Category: Data Breaches

Your blog category

  • Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues

    Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues

    Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing “patterns of concerning behavior observed over the past year.”
    The changes are expected to be introduced in Chrome 139, which is scheduled for public release in early August 2025. The current major version is 137. 
    The update will affect all Transport Layer Security (TLS)

  • Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

    Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

    Cybersecurity researchers have discovered a new cryptojacking campaign that’s targeting publicly accessible DevOps web servers such as those associated with Docker, Gitea, and HashiCorp Consul and Nomad to illicitly mine cryptocurrencies.
    Cloud security firm Wiz, which is tracking the activity under the name JINX-0132, said the attackers are exploiting a wide range of known misconfigurations and

  • Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN

    Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN

    Three security vulnerabilities have been disclosed in preloaded Android applications on smartphones from Ulefone and Krüger&Matz that could enable any app installed on the device to perform a factory reset and encrypt an application.
    A brief description of the three flaws is as follows –

    CVE-2024-13915 (CVSS score: 6.9) – A pre-installed “com.pri.factorytest” application on Ulefone and

  • Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU

    Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU

    Qualcomm has shipped security updates to address three zero-day vulnerabilities that it said have been exploited in limited, targeted attacks in the wild.
    The flaws in question, which were responsibly disclosed to the company by the Google Android Security team, are listed below –

    CVE-2025-21479 and CVE-2025-21480 (CVSS score: 8.6) – Two incorrect authorization vulnerabilities in the Graphics

  • ⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

    ⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

    If this had been a security drill, someone would’ve said it went too far. But it wasn’t a drill—it was real. The access? Everything looked normal. The tools? Easy to find. The detection? Came too late.
    This is how attacks happen now—quiet, convincing, and fast. Defenders aren’t just chasing hackers anymore—they’re struggling to trust what their systems are telling them.
    The problem isn’t too

  • The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats

    The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats

    The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As attackers become more sophisticated — leveraging encryption, living-off-the-land techniques, and lateral movement to evade traditional defenses — security teams are finding more threats wreaking havoc before they can be detected. Even after an attack has been identified, it can

  • New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

    New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

    Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise Linux, and Fedora, according to the Qualys Threat Research Unit (TRU).
    Tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are race condition bugs that could enable a local attacker to obtain access to access sensitive information. Tools like

  • U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

    U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

    A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered services to threat actors to ensure that their malicious software stayed undetected from security software.
    To that effect, the U.S. Department of Justice (DoJ) said it seized four domains and their associated server facilitated the crypting service on May 27, 2025, in

  • New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data

    New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data

    A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages.
    “This campaign leverages deceptive CAPTCHA verification pages that trick users into executing a malicious PowerShell script, which ultimately deploys the infostealer, harvesting sensitive data such as

  • China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

    China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

    The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver has been attributed to a broader set of attacks targeting organizations in Brazil, India, and Southeast Asia since 2023.
    “The threat actor mainly targets the SQL injection vulnerabilities discovered on web applications to access the SQL servers of targeted organizations,” Trend