Google warned today that hackers using Scattered Spider tactics against retail chains in the United Kingdom have also started targeting retailers in the United States. […] Go to Source Author: Sergiu Gatlan
Category Archives: Security
Ransomware gangs have joined ongoing SAP NetWeaver attacks, exploiting a maximum-severity vulnerability that allows threat actors to gain remote code execution on vulnerable servers. […] Go to Source Author: Sergiu Gatlan
The Australian Human Rights Commission (AHRC) disclosed a data breach incident where private documents leaked online and were indexed by major search engines. […] Go to Source Author: Bill Toulas
A cybersecurity incident on Nucor Corporation’s systems forced the company to take offline parts of its networks and implement containment measures. […] Go to Source Author: Bill Toulas
New phishing tactics are abusing trusted domains, real CAPTCHAs, and server-side email validation to selectively target victims with customized fake login pages. Keep Aware’s latest research breaks down the full attack chain and how these zero-day phish operate. […] Go to Source Author: Sponsored by Keep Aware
House of Dior, the French luxury fashion brand commonly referred to as Dior, has disclosed a cybersecurity incident that has exposed customer information. […] Go to Source Author: Bill Toulas
A Kosovo national has been extradited to the United States to face charges of running an online cybercrime marketplace active since 2018. […] Go to Source Author: Sergiu Gatlan
SAP has released patches to address a second vulnerability exploited in recent attacks targeting SAP NetWeaver servers as a zero-day. […] Go to Source Author: Sergiu Gatlan
The state-backed North Korean threat group Konni (Opal Sleet, TA406) was observed targeting Ukrainian government entities in intelligence collection operations. […] Go to Source Author: Bill Toulas
Twilio has denied in a statement for BleepingComputer that it was breached after a threat actor claimed to be holding over 89 million Steam user records with one-time access codes. […] Go to Source Author: Bill Toulas
