Category: Data Breaches

Your blog category

  • Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks

    Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks

    Cybersecurity researchers have shed light on a Russian-speaking cyber espionage group called Nebulous Mantis that has deployed a remote access trojan called RomCom RAT since mid-2022.
    RomCom “employs advanced evasion techniques, including living-off-the-land (LOTL) tactics and encrypted command and control (C2) communications, while continuously evolving its infrastructure – leveraging

  • WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy

    WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy

    Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence (AI) capabilities in a privacy-preserving manner.
    “Private Processing will allow users to leverage powerful optional AI features – like summarizing unread messages or editing help – while preserving WhatsApp’s core privacy promise,” the Meta-owned service said in a

  • New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems

    New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems

    Various generative artificial intelligence (GenAI) services have been found vulnerable to two types of jailbreak attacks that make it possible to produce illicit or dangerous content.
    The first of the two techniques, codenamed Inception, instructs an AI tool to imagine a fictitious scenario, which can then be adapted into a second scenario within the first one where there exists no safety

  • SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients

    SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients

    Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some of its high-value customers.
    “We first became aware of this threat cluster during a 2024 intrusion conducted against an organization previously providing hardware logistics services for SentinelOne employees,” security

  • Product Walkthrough: Securing Microsoft Copilot with Reco

    Product Walkthrough: Securing Microsoft Copilot with Reco

    Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats – all while keeping productivity high.

    Microsoft 365 Copilot promises to boost productivity by turning natural language prompts into actions. Employees can generate reports, comb through data, or get instant answers just by asking Copilot. 
    However,

  • Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products

    Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products

    Google has revealed that it observed 75 zero-day vulnerabilities exploited in the wild in 2024, down from 98 in 2023. 
    Of the 75 zero-days, 44% of them targeted enterprise products. As many as 20 flaws were identified in security software and appliances.
    “Zero-day exploitation of browsers and mobile devices fell drastically, decreasing by about a third for browsers and by about half for

  • ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More

    ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More

    What happens when cybercriminals no longer need deep skills to breach your defenses? Today’s attackers are armed with powerful tools that do the heavy lifting — from AI-powered phishing kits to large botnets ready to strike. And they’re not just after big corporations. Anyone can be a target when fake identities, hijacked infrastructure, and insider tricks are used to slip past security

  • How Breaches Start: Breaking Down 5 Real Vulns

    How Breaches Start: Breaking Down 5 Real Vulns

    Not every security vulnerability is high risk on its own – but in the hands of an advanced attacker, even small weaknesses can escalate into major breaches. These five real vulnerabilities, uncovered by Intruder’s bug-hunting team, reveal how attackers turn overlooked flaws into serious security incidents.
    1. Stealing AWS Credentials with a Redirect

    Server-Side Request Forgery (SSRF) is a

  • Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools

    Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools

    Government and telecommunications sectors in Southeast Asia have become the target of a “sophisticated” campaign undertaken by a new advanced persistent threat (APT) group called Earth Kurma since June 2024.
    The attacks, per Trend Micro, have leveraged custom malware, rootkits, and cloud storage services for data exfiltration. The Philippines, Vietnam, Thailand, and Malaysia are among the

  • WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors

    WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors

    Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with a fake security alert urging them to download a “critical patch” but deploy a backdoor instead.
    WordPress security company Patchstack described the activity as sophisticated and a variant of another campaign observed in December 2023 that employed a fake CVE ploy to breach sites running