Category: Data Breaches

Your blog category

  • Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection

    Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection

    Cybersecurity researchers have disclosed a critical flaw impacting Salesforce Agentforce, a platform for building artificial intelligence (AI) agents, that could allow attackers to potentially exfiltrate sensitive data from its customer relationship management (CRM) tool by means of an indirect prompt injection.
    The vulnerability has been codenamed ForcedLeak (CVSS score: 9.4) by Noma Security,

  • North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers

    North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers

    The North Korea-linked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented backdoor called AkdoorTea, along with tools like TsunamiKit and Tropidoor.
    Slovak cybersecurity firm ESET, which is tracking the activity under the name DeceptiveDevelopment, said the campaign targets software developers across all operating systems, Windows,

  • CTEM’s Core: Prioritization and Validation

    CTEM’s Core: Prioritization and Validation

    Despite a coordinated investment of time, effort, planning, and resources, even the most up-to-date cybersecurity systems continue to fail. Every day. Why? 
    It’s not because security teams can’t see enough. Quite the contrary. Every security tool spits out thousands of findings. Patch this. Block that. Investigate this. It’s a tsunami of red dots that not even the most crackerjack team on

  • Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More

    Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More

    /* ===== Container ===== */
    .td-wrap {}

    /* ===== Section ===== */
    .td-section {
    }
    .td-title { margin: 16px 0 4px; font-size: 32px; line-height: 1.2; font-weight: 800; }
    .td-subtitle { margin: 0 0 24px; color: #64748b; font-size: 16px; }

    /* ===== Timeline ===== */
    .td-timeline { position: relative; margin: 0 !important;padding: 0!important; list-style: none; }
    /* spine */
    .td-timeline:before {

  • Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds

    Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds

    The latest Gcore Radar report analyzing attack data from Q1–Q2 2025, reveals a 41% year-on-year increase in total attack volume. The largest attack peaked at 2.2 Tbps, surpassing the 2 Tbps record in late 2024. Attacks are growing not only in scale but in sophistication, with longer durations, multi-layered strategies, and a shift in target industries. Technology now overtakes gaming as the most

  • Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike

    Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike

    A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning Africa, Asia, North America, South America, and Oceania has been assessed to be a Chinese state-sponsored threat actor.
    Recorded Future, which was tracking the activity under the moniker TAG-100, has now graduated it to a hacking group dubbed RedNovember.

  • UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

    UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

    Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the U.S. have been targeted by a suspected China-nexus cyber espionage group to deliver a known backdoor referred to as BRICKSTORM.
    The activity, attributed to UNC5221 and closely related, suspected China-nexus threat clusters, is designed to facilitate

  • Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

    Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

    Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the system to artificial intelligence (AI) model tampering and supply chain risks.
    The critical-rated vulnerabilities in question, discovered by Trend Micro, are listed below –

    CVE-2025-10643 (CVSS score: 9.1) – An authentication bypass vulnerability that

  • How One Bad Password Ended a 158-Year-Old Business

    How One Bad Password Ended a 158-Year-Old Business

    Most businesses don’t make it past their fifth birthday – studies show that roughly 50% of small businesses fail within the first five years. So when KNP Logistics Group (formerly Knights of Old) celebrated more than a century and a half of operations, it had mastered the art of survival. For 158 years, KNP adapted and endured, building a transport business that operated 500 trucks

  • New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

    New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

    Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share “significant” source code overlaps with IcedID and Latrodectus.
    “The exact connection to YiBackdoor is not yet clear, but it may be used in conjunction with Latrodectus and IcedID during attacks,” Zscaler ThreatLabz said in a Tuesday report. “YiBackdoor is able to execute