SIEM as a Service
Canon Inc

Hackers Allegedly Selling Firewall Access to Canon Inc on Hacking Forums

Threat actors are allegedly offering root access to Canon Inc.'s internal firewall systems on underground hacking forums.  According to security monitoring firm ThreatMon, the advertisement appeared on a popular dark web marketplace, claiming to provide...
Google OAuth Vulnerability

Google OAuth “Sign in with Google” Vulnerability Exposes Millions of Accounts to Data Theft

A critical vulnerability in Google’s "Sign in with Google" authentication flow is putting millions of Americans at risk of data theft, particularly those who have worked for failed startups. The issue lies in how...
Green Bay Packers Store Hacked: Thousands of Customers’ Credit Card Data Stolen

Green Bay Packers Store Hacked: Thousands of Customers’ Credit Card Data Stolen

The Green Bay Packers organization has disclosed a data breach affecting thousands of customers who made purchases on their official online store, packersproshop. The incident, attributed to malicious code planted by an unauthorized third party,...
Brazilian Hacker Charged for Selling Data Stolen From Hacked Computers

Brazilian Hacker Charged for Selling Data Stolen From Hacked Computers

Junior Barros De Oliveira, a 29-year-old resident of Curitiba, Brazil, has been indicted in the United States for orchestrating an extortion scheme involving data stolen from the computer systems of a Brazilian subsidiary of...
Notorious WrnRAT Delivered Mimic As Gambling Games

Notorious WrnRAT Delivered Mimic As Gambling Games

Hackers target gambling games primarily due to the lucrative financial opportunities they present. The online gambling industry is a rich territory for threat actors seeking to exploit vulnerabilities for "financial gain" and "data theft." Cybersecurity...
Hackers Abusing Legitimate File Hosting Services For Sophisticated Phishing Attack

Hackers Abusing Legitimate File Hosting Services For Sophisticated Phishing Attack

Stealing personal data information ('name', 'Social Security number', 'credit card details', etc.) for fraudulent activities is dubbed "identity theft."  While these types of cybercrimes are often termed as "financial identity theft," "medical identity theft," and...
RansomHub Exploiting RDP Services To Exfiltrate Large Volumes Of Data

RansomHub Exploiting RDP Services To Exfiltrate Large Volumes Of Data

Ransomware-as-a-Service (RaaS) significantly lowers the technical barriers for threat actors to launch ransomware attacks, even it also enables threat actors with minimal skills to execute sophisticated cyber attacks. On a subscription basis, this model operates,...
AutoIT Malware Attacking Gmail Users To Steal Login Credentials

AutoIT Malware Attacking Gmail Users To Steal Login Credentials

A malicious AutoIT-compiled executable has been discovered that attempts to open Gmail login pages using popular browsers and possesses capabilities to steal clipboard data, capture keystrokes, and manipulate system behavior.  It can also evade detection...
Styx Stealer

Beware! Styx Stealer Malware Stealing Browser & Instant Messenger Data

Recently cybersecurity researchers at Check Point discovered a new malware dubbed "Styx Stealer," capable of stealing browser and instant messenger data. Threat actors often exploit stealers, enabling them to secretly gather sensitive information from the...
Beware Of Braodo Stealer That Steals Users’ Login Credentials

Beware Of Braodo Stealer That Steals Users’ Login Credentials

Stealers are one of the most used malicious tools that is used by threat actors. As such tools enable hackers to obtain sensitive information such as passwords, credit card details, and personal data from...
SIEM as a Service

Recent Posts