Startling revelations have emerged as threat actor “netnsher” claims responsibility for a significant data breach impacting both the law firm banking Trustnota by M&T bank and TTEC, a global leader in customer experience solutions. According to netnsher’s assertions, the breach of Nota’s database has exposed over 600+ rows of access tokens…
Category: Cyber Attack
Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals in the United States. Kaiser Permanente is an American integrated managed care consortium, it is made up of three distinct but interdependent groups of entities: the Kaiser Foundation Health Plan, Inc. (KFHP) and its regional operating subsidiaries; Kaiser…
The HunterInternational ransomware group has recently added Chicony Electronics to its list of victims. Chicony Electronics Co., Ltd. is a Taiwan-based multinational electronics manufacturer. Its product lineup includes input devices, power supplies and digital image products. According to the group’s claim, the total data comprises 2 TB, consisting of 4,715,133 files….
Postman, the tool beloved by developers for testing and building APIs, is unwittingly becoming a treasure trove for hackers. Security firm Truffle Security uncovered a shocking problem: thousands of live API keys, authentication tokens,...
The post Thousands of API Secrets Exposed on Postman – Are Your Credentials At Risk? appeared first on…
Team 1956 has made waves with its claim of accessing confidential data linked to Microsoft, revealing a breach that extends to administrative powers and the extraction of significant databases from the tech giant. With visual evidence accompanying their statement, the group underscores the gravity of their intrusion, highlighting the potential implications…
Recently, it has come to light that a threat actor has made public the sale of a database linked to COPPEL, a well-known department store chain situated in Mexico. COPPEL stands out as a nationwide retail giant and ranks among the top 100 largest companies. With a swift expansion trajectory, it…
The ANONYM∅US group has recently claimed responsibility for a string of Distributed Denial of Service (DDoS) attacks on Saudi websites, citing the country’s perceived support for Israel as the primary motive behind their actions. Operating under the hashtags #op_saudi_arabia and #op_israil, the group has launched targeted assaults on various online platforms,…
Recent forum post have unveiled a concerning development in the realm of cyber threats that is Psoglav Ransomware Partnership. PThe Psoglav Ransomware service operates by encrypting your files and demanding a substantial ransom for their release. Astonishingly, the individuals behind this malware endeavor to establish long-term partnerships, underscoring the seriousness of…
In a concerning development, a threat actor has declared obtaining the source code of a staggering 150 companies, amassing a total volume of archives reaching 853 GB. Unpacked, the data amounts to nearly 2 TB, underscoring the extensive nature of the breach. Among the compromised entities, notable names include Fujitsu –…
In a concerning development, a threat actor has surfaced, claiming to possess a Remote Code Execution (RCE) exploit targeting MongoDB systems. According to the actor’s statement, the exploit remains unidentified and constitutes a zero-day vulnerability within the MongoDB Driver, rendering vulnerable any site running MongoDB versions up to 6.2. The actor…
Recent reports from cybersecurity experts have unveiled the emergence of a new ransomware group dubbed APT73 (Eraleign). Notably, this group has drawn attention due to its similar blog design and tactic to that of Lockbit, raising speculations of potential former Lockbit affiliates being involved. APT73 made headlines by claiming its first…
A concerning development has emerged in the cybersecurity landscape, as a threat actor claims to possess and market a 0-day exploit targeting Windows operating systems. This exploit reportedly enables Local Privilege Escalation (LPE) privileges and is purportedly effective across a range of Windows versions, including Windows 10, Windows 11, and all…
A new hacker collective, BlackRock, has emerged onto the cyber scene, presenting itself as a formidable force of digital mayhem. In a bold proclamation, the group introduces its cadre of experienced hackers and cyber criminals, disassociating itself from any resemblance to the corporate entity of the same name. With a shared…
Hunt3r Kill3rs group has purportedly breached crucial government, military, and security infrastructures within Israel, acquiring significant troves of sensitive data. In a bold declaration, the group asserts its steadfast commitment to perpetrating further assaults against what they perceive as perpetrators of human rights violations and suppressors of freedom. This ominous announcement…
L’Ordre des infirmières et infirmiers du Québec (OIIQ) a été victime d’une cyberattaque au rançongiciel, entraînant la publication en ligne de données personnelles sensibles de ses membres, incluant des informations telles que les coordonnées, numéros d’assurance sociale, et plus. Les cyberpirates ont exigé une rançon de 200 000 $ US pour ne pas divulguer ou supprimer les 112 gigaoctets de données volées. L’OIIQ mène une enquête approfondie pour sécuriser son environnement informatique, tandis que la plus grande organisation syndicale d’infirmières du Québec suit de près la situation, et le gouvernement semble inefficace face à l’augmentation des attaques par rançongiciel