Category: Data Breaches

Your blog category

  • U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud

    U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud

    The U.S. Treasury Department on Tuesday imposed sanctions against eight individuals and two entities within North Korea’s global financial network for laundering money for various illicit schemes, including cybercrime and information technology (IT) worker fraud.
    “North Korean state-sponsored hackers steal and launder money to fund the regime’s nuclear weapons program,” said Under Secretary of

  • Why SOC Burnout Can Be Avoided: Practical Steps

    Why SOC Burnout Can Be Avoided: Practical Steps

    Behind every alert is an analyst; tired eyes scanning dashboards, long nights spent on false positives, and the constant fear of missing something big. It’s no surprise that many SOCs face burnout before they face their next breach. But this doesn’t have to be the norm. The path out isn’t through working harder, but through working smarter, together.
    Here are three practical steps every SOC can

  • CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence

    CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Gladinet and Control Web Panel (CWP) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
    The vulnerabilities in question are listed below –

    CVE-2025-11371 (CVSS score: 7.5) – A vulnerability in files or directories accessible to

  • Ransomware Defense Using the Wazuh Open Source Platform

    Ransomware Defense Using the Wazuh Open Source Platform

    Ransomware is malicious software designed to block access to a computer system or encrypt data until a ransom is paid. This cyberattack is one of the most prevalent and damaging threats in the digital landscape, affecting individuals, businesses, and critical infrastructure worldwide.
    A ransomware attack typically begins when the malware infiltrates a system through various vectors such as

  • Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors

    Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors

    Threat actors are leveraging weaponized attachments distributed via phishing emails to deliver malware likely targeting the defense sector in Russia and Belarus.
    According to multiple reports from Cyble and Seqrite Labs, the campaign is designed to deploy a persistent backdoor on compromised hosts that uses OpenSSH in conjunction with a customized Tor hidden service that employs obfs4 for

  • Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

    Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

    Google’s artificial intelligence (AI)-powered cybersecurity agent called Big Sleep has been credited by Apple for discovering as many as five different security flaws in the WebKit component used in its Safari web browser that, if successfully exploited, could result in a browser crash or memory corruption.
    The list of vulnerabilities is as follows –

    CVE-2025-43429 – A buffer overflow

  • U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks

    U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks

    Federal prosecutors in the U.S. have accused a trio of allegedly hacking the networks of five U.S. companies with BlackCat (aka ALPHV) ransomware between May and November 2023 and extorting them.
    Ryan Clifford Goldberg, Kevin Tyler Martin, and an unnamed co–conspirator (aka “Co-Conspirator 1”) based in Florida, all U.S. nationals, are said to have used the ransomware strain against a medical

  • Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel

    Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel

    Microsoft has disclosed details of a novel backdoor dubbed SesameOp that uses OpenAI Assistants Application Programming Interface (API) for command-and-control (C2) communications.
    “Instead of relying on more traditional methods, the threat actor behind this backdoor abuses OpenAI as a C2 channel as a way to stealthily communicate and orchestrate malicious activities within the compromised

  • ⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

    ⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

    Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems—some just hours after being found. No system was fully safe.
    From spying and fake job scams to strong ransomware and tricky phishing, the attacks came from all sides. Even encrypted backups and secure areas were put to the test.

  • The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations

    The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations

    Security Operations Centers (SOC) today are overwhelmed. Analysts handle thousands of alerts every day, spending much time chasing false positives and adjusting detection rules reactively. SOCs often lack the environmental context and relevant threat intelligence needed to quickly verify which alerts are truly malicious. As a result, analysts spend excessive time manually triaging alerts, the