The research revealed that nine out of fourteen android apps, which have more than 30 million users, are potentially leaking data. The top 14 Android apps with over a hundred million installs are at risk for being Firebase misconfigured. Unauthorized parties might access these apps and expose confidential data. Almost everyone has an Android app installed on...Continue Reading
Two mental healthcare providers in America have been exposed to a data breach that has compromised thousands of affected people’s personal health information (PHI). The first one is Horizon House, Inc., a mental healthcare provider located in Philadelphia, Pennsylvania. Last March 5, Horizon House discovered suspicious activity in their IT networks and revealed from the investigation that ransomware has infected their IT systems. The healthcare provider...Continue Reading
An American e-commerce firm and leading designer and manufacturer of clothing items, Next Level Apparel, has recently experienced a data breach issue that affected its employees’ email accounts. As reported by the firm’s issued press release, a small number of employee email accounts have been compromised to an email phishing incident. The attack has given threat actors unauthorized access to sensitive company information. The exposed...Continue Reading
Crystal Valley, a farm supply and grain marketing organization from Minnesota, has been hit by a ransomware attack, as confirmed from their Facebook post last September 19. The website went down temporarily as a result of the attack. As of now, it is working The firm said from their statement that their computer systems have been attacked,...Continue Reading
The Pandora Papers involve a series of investigations regarding the recent leak of the illegal dealings of corrupted, wealthy, and influential individuals and their offshore bank accounts to conceal their unprecedented collection of money amounting to more than trillions of dollars. Partnering with 600 journalists from over 100 media firms worldwide, the International Consortium of Investigative Journalists (ICIJ) holds the investigation. The group has already acquired about 11.9 million worth of confidential documents from different financial...Continue Reading
A 4GB worth of stolen data allegedly from Fujitsu was posted last August by a popular cybercrime marketplace known as Marketo. When the group was marketing the stolen data that they claim to be from Fujitsu, the company said that they were actually investigating a potential attack. They added that the source of this possible attack is unknown. Meanwhile, the attacker group Marketo said that they...Continue Reading
Gigabyte Technologies, a motherboard maker and manufacturer of computer hardware from Taiwan, has been targeted and attacked by a ransomware gang called RansomEXX. This ransomware gang has threatened Gigabyte to pay them their ransom request, or else they will publish 112GB of their stolen data from the company. Gigabyte’s main product offered is motherboards, but they also provide and...Continue Reading
As reported by Cisco Talos, a new malware called “Solarmarker” has been campaigning since September of 2020; however, around April 2020, there have been reports of its telemetry data pointing up to some malicious actions. From a published technical review of Talos researchers Chris Neal and Andrew Windsor, the core campaign of the Solarmarker malware is seemed to...Continue Reading
It is a usual scenario where our passwords are required to be changed at times of data breach. Still, the truth is that cybercriminals take advantage of this situation by harvesting all the vulnerable target information before victims actually become aware of what’s happening. Learn more about how the data breaching process happens here. Passwords have undeniably become the source of protection and authentication for...Continue Reading
Another instance of a supply chain attack has been reported; this time, it’s on the Git repository of PHP and their data storage. The hacked repository and the codebase contents were tampered with. The incident’s investigation is ongoing and more details will be revealed in the upcoming days. On the initial reports, the malicious activity...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.