Category: Data Breaches

Your blog category

  • UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

    UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

    The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM) infrastructure using a 4G-equipped Raspberry Pi as part of a covert attack.
    The cyber-physical attack involved the adversary leveraging their physical access to install the Raspberry Pi device and have it connected directly to the same network switch as the ATM, effectively placing

  • Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

    Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

    Security Operations Centers (SOCs) are stretched to their limits. Log volumes are surging, threat landscapes are growing more complex, and security teams are chronically understaffed. Analysts face a daily battle with alert noise, fragmented tools, and incomplete data visibility. At the same time, more vendors are phasing out their on-premises SIEM solutions, encouraging migration to SaaS

  • Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

    Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

    Threat actors are actively exploiting a critical security flaw in “Alone – Charity Multipurpose Non-profit WordPress Theme” to take over susceptible sites.
    The vulnerability, tracked as CVE-2025-5394, carries a CVSS score of 9.8. Security researcher Thái An has been credited with discovering and reporting the bug.
    According to Wordfence, the shortcoming relates to an arbitrary file upload

  • Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits

    Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits

    Cybersecurity researchers have disclosed now-patched critical security flaws in the firmware of Dahua smart cameras that, if left unaddressed, could allow attackers to hijack control of susceptible devices.
    “The flaws, affecting the device’s ONVIF protocol and file upload handlers, allow unauthenticated attackers to execute arbitrary commands remotely, effectively taking over the device,”

  • Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools

    Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools

    Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon (aka Hafnium) have been identified as behind over a dozen technology patents, shedding light on the shadowy cyber contracting ecosystem and its offensive capabilities.
    The patents cover forensics and intrusion tools that enable encrypted endpoint data collection, Apple device forensics, and remote access to

  • Product Walkthrough: A Look Inside Pillar’s AI Security Platform

    Product Walkthrough: A Look Inside Pillar’s AI Security Platform

    In this article, we will provide a brief overview of Pillar Security’s platform to better understand how they are tackling AI security challenges.
    Pillar Security is building a platform to cover the entire software development and deployment lifecycle with the goal of providing trust in AI systems. Using its holistic approach, the platform introduces new ways of detecting AI threats, beginning

  • Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome

    Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome

    Apple on Tuesday released security updates for its entire software portfolio, including a fix for a vulnerability that Google said was exploited as a zero-day in the Chrome web browser earlier this month.
    The vulnerability, tracked as CVE-2025-6558 (CVSS score: 8.8), is an incorrect validation of untrusted input in the browser’s ANGLE and GPU components that could result in a sandbox escape via

  • Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero

    Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero

    Google has announced that it’s making a security feature called Device Bound Session Credentials (DBSC) in open beta to ensure that users are safeguarded against session cookie theft attacks.
    DBSC, first introduced as a prototype in April 2024, is designed to bind authentication sessions to a device so as to prevent threat actors from using stolen cookies to sign-in to victims’ accounts and gain

  • Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims

    Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims

    A newly emerged ransomware-as-a-service (RaaS) gang called Chaos is likely made up of former members of the BlackSuit crew, as the latter’s dark web infrastructure has been the subject of a law enforcement seizure.
    Chaos, which sprang forth in February 2025, is the latest entrant in the ransomware landscape to conduct big-game hunting and double extortion attacks.
    “Chaos RaaS actors initiated

  • How the Browser Became the Main Cyber Battleground

    How the Browser Became the Main Cyber Battleground

    Until recently, the cyber attacker methodology behind the biggest breaches of the last decade or so has been pretty consistent:

    Compromise an endpoint via software exploit, or social engineering a user to run malware on their device; 
    Find ways to move laterally inside the network and compromise privileged identities;
    Repeat as needed until you can execute your desired attack — usually