Category: Data Breaches

Your blog category

  • CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet

    CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added three security flaws, each impacting AMI MegaRAC, D-Link DIR-859 router, and Fortinet FortiOS, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
    The list of vulnerabilities is as follows –

    CVE-2024-54085 (CVSS score: 10.0) – An authentication bypass by spoofing

  • WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews

    WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews

    Popular messaging platform WhatsApp has added a new artificial intelligence (AI)-powered feature that leverages its in-house solution Meta AI to summarize unread messages in chats.
    The feature, called Message Summaries, is currently rolling out in the English language to users in the United States, with plans to bring it to other regions and languages later this year.
    It “uses Meta AI to

  • Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure

    Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure

    Cybersecurity researchers have detailed two now-patched security flaws in SAP Graphical User Interface (GUI) for Windows and Java that, if successfully exploited, could have enabled attackers to access sensitive information under certain conditions.
    The vulnerabilities, tracked as CVE-2025-0055 and CVE-2025-0056 (CVSS scores: 6.0), were patched by SAP as part of its monthly updates for January

  • Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

    Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

    Thousands of personal records allegedly linked to athletes and visitors of the Saudi Games have been published online by a pro-Iranian hacktivist group called Cyber Fattah.
    Cybersecurity company Resecurity said the breach was announced on Telegram on June 22, 2025, in the form of SQL database dumps, characterizing it as an information operation “carried out by Iran and its proxies.”
    “The actors

  • Beware the Hidden Risk in Your Entra Environment

    Beware the Hidden Risk in Your Entra Environment

    If you invite guest users into your Entra ID tenant, you may be opening yourself up to a surprising risk. 
    A gap in access control in Microsoft Entra’s subscription handling is allowing guest users to create and transfer subscriptions into the tenant they are invited into, while maintaining full ownership of them. 
    All the guest user needs are the permissions to create subscriptions in

  • SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

    SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

    Unknown threat actors have been distributing a trojanized version of SonicWall’s SSL VPN NetExtender application to steal credentials from unsuspecting users who may have installed it.
    “NetExtender enables remote users to securely connect and run applications on the company network,” SonicWall researcher Sravan Ganachari said. “Users can upload and download files, access network drives, and use

  • North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages

    North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages

    Cybersecurity researchers have uncovered a fresh batch of malicious npm packages linked to the ongoing Contagious Interview operation originating from North Korea.
    According to Socket, the ongoing supply chain attack involves 35 malicious packages that were uploaded from 24 npm accounts. These packages have been collectively downloaded over 4,000 times. The complete list of the JavaScript

  • Between Buzz and Reality: The CTEM Conversation We All Need

    Between Buzz and Reality: The CTEM Conversation We All Need

    I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn’t have asked for a better kickoff panel: three cybersecurity leaders who don’t just talk security, they live it.
    Let me introduce them.
    Alex Delay, CISO at IDB Bank, knows what it means to defend a highly regulated environment. Ben Mead, Director of Cybersecurity at Avidity

  • Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

    Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

    Misconfigured Docker instances are the target of a campaign that employs the Tor anonymity network to stealthily mine cryptocurrency in susceptible environments.
    “Attackers are exploiting misconfigured Docker APIs to gain access to containerized environments, then using Tor to mask their activities while deploying crypto miners,” Trend Micro researchers Sunil Bharti and Shubham Singh said in an

  • U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

    U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

    The U.S. House of Representatives has formally banned congressional staff members from using WhatsApp on government-issued devices, citing security concerns.
    The development was first reported by Axios.
    The decision, according to the House Chief Administrative Officer (CAO), was motivated by worries about the app’s security.
    “The Office of Cybersecurity has deemed WhatsApp a high-risk to users