Tag: leak
-
AI chatbot startup WotNot leaks 346,000 files, including passports and medical records
Wotnot, An Indian AI startup that helps businesses build custom chatbots, has leaked almost 350,000 sensitive files after the data was left unsecured on the web. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/ai-chatbot-startup-wotnot-leaks-346-000-files-including-passports-and-medical-records
-
Sicherheitsinfos: Vossko, Uni Frankfurt, LKA-Leak, Matrix-Take down etc. (4.12.2024)
Kleiner Sammelbeitrag vom 4. Dezember 2024 zu Sicherheitsthemen. Black Basta reklamiert einen Ransomware-Angriff auf Convenience Spezialist Vossko. Die RansomHub-Gruppe will Daten der Goethe Universität Frankfurt erbeutet haben. Europol zerschlägt das von Cyberkriminellen benutztes Matrix. Und ein aufmerksamer Bürger hat durch … First seen on borncity.com Jump to article: www.borncity.com/blog/2024/12/04/sicherheitsinfos-vossko-uni-frankfurt-lka-leak-matrix-take-down-etc-4-12-2024/
-
Data Vigilante Leaks 772K Employee Records from Top Firms and 12.3M-Row Database
A massive data leak linked to the MOVEit vulnerability has exposed millions of employee records from major companies. Learn about the impact of this leak, the role of the “data vigilante” Nam3L3ss. First seen on hackread.com Jump to article: hackread.com/data-vigilante-leaks-772k-employee-record-database/
-
A Guide to Securing AI App Development: Join This Cybersecurity Webinar
Artificial Intelligence (AI) is no longer a far-off dream”, it’s here, changing the way we live. From ordering coffee to diagnosing diseases, it’s everywhere. But while you’re creating the next big AI-powered app, hackers are already figuring out ways to break it.Every AI app is an opportunity”, and a potential risk. The stakes are huge:…
-
Clipper DEX Hit by Cyberattack: Exploit Targets Withdrawal Functionality
Clipper, a decentralized exchange (DEX), became the target of a cyberattack that led to a loss of approximately $450,000 from its protocol. While initially, rumors circulated that the Clipper cyberattack was caused by a private key leak, Clipper has since clarified that the breach was due to a vulnerability in its withdrawal functionality, not a…
-
Vast Voter Data Leaks Cast Shadow Over Indonesia’s 2024 Presidential Election
First seen on resecurity.com Jump to article: www.resecurity.com/blog/article/vast-voter-data-leaks-cast-shadow-over-indonesias-2024-presidential-election
-
CVE-2024-28085: Linux Flaw Could Leak Passwords
A recently identified vulnerability affecting the >>wall
-
Banshee Stealer shuts down after source code leak
Tags: leakFirst seen on scworld.com Jump to article: www.scworld.com/brief/banshee-stealer-shuts-down-after-source-code-leak
-
A US soldier is suspected of being behind the massive Snowflake data leak
One of the hackers who masterminded the Snowflake credential leak that led to the threat actors stealing data from and extorting at least 165 companies, including 560 million Ticketmaster and 110 AT&T customers, could be a US soldier, according to cybersecurity journalist Brian Krebs.The hacker, known for using the moniker Kiberphant0m, carried out online chats…
-
Data leaks from websites built on Microsoft Power Pages, including 1.1 million NHS records
A security researcher has blamed misconfigured implementations of Microsoft Power Pages for a slew of data breaches from web portals – including the leak of 1.1 million NHS employee records. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/data-leaks-microsoft-power-pages-nhs-records
-
Gangster counseling center fears data leak
If personal data is stolen, it is anything but a pleasure for those affected. However, when it comes to those previously involved in, or victims of, organized crime, the potential consequences are far more serious: Life and limb could be at stake.While it may sound a little far-fetched, this apparently what happened in the Japanese…
-
Walking the Walk: How Tenable Embraces Its >>Secure by Design<< Pledge to CISA
Tags: access, application-security, attack, authentication, best-practice, business, cisa, cloud, conference, container, control, credentials, cve, cvss, cyber, cybersecurity, data, data-breach, defense, exploit, Hardware, identity, infrastructure, injection, Internet, leak, lessons-learned, mfa, open-source, passkey, password, phishing, risk, saas, service, siem, software, sql, strategy, supply-chain, theft, threat, tool, update, vulnerability, vulnerability-managementAs a cybersecurity leader, Tenable was proud to be one of the original signatories of CISA’s “Secure by Design” pledge earlier this year. Our embrace of this pledge underscores our commitment to security-first principles and reaffirms our dedication to shipping robust, secure products that our users can trust. Read on to learn how we’re standing…
