Category

Compromised Data

Compromised Data Page 1

Top 14 Android mobile Apps Firebase misconfigured

Top 14 Android Apps with Millions of installs are Firebase misconfigured

The research revealed that nine out of fourteen android apps, which have more than 30 million users, are potentially leaking data. The top 14 Android apps with over a hundred million installs are at risk for being Firebase misconfigured. Unauthorized parties might access these apps and expose confidential data.     Almost everyone has an Android app installed on...
Continue Reading
personal health information American Mental Healthcare provider exposed Data Breach

Thousands of personal health information of two American Mental Healthcare providers exposed to Data Breach

Two mental healthcare providers in America have been exposed to a data breach that has compromised thousands of affected people’s personal health information (PHI).  The first one is Horizon House, Inc., a mental healthcare provider located in Philadelphia, Pennsylvania. Last March 5, Horizon House discovered suspicious activity in their IT networks and revealed from the investigation that ransomware has infected their IT systems. The healthcare provider...
Continue Reading
Ecommerce firm Next Level Apparel email phishing

E-commerce firm, Next Level Apparel suffered email phishing that affects some employees

An American e-commerce firm and leading designer and manufacturer of clothing items, Next Level Apparel, has recently experienced a data breach issue that affected its employees’ email accounts. As reported by the firm’s issued press release, a small number of employee email accounts have been compromised to an email phishing incident. The attack has given threat actors unauthorized access to sensitive company information.  The exposed...
Continue Reading
Daily operations disrupted ransomware attack Crystal Valley Cooperative

Daily operations disrupted as ransomware hits Crystal Valley Cooperative

Crystal Valley, a farm supply and grain marketing organization from Minnesota, has been hit by a ransomware attack, as confirmed from their Facebook post last September 19. The website went down temporarily as a result of the attack. As of now, it is working  The firm said from their statement that their computer systems have been attacked,...
Continue Reading
Pandora Papers Data Leak offshore bank account data the world’s most powerful

Recent revelations about Pandora Papers: Leak exposing offshore bank account data of the world’s most powerful

The Pandora Papers involve a series of investigations regarding the recent leak of the illegal dealings of corrupted, wealthy, and influential individuals and their offshore bank accounts to conceal their unprecedented collection of money amounting to more than trillions of dollars.  Partnering with 600 journalists from over 100 media firms worldwide, the International Consortium of Investigative Journalists (ICIJ) holds the investigation. The group has already acquired about 11.9 million worth of confidential documents from different financial...
Continue Reading
Fujitsu confirms cyberattack not related hacker marketplace Marketo dark web

Fujitsu officially confirms that the cyberattack on its systems are not related to hacker marketplace Marketo

A 4GB worth of stolen data allegedly from Fujitsu was posted last August by a popular cybercrime marketplace known as Marketo. When the group was marketing the stolen data that they claim to be from Fujitsu, the company said that they were actually investigating a potential attack. They added that the source of this possible attack is unknown. Meanwhile, the attacker group Marketo said that they...
Continue Reading
RansomEXX gigabyte tech ransomware gang

RansomEXX ransomware attacks Gigabyte Technologies

Gigabyte Technologies, a motherboard maker and manufacturer of computer hardware from Taiwan, has been targeted and attacked by a ransomware gang called RansomEXX. This ransomware gang has threatened Gigabyte to pay them their ransom request, or else they will publish 112GB of their stolen data from the company.  Gigabyte’s main product offered is motherboards, but they also provide and...
Continue Reading
Solarmarker InfoStealer Malware

The return of the Solarmarker InfoStealer Malware

As reported by Cisco Talos, a new malware called “Solarmarker” has been campaigning since September of 2020; however, around April 2020, there have been reports of its telemetry data pointing up to some malicious actions. From a published technical review of Talos researchers Chris Neal and Andrew Windsor, the core campaign of the Solarmarker malware is seemed to...
Continue Reading
Fraudsters user passwords data breach online phishing

Fraudsters harvest user passwords via data breach and online phishing

It is a usual scenario where our passwords are required to be changed at times of data breach. Still, the truth is that cybercriminals take advantage of this situation by harvesting all the vulnerable target information before victims actually become aware of what’s happening. Learn more about how the data breaching process happens here.   Passwords have undeniably become the source of protection and authentication for...
Continue Reading
php git server compromised supply chain attack

PHP’s git server gets compromised by another Supply Chain Attack

Another instance of a supply chain attack has been reported; this time, it’s on the Git repository of PHP and their data storage. The hacked repository and the codebase contents were tampered with. The incident’s investigation is ongoing and more details will be revealed in the upcoming days. On the initial reports, the malicious activity...
Continue Reading
1 2 3 10