Hackers’ Leaksmas Darkweb Event Exposes Massive Hacked Data
As carols resonated in the air and families convened, the cyber underworld ushered in a chilling twist to Christmas – 'Leaksmas,' a season marked by rampant data dumps targeting individuals and organizations worldwide.
Resecurity, a...
MongoDB Cyber Attack, Customer Data Exposed
MongoDB has experienced a security incident in which unauthorized access to its corporate systems was identified.
However, the company confirmed that there was no evidence of access to any customer's system logs. MongoDB is...
New Dark Web Market OLVX Advertising Variety of Hacking Tools
Threat actors exploit underground markets by purchasing or selling stolen data, malware, and hacking tools to facilitate cybercrime.
These underground markets provide the following key facilities among threat actors that fuel the growth of cyber...
Hackers Hijacked Water Facility that Interrupted the Supply
Recently, there was a cyberattack on an Irish water utility that resulted in hackers gaining control of the system and disrupting the water supply.
Last week, a private group water system in the Erris...
Genesis Market Technique: Hackers Exploited Node.js and EV Certificates
In the labyrinthine landscape of cyber threats, the Trend Micro Managed XDR team has uncovered a malevolent symphony echoing the tactics employed by the infamous Genesis Market.
Trend Micro Managed XDR, or Extended Detection and...
Hackers Exploiting Zimbra 0-day to Attack Government Organizations
Zimbra Collaboration is an open-source solution software suite with an email server and web client for collaboration.
Over 5,000 companies and public sector users, along with hundreds of millions of end-users in more than 140...
McLaren Health Care Hacked: Attackers Claim 6 TB of Patient Data Stolen
In August of this year, McLaren Health Care suffered a cyber attack that resulted in the compromise of 2.2 million individual data records.
The attackers claimed to have accessed approximately 6 terabytes of sensitive patient...
Hackers Spreading WhatsApp Spy Mods Via Telegram
WhatsApp does not officially support WhatsApp mods and can vary in popularity. Some users are attracted to them for extra features and customization options.
However, using WhatsApp mods can expose users to security risks, as...
Kubernetes Security Flaw Let Attackers Escalate to Admin Privileges
A new privilege escalation vulnerability has been discovered in Kubernetes, which allows threat actors to gain administrative privileges on affected pods. The CVE for this vulnerability has been assigned as CVE-2023-3676, and the severity...
TA571 Hacker Group Deliver IcedID Malware Via Password-protected Zip Archive
Hackers often use password-protected Zip Archive files for malware distribution to evade detection by security software.
They let the malware infiltrate the target system without detection by encrypting the file, which makes it more difficult...