-
Huge Leak of Customer Data Includes Military Personnel Info
EnamelPins, which manufactures and sells medals, pins, and other emblematic accessories, for months left open an Elasticsearch instance that exposed 300,000 customer emails, including 2,500 from military and government personnel. The company, based in California, also has links to China, Cybernews researchers wrote. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/huge-leak-of-customer-data-includes-military-personnel-info/
-
Massive Credit Card Leak, Database of 1,221,551 Cards Circulating on Dark Web
Tags: breach, credit-card, cyber, cybersecurity, dark-web, data, data-breach, finance, leak, maliciousA massive data breach has sent shockwaves across the globe, as a database containing sensitive financial information for over 1.2 million credit cards has been leaked on the dark web. According to reports from cybersecurity watchers, the database was shared for free, making it accessible to malicious actors worldwide. The alarming revelation was first highlighted…
-
Misconfigured Forces Penpals server leaks over 1.1M users’ data
First seen on scworld.com Jump to article: www.scworld.com/brief/misconfigured-forces-penpals-server-leaks-over-1-1m-users-data
-
Dutch cops pwn the Redline and Meta infostealers, leak ‘VIP’ aliases
Tags: leakFirst seen on theregister.com Jump to article: www.theregister.com/2024/10/28/dutch_cops_pwn_the_redline/
-
Helldown Ransomware Attacking VMware ESXi And Linux Servers
Helldown, a new ransomware group, actively exploits vulnerabilities to breach networks, as since August 2024, they have compromised 28 victims, leaking their data on a dedicated website. The ransomware group IS has updated its data leak site, removing three victims, possibly indicating successful ransom payments by continuing its double extortion tactic, stealing and threatening to…
-
Helldown Ransomware Attacking VMware ESX And Linux Servers
Helldown, a new ransomware group, actively exploits vulnerabilities to breach networks, as since August 2024, they have compromised 28 victims, leaking their data on a dedicated website. The ransomware group IS has updated its data leak site, removing three victims, possibly indicating successful ransom payments by continuing its double extortion tactic, stealing and threatening to…
-
Meow, INC Ransom gangs leak San Francisco Ballet Company data
First seen on scworld.com Jump to article: www.scworld.com/brief/meow-inc-ransom-gangs-leak-san-francisco-ballet-company-data
-
Ford investigates alleged breach following customer data leak
Ford is investigating allegations that it suffered a data breach after a threat actor claimed to leak 44,000 customer records on a hacking forum. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ford-investigates-alleged-breach-following-customer-data-leak/
-
Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation
Oracle is warning that a high-severity security flaw impacting the Agile Product Lifecycle Management (PLM) Framework has been exploited in the wild.The vulnerability, tracked as CVE-2024-21287 (CVSS score: 7.5), could be exploited sans authentication to leak sensitive information.”This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network First seen on…
-
Ford investgates alleged breach following customer data leak
Ford is investigating allegations that it suffered a data breach after a threat actor claimed to leak 44,000 customer records on a hacking forum. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ford-investgates-alleged-breach-following-customer-data-leak/
-
Diablo-Stream mit Starship-Leaks: Einblicke in den Testflug von Elon Musks Ingenieur
Tags: leakFirst seen on t3n.de Jump to article: t3n.de/news/diablo-stream-mit-starship-leaks-einlick-in-den-testflug-1654417/
-
Akira Ransomware Drops 30 Victims on Leak Site in One Day
Cyberint has observed the Akira ransomware group leaking in a single day the information allegedly stolen from 32 victims. The post Akira Ransomware Drops 30 Victims on Leak Site in One Day appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/akira-ransomware-drops-30-victims-on-leak-site-in-one-day/
-
Ford ‘actively investigating’ after employee data allegedly parked on leak site
Plus: Maxar Space Systems confirms employee info stolen in digital intrusion First seen on theregister.com Jump to article: www.theregister.com/2024/11/18/ford_actively_investigating_breach/
-
Ransomware gang Akira leaks unprecedented number of victims’ data in one day
First seen on therecord.media Jump to article: therecord.media/akira-ransomware-group-publishes-unprecedented-leak-data

