Category: Data Breaches

Your blog category

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

    China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

    Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at least 2019.
    The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices. Its primary targets seem to

  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

    CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over the next 12 to 18 months.
    The agency said the move is to drive down technical debt and minimize

  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

    Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

    A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year, according to new findings from Palo Alto Networks Unit 42.
    In addition, the hacking crew has been observed conducting active reconnaissance against government infrastructure associated with 155

  • How Samsung Knox Helps Stop Your Network Security Breach

    How Samsung Knox Helps Stop Your Network Security Breach

    As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls are now more detailed. However (and it’s a big “however”), the increasing use of mobile devices in business operations necessitates network security measures that are specifically

  • New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

    New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

    A high-severity security flaw has been disclosed in MongoDB that could allow unauthenticated users to read uninitialized heap memory.
    The vulnerability, tracked as CVE-2025-14847 (CVSS score: 8.7), has been described as a case of improper handling of length parameter inconsistency, which arises when a program fails to appropriately tackle scenarios where a length field is inconsistent with the

  • Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

    Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

    Trust Wallet is urging users to update its Google Chrome extension to the latest version following what it described as a “security incident” that led to the loss of approximately $7 million.
    The issue, the multi‑chain, non‑custodial cryptocurrency wallet service said, impacts version 2.68. The extension has about one million users, according to the Chrome Web Store listing. Users are advised to

  • China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

    China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

    A China-linked advanced persistent threat (APT) group has been attributed to a highly-targeted cyber espionage campaign in which the adversary poisoned Domain Name System (DNS) requests to deliver its signature MgBot backdoor in attacks targeting victims in Türkiye, China, and India.
    The activity, Kaspersky said, was observed between November 2022 and November 2024. It has been linked to a

  • Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

    Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

    A critical security flaw has been disclosed in LangChain Core that could be exploited by an attacker to steal sensitive secrets and even influence large language model (LLM) responses through prompt injection.
    LangChain Core (i.e., langchain-core) is a core Python package that’s part of the LangChain ecosystem, providing the core interfaces and model-agnostic abstractions for building

  • ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

    ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

    It’s getting harder to tell where normal tech ends and malicious intent begins. Attackers are no longer just breaking in — they’re blending in, hijacking everyday tools, trusted apps, and even AI assistants. What used to feel like clear-cut “hacker stories” now looks more like a mirror of the systems we all use.
    This week’s findings show a pattern: precision, patience, and persuasion. The

  • LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds

    LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds

    The encrypted vault backups stolen from the 2022 LastPass data breach have enabled bad actors to take advantage of weak master passwords to crack them open and drain cryptocurrency assets as recently as late 2025, according to new findings from TRM Labs.
    The blockchain intelligence firm said evidence points to the involvement of Russian cybercriminal actors in the activity, with one of the