Data leak

Preventing data leakage in low-node/no-code environments

Preventing data leakage in low-node/no-code environments 2024-12-10 at 07:34 By Help Net Security Low-code/no-code (LCNC) platforms enable application development by citizen developers, often generating “shadow engineering” projects that evade security oversight. While LCNC solutions like Power BI reports and automated workflows foster agility and innovation, they also introduce significant risks, including data leakage. Data leakage […]

React to this headline:

Loading spinner

Preventing data leakage in low-node/no-code environments Read More »

Massive troves of Amazon, HSBC employee data leaked

Massive troves of Amazon, HSBC employee data leaked 2024-11-12 at 12:18 By Zeljka Zorz A threat actor who goes by the online moniker “Nam3L3ss” has leaked employee data belonging to a number of corporations – including Amazon, 3M, HSBC and HP – ostensibly compromised during the May 2023 MOVEit hack by the Cl0p ransomware gang,

React to this headline:

Loading spinner

Massive troves of Amazon, HSBC employee data leaked Read More »

Patching problems: The “return” of a Windows Themes spoofing vulnerability

Patching problems: The “return” of a Windows Themes spoofing vulnerability 2024-10-29 at 12:18 By Zeljka Zorz Despite two patching attempts, a security issue that may allow attackers to compromise Windows user’s NTLM (authentication) credentials via a malicious Windows themes file still affects Microsoft’s operating system, 0patch researchers have discovered. The path to discovery The story

React to this headline:

Loading spinner

Patching problems: The “return” of a Windows Themes spoofing vulnerability Read More »

Data Breach and DDoS Attacks Take Archive.org and Open Library Offline

Data Breach and DDoS Attacks Take Archive.org and Open Library Offline 2024-10-12 at 03:19 By Paul Shread Key Takeaways Overview The Internet Archive has taken its Archive.org and OpenLibrary.org sites offline in response to a data breach and repeated DDoS attacks. The breach of a user authentication database, which exposed the email addresses and credentials

React to this headline:

Loading spinner

Data Breach and DDoS Attacks Take Archive.org and Open Library Offline Read More »

Internet Archive data breach, defacement, and DDoS: Users’ data compromised

Internet Archive data breach, defacement, and DDoS: Users’ data compromised 2024-10-10 at 12:46 By Zeljka Zorz The Internet Archive has suffered a data breach, leading to the compromise of email addresses, screen names and bcrypt password hashes of some 31 million users. The compromise was revealed on Wednesday afternoon, when the digital library’s website began

React to this headline:

Loading spinner

Internet Archive data breach, defacement, and DDoS: Users’ data compromised Read More »

Deloitte Says No Threat to Sensitive Data After Hacker Claims Server Breach

Deloitte Says No Threat to Sensitive Data After Hacker Claims Server Breach 2024-09-24 at 12:16 By Eduard Kovacs Deloitte says no sensitive data exposed after a notorious hacker leaked what he claimed to be internal communications.  The post Deloitte Says No Threat to Sensitive Data After Hacker Claims Server Breach appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Deloitte Says No Threat to Sensitive Data After Hacker Claims Server Breach Read More »

Cloud Storage Bucket Security: PII Leak Brings Renewed Focus to Storage Bucket Access Controls

Cloud Storage Bucket Security: PII Leak Brings Renewed Focus to Storage Bucket Access Controls 2024-08-27 at 18:16 By dakshsharma16 Key Takeaways Overview A Google Cloud Storage bucket leak has brought renewed attention to the risk of misconfigured cloud storage buckets, one of the most common cloud security issues and causes of data leaks. Alice’s Table,

React to this headline:

Loading spinner

Cloud Storage Bucket Security: PII Leak Brings Renewed Focus to Storage Bucket Access Controls Read More »

Disney Investigating Hacker Group’s Data Theft Claims

Disney Investigating Hacker Group’s Data Theft Claims 2024-07-16 at 15:02 By Eduard Kovacs Disney has launched an investigation after a hacker group named NullBulge leaked data allegedly stolen from the company. The post Disney Investigating Hacker Group’s Data Theft Claims appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Disney Investigating Hacker Group’s Data Theft Claims Read More »

Major data breaches that have rocked organizations in 2024

Major data breaches that have rocked organizations in 2024 2024-07-16 at 06:31 By Help Net Security This article provides an overview of the major data breaches we covered in 2024 so far, highlighting incidents involving Trello, AnyDesk, France Travail, Nissan, MITRE, Dropbox, BBC Pension Scheme, TeamViewer, Advance Auto Parts, and AT&T. Find out what led

React to this headline:

