Tag: login
-
New Russian APT group Void Blizzard targets NATO-based orgs after infiltrating Dutch police
Tags: access, api, apt, attack, authentication, blizzard, cloud, credentials, data, defense, detection, edr, email, fido, framework, group, hacker, identity, least-privilege, login, mfa, microsoft, open-source, passkey, password, phishing, qr, risk, russia, siem, spear-phishing, switch, threat, toolSwitch to spear phishing: In recent months the group seems to have pivoted from password spraying to targeted spear phishing attacks that direct users to fake Microsoft Entra login pages using adversary-in-the-middle (AitM) techniques. Such a campaign led to the compromise of 20 NGOs in April.In its campaign against NGOs, Void Blizzard sent emails masquerading…
-
Hackers Use Fake OneNote Login to Capture Office365 and Outlook Credentials
A recent investigation by security analysts has uncovered a persistent phishing campaign targeting Italian and U.S. users, utilizing a chain of free cloud platforms and Telegram bots for credential harvesting and data exfiltration. The attack typically begins with a phishing page hosted on services like Notion or Google Docs, masquerading as legitimate portals such as…
-
Massive Data Breach Exposes 184 Million Login Credentials
A major data breach exposed 184 million login credentials. Discover the risks and learn how to protect yourself from cyber threats. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/massive-data-breach-exposes-184-million-login-credentials/
-
Iranian Cybergroup Toufan Targets Organizations to Steal Login Credentials
A pro-Palestinian cybergroup called Cyber Toufan, which means >>cyber storm,
-
Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers
Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud.The activity, first detected by ReliaQuest in May 2025 targeting an unnamed customer in the manufacturing sector, is characterized by the use of fake login pages to access the employee…
-
Katz Stealer Targets Chrome, Edge, Brave, and Firefox to Steal Login Credentials
Katz Stealer has emerged as a potent credential-stealing malware-as-a-service, targeting popular web browsers such as Chrome, Edge, Brave, and Firefox. This multi-feature stealer conducts extensive system reconnaissance and data theft by extracting saved passwords, cookies, and session tokens from these browsers. Beyond browsers, it also compromises cryptocurrency wallets, communication platforms like Discord and Telegram, email…
-
184 Millionen Logins im Klartext: Der mysteriöse Datenfund, der selbst Profis schockiert
Tags: loginFirst seen on t3n.de Jump to article: t3n.de/news/datenleck-184-millionen-logins-passwoerter-im-netz-1689398/
-
Mutmaßliches InfoStealer-Datenleck legt 184 Millionen Login-Daten offen
Sicherheitsforscher Jeremiah Fowler ist im Internet auf eine frei zugängliche und ungeschützte Datenbank gestoßen. Der Fund hatte es in sich, denn dein Blick auf die Datensäte legt den Verdacht nahe, dass es sich mutmaßlich um Daten handelt, die von einer … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/05/24/mutmassliches-infostealer-datenleck-legt-184-million-login-daten-offen/
-
184 Million Records Database Leak: Microsoft, Apple, Google, Facebook, PayPal Logins Found
The database’s exposure duration is unknown. Signs of infostealer malware were found, but no confirmed breach or misuse of user data, says cybersecurity researcher. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-database-leak-184-million-credentials/
-
Massive login credential database uncovered
First seen on scworld.com Jump to article: www.scworld.com/brief/massive-login-credential-database-uncovered
-
Microsoft, DOJ Take Actions Against ‘Favored Info-Stealing Malware’ Lumma
Lumma malware, a MaaS platform active since 2022, has stolen data from 1.7M+ devices, targeting cryptos, logins, and financial information on Windows systems. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-lumma-malware-windows-microsoft-doj/
-
Hackers Expose 184 Million User Passwords via Open Directory
A major cybersecurity incident has come to light after researcher Jeremiah Fowler discovered a publicly accessible database containing 184,162,718 unique logins and passwords”, totaling 47.42 GB of raw credential data. The exposed records included sensitive information such as emails, usernames, passwords, and direct URLs to login pages for a wide variety of services. These ranged…
-
Chrome 0-Day CVE-2025-4664 Exposes Windows, Linux Browser Activity
A Chrome zero-day bug, CVE-2025-4664, exposes login tokens on Windows and Linux. Google has issued a fix, users should update immediately. First seen on hackread.com Jump to article: hackread.com/chrome-0-day-cve-2025-4664-windows-linux-browser-activity/
-
Critical infrastructure under attack: Flaws becoming weapon of choice
Tags: access, attack, authentication, breach, china, citrix, communications, control, cve, cyber, cybersecurity, dark-web, data-breach, defense, exploit, flaw, fortinet, government, group, hacker, healthcare, ibm, identity, incident, infrastructure, intelligence, iran, kev, login, mfa, monitoring, moveIT, network, ransomware, risk, service, software, strategy, supply-chain, threat, update, vpn, vulnerability, zero-dayTrade in exploit code: IBM’s X-Force found four of the 10 most mentioned common vulnerabilities and exposures (CVEs) on the dark web were linked to sophisticated threat actor groups, including nation-state intelligence agencies.”Exploit codes for these CVEs were openly traded on numerous forums, fueling a growing market for attacks against power grids, health networks, and…
-
Russian APT28 compromised Western logistics and IT firms to track aid to Ukraine
Tags: access, advisory, api, authentication, cctv, cloud, computer, container, credentials, cve, cybersecurity, data, detection, email, exploit, flaw, government, hacker, identity, infrastructure, Internet, login, malicious, malware, mfa, military, network, ntlm, office, open-source, password, phishing, powershell, russia, service, software, threat, tool, ukraine, vulnerabilityCredential guessing and spearphishing: The attackers used brute-force credential guessing techniques, also known as password spraying, to gain initial access to accounts. This was complemented with targeted phishing emails that directed recipients to fake login pages for government entities or Western cloud email providers. These phishing pages were stored on free web hosting services or…
