Category: Data Breaches

Your blog category

  • The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier

    The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier

    Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to interact securely and efficiently without constant human oversight, which is where non-human identities (NHIs) come in. NHIs — including application secrets, API keys, service accounts, and OAuth tokens — have exploded in recent years, thanks to an

  • Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

    Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

    The reconnaissance activity targeting American cybersecurity company SentinelOne was part of a broader set of partially-related intrusions into several targets between July 2024 and March 2025.
    “The victimology includes a South Asian government entity, a European media organization, and more than 70 organizations across a wide range of sectors,” SentinelOne security researchers Aleksandar

  • Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks

    Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks

    A now-patched critical security flaw in the Wazur Server is being exploited by threat actors to drop two different Mirai botnet variants and use them to conduct distributed denial-of-service (DDoS) attacks.
    Akamai, which first discovered the exploitation efforts in late March 2025, said the malicious campaign targets CVE-2025-24016 (CVSS score: 9.9), an unsafe deserialization vulnerability that

  • ⚡ Weekly Recap: Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

    ⚡ Weekly Recap: Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

    Behind every security alert is a bigger story. Sometimes it’s a system being tested. Sometimes it’s trust being lost in quiet ways—through delays, odd behavior, or subtle gaps in control.
    This week, we’re looking beyond the surface to spot what really matters. Whether it’s poor design, hidden access, or silent misuse, knowing where to look can make all the difference.
    If you’re responsible for

  • Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise

    Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise

    You don’t need a rogue employee to suffer a breach.
    All it takes is a free trial that someone forgot to cancel. An AI-powered note-taker quietly syncing with your Google Drive. A personal Gmail account tied to a business-critical tool. That’s shadow IT. And today, it’s not just about unsanctioned apps, but also dormant accounts, unmanaged identities, over-permissioned SaaS

  • OpenAI Bans ChatGPT Accounts Used by Russian, Iranian, and Chinese Hacker Groups

    OpenAI Bans ChatGPT Accounts Used by Russian, Iranian, and Chinese Hacker Groups

    OpenAI has revealed that it banned a set of ChatGPT accounts that were likely operated by Russian-speaking threat actors and two Chinese nation-state hacking groups to assist with malware development, social media automation, and research about U.S. satellite communications technologies, among other things.
    “The [Russian-speaking] actor used our models to assist with developing and refining

  • Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials

    Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials

    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks.

    “Several widely used extensions […] unintentionally transmit sensitive data over simple HTTP,” Yuanjing Guo, a security researcher in the Symantec’s Security Technology and Response

  • Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

    Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

    The threat actor known as Bitter has been assessed to be a state-backed hacking group that’s tasked with gathering intelligence that aligns with the interests of the Indian government.
    That’s according to new findings jointly published by Proofpoint and Threatray in an exhaustive two-part analysis.
    “Their diverse toolset shows consistent coding patterns across malware families, particularly in

  • Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation

    Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation

    Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business getting in return? CISOs respond with reports on controls and vulnerability counts – but executives want to understand risk in terms of financial exposure, operational impact, and avoiding loss.
    The

  • Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware

    Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware

    An Iran-aligned hacking group has been attributed to a new set of cyber attacks targeting Kurdish and Iraqi government officials in early 2024.
    The activity is tied to a threat group ESET tracks as BladedFeline, which is assessed with medium confidence to be a sub-cluster within OilRig, a known Iranian nation-state cyber actor. It’s said to be active since September 2017, when it targeted