Loading spinner

Major data breaches that have rocked organizations in 2024 Read More »

Data of Millions of mSpy Customers Leaked Online

Data of Millions of mSpy Customers Leaked Online 2024-07-15 at 17:16 By Ionut Arghire Over 310 GB of data from mSpy, including 2.4 million email addresses and other user data, was leaked online. The post Data of Millions of mSpy Customers Leaked Online appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Data of Millions of mSpy Customers Leaked Online Read More »

Using Authy? Beware of impending phishing attempts

Using Authy? Beware of impending phishing attempts 2024-07-11 at 15:46 By Zeljka Zorz Do you use Authy for your multi-factor authentication needs? If you do, you should keep an eye out for phishing attempts, as well as implement defenses against SIM swapping attacks. What happened? On July 1, Twilio – the company that develops the

React to this headline:

Loading spinner

Using Authy? Beware of impending phishing attempts Read More »

Evolve Bank Data Leaked After LockBit’s ‘Federal Reserve Hack’ 

Evolve Bank Data Leaked After LockBit’s ‘Federal Reserve Hack’  2024-06-27 at 13:56 By Eduard Kovacs The LockBit ransomware group claimed to have hacked the US Federal Reserve, but leaked data from an Arkansas-based bank. The post Evolve Bank Data Leaked After LockBit’s ‘Federal Reserve Hack’  appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Evolve Bank Data Leaked After LockBit’s ‘Federal Reserve Hack’  Read More »

‘Phantom’ Source Code Secrets Haunt Major Organizations

‘Phantom’ Source Code Secrets Haunt Major Organizations 2024-06-27 at 13:01 By Ionut Arghire Aqua Security shows that code in repositories remains accessible even after being deleted or overwritten, continuing to leak secrets. The post ‘Phantom’ Source Code Secrets Haunt Major Organizations appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

‘Phantom’ Source Code Secrets Haunt Major Organizations Read More »

Gitleaks: Open-source solution for detecting secrets in your code

Gitleaks: Open-source solution for detecting secrets in your code 2024-06-27 at 07:37 By Mirko Zorz Gitleaks is an open-source SAST tool designed to detect and prevent hardcoded secrets such as passwords, API keys, and tokens in Git repositories. With more than 15 million Docker downloads, 16,200 GitHub stars, 7 million GitHub downloads, thousands of weekly

React to this headline:

Loading spinner

Gitleaks: Open-source solution for detecting secrets in your code Read More »

BlackBerry Cylance Data Offered for Sale on Dark Web

BlackBerry Cylance Data Offered for Sale on Dark Web 2024-06-11 at 16:01 By Eduard Kovacs BlackBerry says the Cylance data offered for sale for $750,000 is old and its own systems have not been compromised.  The post BlackBerry Cylance Data Offered for Sale on Dark Web appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

BlackBerry Cylance Data Offered for Sale on Dark Web Read More »

New York Times Responds to Source Code Leak

New York Times Responds to Source Code Leak 2024-06-10 at 16:31 By Eduard Kovacs The New York Times has issued a statement after someone leaked source code allegedly belonging to the news giant.  The post New York Times Responds to Source Code Leak appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

New York Times Responds to Source Code Leak Read More »

Dell Says Customer Names, Addresses Stolen in Database Breach

Dell Says Customer Names, Addresses Stolen in Database Breach 2024-05-09 at 20:16 By SecurityWeek News Tech giant notifies millions of customers that full names and physical mailing addresses were stolen during a security incident. The post Dell Says Customer Names, Addresses Stolen in Database Breach appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Dell Says Customer Names, Addresses Stolen in Database Breach Read More »

BlackBasta claims Synlab attack, leaks some stolen documents

BlackBasta claims Synlab attack, leaks some stolen documents 2024-05-06 at 14:16 By Zeljka Zorz The BlackBasta ransomware / cyber extortion gang is behind the recent cyber attack that resulted in the temporary shutdown of operations at Synlab Italia. The group claimed the attack on their leak site on Saturday and says they have exfiltrated approximately

React to this headline:

Loading spinner

BlackBasta claims Synlab attack, leaks some stolen documents Read More »

Understanding next-level cyber threats

Understanding next-level cyber threats 2024-04-17 at 06:31 By Help Net Security In this Help Net Security video, Trevor Hilligoss, VP of SpyCloud Labs, discusses the 2024 SpyCloud Identity Exposure Report, an annual report examining the latest trends in cybercrime and its impact. Researchers recaptured nearly 1.38 billion passwords circulating the darknet in 2023, an 81.5%

React to this headline:

Loading spinner

Understanding next-level cyber threats Read More »

Scroll to Top