackers have leaked the personal data of employees, customers and business partners First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/casio-failings-attackers-leak-data/
-
The biggest data breach fines, penalties, and settlements so far
Tags: access, apache, attack, breach, business, china, ciso, communications, compliance, control, credentials, credit-card, cyberattack, cybercrime, cybersecurity, data, data-breach, email, finance, flaw, framework, GDPR, google, hacker, Hardware, identity, Internet, law, leak, linkedin, microsoft, mobile, monitoring, network, office, phone, privacy, regulation, risk, service, software, technology, tool, training, update, vulnerabilitySizable fines assessed for data breaches in recent years suggest that regulators are getting more serious about cracking down on organizations that don’t properly protect consumer data.Hit with a $ 1.3 billion fine for unlawfully transferring personal data from the European Union to the US, Meta tops the list of recent big-ticket sanctions, with one…
-
Casio Discloses Data Leak Following Ransomware Attack
Casio Computer Co., Ltd. has disclosed the results of its investigation into a ransomware attack that compromised its First seen on securityonline.info Jump to article: securityonline.info/casio-discloses-data-leak-following-ransomware-attack/
-
Nintendo Switch 2: Warum euch Hardware-Leaks völlig egal sein sollten
First seen on t3n.de Jump to article: t3n.de/news/nintendo-switch-2-hardware-leaks-1666159/
-
Achtung: Angeblich geleakter GTA San Andreas Source-Code mit Schadsoftware
Aktuell wird angeblich der Quellcode des Rockstar Games Spiels GTA San Andreas im Internet zum Download angeboten. Erste Hinweise scheinen seit gestern im Internet aufgetaucht zu sein (siehe z.B. den Artikel Rockstar reportedly faces another major leak as fans await … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/01/06/achtung-angeblich-geleakter-gta-san-andreas-source-code-mit-schadsoftware/
-
Privacy Roundup: Week 1 of Year 2025
Tags: access, ai, android, apple, authentication, botnet, breach, browser, business, captcha, chrome, compliance, cve, cybersecurity, data, data-breach, detection, email, encryption, exploit, finance, firmware, flaw, google, group, hacker, healthcare, HIPAA, infrastructure, injection, Internet, law, leak, login, malware, open-source, password, phishing, privacy, router, service, software, threat, tool, update, virus, vulnerabilityThis is a news item roundup of privacy or privacy-related news items for 29 DEC 2024 – 4 JAN 2024. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional “security” content mixed-in here due to the close relationship between online privacy and cybersecurity – many things overlap; for…
-
Feel Relieved: Advanced Secrets Management Techniques
Could Advanced Secrets Management be Your Way to Feeling Relieved? Think about it. If you could significantly decrease the likelihood of security breaches and data leaks in your organization, wouldn’t that be a massive weight lifted off your shoulders? But how to systematically fortify your cybersecurity? The answer lies in Non-Human Identities (NHIs) and Secrets……
-
In Other News: Volkswagen Data Leak, DoubleClickjacking, China Denies Hacking US Treasury
Noteworthy stories that might have slipped under the radar: location data of 800,000 electric Volkswagen cars leaked, DoubleClickjacking attack, China denies hacking US Treasury. The post In Other News: Volkswagen Data Leak, DoubleClickjacking, China Denies Hacking US Treasury appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/in-other-news-volkswagen-data-leak-doubleclickjacking-china-denies-hacking-us-treasury/
-
Ransomware gang leaks data stolen in Rhode Island’s RIBridges Breach
The Brain Cipher ransomware gang has begun to leak documents stolen in an attack on Rhode Island’s “RIBridges” social services platform. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ransomware-gang-leaks-data-stolen-in-rhode-islands-ribridges-breach/

