Category: Data Breaches

Your blog category

  • Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts

    Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts

    Google on Thursday said it’s rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by threat actors who post inauthentic bad reviews on the platform and demand ransoms to remove the negative comments.
    The approach is designed to tackle a common practice called review bombing, where online users intentionally post negative user reviews in an

  • Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

    Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

    Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to be created with the help of artificial intelligence – in other words, vibe-coded.
    Secure Annex researcher John Tuckner, who flagged the extension “susvsex,” said it does not attempt to hide its malicious functionality. The extension was uploaded on

  • Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

    Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

    A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting Ukrainian entities.
    The campaign, detected in May 2025, is tracked by the security outfit under the moniker InedibleOchotense, describing it as Russia-aligned.
    “InedibleOchotense sent spear-phishing emails and Signal text messages, containing a link

  • From Tabletop to Turnkey: Building Cyber Resilience in Financial Services

    From Tabletop to Turnkey: Building Cyber Resilience in Financial Services

    Introduction
    Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement.
    Crisis management or Tabletop exercises, for a long time relatively rare in the context of cybersecurity, have become required as a series of regulations has introduced this requirement to FSI organizations in

  • ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More

    ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More

    Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and even trusted apps or social platforms are turning into attack vectors.
    The result is a global system where every digital weakness can be turned into physical harm, economic loss, or political

  • Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response

    Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response

    Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) — marking the fourth consecutive year of inclusion. According to Gartner, more than 600 providers globally claim to deliver MDR services, yet only a select few meet the criteria to appear in the Market Guide. While inclusion is not a ranking or comparative

  • Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

    Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

    The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware.
    According to a new report from Bitdefender, the adversary is said to have enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine.
    “This hidden environment, with its lightweight

  • SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

    SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

    SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files.
    “The malicious activity – carried out by a state-sponsored threat actor – was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call,” the company said in a

  • Securing the Open Android Ecosystem with Samsung Knox

    Securing the Open Android Ecosystem with Samsung Knox

    Raise your hand if you’ve heard the myth, “Android isn’t secure.”
    Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may worry about the security—after all, work data is critical.
    However, outdated concerns can hold your business back from unlocking its full potential. The truth is, with work happening everywhere, every device connected to your

  • Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions

    Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions

    A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting academics and foreign policy experts between June and August 2025, coinciding with heightened geopolitical tensions between Iran and Israel.
    “UNK_SmudgedSerpent leveraged domestic political lures, including societal change in Iran and investigation into the