-
Database Leak Reveals 184 Million Infostealer-Harvested Emails and Passwords
Cybersecurity researcher Jeremiah Fowler discovered a misconfigured cloud server containing a massive 184 million login credentials, likely collected… First seen on hackread.com Jump to article: hackread.com/database-leak-184-million-infostealer-emails-passwords/
-
Malicious VS Code Extensions Target Windows Solidity Developers to Steal Login Credentials
Datadog Security Research has uncovered a targeted malware campaign aimed at Solidity developers on Windows systems, using malicious Visual Studio Code (VS Code) extensions as the initial attack vector. Identified as the work of a single threat actor tracked as MUT-9332, this operation deployed three trojanized extensions solaibot, among-eth, and blankebesxstnion disguised as legitimate tools…
-
Online Cyber Security: Calculating Return on Investment for SSO Implementations
Single sign-on (SSO) simplifies user access by providing one login for many applications. SSO improves online cyber security by reducing password fatigue, decreasing the attack surface of multiple credentials, and centralizing authentication administration. SSO’s benefits are evident, but implementing it takes time, money, and technical effort. Thus, ROI must be carefully assessed. Organizations may justify……
-
Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
The trove has now been taken down but included users’ logins for platforms including Apple, Google, and Meta, plus services from multiple governments. First seen on wired.com Jump to article: www.wired.com/story/mysterious-database-logins-governments-social-media/
-
Police Operation and Microsoft Take Down Lumma Infostealer
User Panels and Command and Control Domains Seized. Law enforcement and Microsoft struck a blow against malware used to steal login credentials and financial data, seizing the central command structure and thousands of online domains used to control the Lumma Stealer. Lumma first appeared on Russian-language speaking cybercriminal forums in 2022. First seen on govinfosecurity.com…
-
Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees
ReliaQuest, hackers have deployed a cunning search engine optimization (SEO) poisoning scheme to orchestrate payroll fraud against a manufacturing sector customer. This deceptive strategy involves crafting fake authentication portals that mirror legitimate organizational login pages, manipulating search engine results to rank these malicious sites at the top. Unsuspecting employees, searching for payroll portals on mobile…
-
IBM Warns: One-Third of Cyber Attacks Use Advanced Tactics to Steal Login Credentials
IBM X-Force’s 2024 cybersecurity report, nearly one-third of cyber intrusions now rely on identity-based attacks, exploiting valid login credentials to breach systems. This alarming trend, continuing for the second consecutive year, highlights a shift in threat actor strategies, moving away from traditional brute-force methods to stealthier, more persistent tactics. Attackers are increasingly leveraging sophisticated tools,…
-
New Phishing Attack Uses AES Malicious npm Packages to Office 365 Login Credentials
Fortra’s Suspicious Email Analysis (SEA) team uncovered a highly sophisticated phishing campaign targeting Microsoft Office 365 (O365) credentials. Unlike typical phishing attempts, this attack stood out due to its intricate use of modern technologies and developer infrastructure. The threat actors employed a multi-layered strategy involving AES (Advanced Encryption Standard) encryption, malicious npm (Node Package Manager)…
-
What to do if you can’t get into your Facebook or Instagram account
How to prove your identity after your account gets hacked and how to improve security for the future<ul><li><a href=”https://viewer.gutools.co.uk/technology/2025/apr/23/what-to-do-phone-lost-stolen-change-passwords”>Phone lost or stolen? Practical steps to restore peace of mind</li><li><a href=”https://www.theguardian.com/money/2025/may/07/what-to-do-if-your-uk-passport-is-lost-or-stolen-steps-you-need-to-take”>UK passport lost or stolen? Here are the steps you need to take</li></ul>Your Facebook or Instagram account can be your link to friends, a profile for…
-
M&S Reportedly Hacked Using Third-Party Credentials
Scattered Spider Stole Tata Consulting Services Employee Login Details for Hack. British retailer Marks & Spencer was reportedly compromised by cybercrime group Scattered Spider using stolen employee credentials from a third-party IT company. Citing an unidentified source, Reuters reported hackers used the M&S login credentials of two Tata Consulting Services employees. First seen on govinfosecurity.com…
-
Cyberattack on Serviceaide Compromises Data of 480,000 Catholic Health Patients
Data breach at Serviceaide, Inc., a technology vendor for Catholic Health, exposed sensitive information belonging to approximately 480,000 patients. The incident, caused by an improperly secured Elasticsearch database, left names, Social Security numbers, medical records, and login credentials publicly accessible for nearly seven weeks. While forensic analysts found no direct evidence of data misuse, the…
-
W3LL Phishing Kit Launches Active Campaign to Steal Outlook Login Credentials
Cybersecurity researchers have recently uncovered a sophisticated phishing campaign leveraging the notorious W3LL Phishing Kit. Originally identified by Group-IB in 2022, W3LL differentiates itself in the criminal ecosystem as a phishing-as-a-service (PaaS) tool, supported by a unique marketplace known as the W3LL Store. This marketplace allows threat actors to selectively purchase functionalities and components needed…
-
New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials
A newly identified phishing campaign is targeting unsuspecting users by masquerading as urgent Zoom meeting invitations from colleagues. This deceptive tactic leverages the familiarity and trust associated with workplace communications to lure victims into a trap designed to steal their login credentials. Cybersecurity researchers have flagged this attack for its realistic approach, which includes a…

