Category: Data Breaches

Your blog category

  • OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws

    OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws

    A second security flaw impacting the OttoKit (formerly SureTriggers) WordPress plugin has come under active exploitation in the wild.
    The vulnerability, tracked as CVE-2025-27007 (CVSS score: 9.8), is a privilege escalation bug impacting all versions of the plugin prior to and including version 1.0.82. 
    “This is due to the create_wp_connection() function missing a capability check and

  • SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version

    SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version

    Cybersecurity researchers have disclosed multiple security flaw in the on-premise version of SysAid IT support software that could be exploited to achieve pre-authenticated remote code execution with elevated privileges.
    The vulnerabilities, tracked as CVE-2025-2775, CVE-2025-2776, and CVE-2025-2777, have all been described as XML External Entity (XXE) injections, which occur when an attacker is

  • Reevaluating SSEs: A Technical Gap Analysis of Last-Mile Protection

    Reevaluating SSEs: A Technical Gap Analysis of Last-Mile Protection

    Security Service Edge (SSE) platforms have become the go-to architecture for securing hybrid work and SaaS access. They promise centralized enforcement, simplified connectivity, and consistent policy control across users and devices.
    But there’s a problem: they stop short of where the most sensitive user activity actually happens—the browser.
    This isn’t a small omission. It’s a structural

  • Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization

    Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization

    Threat actors with links to the Play ransomware family exploited a recently patched security flaw in Microsoft Windows as a zero-day as part of an attack targeting an unnamed organization in the United States.
    The attack, per the Symantec Threat Hunter Team, part of Broadcom, leveraged CVE-2025-29824, a privilege escalation flaw in the Common Log File System (CLFS) driver. It was patched by

  • Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet

    Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet

    Threat actors have been observed actively exploiting security flaws in GeoVision end-of-life (EoL) Internet of Things (IoT) devices to corral them into a Mirai botnet for conducting distributed denial-of-service (DDoS) attacks.
    The activity, first observed by the Akamai Security Intelligence and Response Team (SIRT) in early April 2025, involves the exploitation of two operating system command

  • New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims

    New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims

    Cybersecurity researchers have lifted the lid on two threat actors that orchestrate investment scams through spoofed celebrity endorsements and conceal their activity through traffic distribution systems (TDSes).
    The activity clusters have been codenamed Reckless Rabbit and Ruthless Rabbit by DNS threat intelligence firm Infoblox.
    The attacks have been observed to lure victims with bogus

  • Third Parties and Machine Credentials: The Silent Drivers Behind 2025’s Worst Breaches

    Third Parties and Machine Credentials: The Silent Drivers Behind 2025’s Worst Breaches

    It wasn’t ransomware headlines or zero-day exploits that stood out most in this year’s Verizon 2025 Data Breach Investigations Report (DBIR) — it was what fueled them. Quietly, yet consistently, two underlying factors played a role in some of the worst breaches: third-party exposure and machine credential abuse.
    According to the 2025 DBIR, third-party involvement in breaches doubled

  • Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks

    Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks

    Microsoft has warned that using pre-made templates, such as out-of-the-box Helm charts, during Kubernetes deployments could open the door to misconfigurations and leak valuable data.
    “While these ‘plug-and-play’ options greatly simplify the setup process, they often prioritize ease of use over security,” Michael Katchinskiy and Yossi Weizman from the Microsoft Defender for Cloud Research team

  • Entra ID Data Protection: Essential or Overkill?

    Entra ID Data Protection: Essential or Overkill?

    Microsoft Entra ID (formerly Azure Active Directory) is the backbone of modern identity management, enabling secure access to the applications, data, and services your business relies on. As hybrid work and cloud adoption accelerate, Entra ID plays an even more central role — managing authentication, enforcing policy, and connecting users across distributed environments.
    That prominence also

  • Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi

    Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi

    Cybersecurity researchers have disclosed a series of now-patched security vulnerabilities in Apple’s AirPlay protocol that, if successfully exploited, could enable an attacker to take over susceptible devices supporting the proprietary wireless technology.
    The shortcomings have been collectively codenamed AirBorne by Israeli cybersecurity company Oligo.
    “These vulnerabilities can be chained by