SIEM as a Service
Home Information Security

Information Security

Payment Gateway Platform SLIM CD Data Breach, 1.7 Million Users Data Exposed

Payment Gateway Platform SLIM CD Data Breach, 1.7 Million Users Data Exposed

The Slim CD, Inc., a prominent payment processing gateway for US and Canadian merchants, has disclosed a data breach affecting approximately 1.7 million users. The unauthorized access between August 17, 2023, and June 15, 2024,...
Cyberattacks On Venture Capital Firms : Strengthening CRM Defenses

Cyberattacks On Venture Capital Firms : Strengthening CRM Defenses

In 2023, statistics show that 72% of businesses throughout the world encountered ransomware incidents. This emphasizes how grave these dangers are becoming, and venture capital firms (VCs) are no exception.  VCs manage delicate investor and...
Passkeys Via AitM Phishing Attacks

Hackers Breaking Passkeys Using AitM Phishing Attacks

Hackers abuse phishing attacks as they are highly effective and low-cost methods for deceiving users into revealing sensitive information. Despite the recent surge in passkey adoption by large tech firms, Joe Stewart of Esentire discovered...
How To Choose The Best Free CRM : Discover The Power Of Bitrix24

How To Choose The Best Free CRM : Discover The Power Of Bitrix24

In today's competitive business landscape, managing customer relationships effectively is crucial for success. A Customer Relationship Management (CRM) system can streamline operations, improve customer interactions, and boost overall productivity. With numerous CRM options available,...
Team ARXU Hackers Aggressively Attacking Schools And Bank Servers

Team ARXU Hackers Aggressively Attacking Schools And Bank Servers

Hackers frequently target schools and bank servers to obtain important personal information, including financial data, that can be used for identity theft and financial fraud. These data are also being sold on the dark...
Hackers Leveraging Compiled V8 JavaScript In Wild To Deploy Malware

Hackers Leveraging Compiled V8 JavaScript In Wild To Deploy Malware

Hackers exploit compiled V8 JavaScript to obfuscate their malicious code, as the compiled bytecode effectively hides the malware's original source code and intentions. Recently, the use of compiled V8 JavaScript by malware authors has been...
Critical Splunk Vulnerability Exploited Using Crafted GET Commands

Critical Splunk Vulnerability Exploited Using Crafted GET Commands

Splunk Enterprise is one of the many applications Splunk offers for security and monitoring purposes. It allows organizations to search, analyze and visualize data which can help to respond to incidents in a better way....
ERP Provider Exposes 769 Million Records, Including API Keys And Email Addresses

ERP Provider Exposes 769 Million Records, Including API Keys And Email Addresses

A massive data breach involving ClickBalance, one of Mexico's largest Enterprise Resource Planning (ERP) technology providers, has been uncovered by cybersecurity researcher Jeremiah Fowler. The breach exposed a staggering 769,333,246 records, totaling 395 GB...
Sonos Smart Speaker Vulnerability

Sonos Smart Speaker Vulnerability Let Attackers Execute Remote Code

In the beginning of August 2024, Sonos released a security advisory in which they fixed two security vulnerabilities that were associated with Remote Code Execution. These vulnerabilities have been assigned with CVE-2023-50810 and CVE-2023-50809.  These...
Hacking GitHub Repositories Via Race Condition That leads To Remote Code Execution

GitHub Vulnerability “ArtiPACKED” Trigger RCE Exploit to Hack Repositories

The research identifies a critical security vulnerability in GitHub Actions artifacts, enabling unauthorized access to tokens and secrets within CI/CD pipelines.  Misconfigured workflows in major organizations' public repositories exposed sensitive information, potentially compromising cloud environments...
SIEM as a Service

Recent Posts