Streaming giant Roku has publicly acknowledged a second data breach incident impacting approximately 576,000 user accounts. This follows an initial breach in March 2024, compromising approximately 15,000 accounts. Credential Stuffing Remains the Prime Suspect...
The post Roku Experiences Second Data Breach Incident Affecting Over Half a Million Accounts appeared first on Penetration…
Category: Cyber Attack
A threat actor claimed the hack of the Canadian retail chain Giant Tiger and leaked 2.8 million records on a hacker forum. A threat actor, who goes online with the moniker ShopifyGUY, claimed responsibility for hacking the Canadian retail chain Giant Tiger and leaked 2.8 million records on a hacker forum. Giant Tiger is…
A concerning selling has emerged offering unauthorized access to Snapchat OKTA Portal. This crucial platform utilized by employees to manage various SNAP features, including Spotlight. Allegedly, with their successful infiltration, they’ve gained unfettered access to the Okta system, the associated corporate email, and the two-step authentication process (currently employing Duo Mobile…
Le 10 avril 2024, NorthBay Health a annoncé avoir été cible d’une cyberattaque, entraînant la mise hors ligne de certains de ses systèmes informatiques pour investigation, avec une attention particulière sur la possibilité d’un accès non autorisé aux informations confidentielles des patients. Bien qu’il soit encore trop tôt pour confirmer une fuite de données, l’entreprise, qui est un prestataire de services de santé basé en Californie et fondé en 1960, pourrait être obligée d’envoyer des lettres de notification de violation de données aux individus affectés si une fuite est confirmée. NorthBay Health collabore avec des experts en cybersécurité pour résoudre l’incident et a repris certaines activités, telles que les rendez-vous de soins
In a concerning development, a threat actor has surfaced, asserting the availability of unauthorized access to the RDP of a prominent Chinese Electronics Company, boasting a revenue of $1.8 Billion. This access facilitates entry into Windows systems through a RDP, providing authorization of the domain admin system. Furthermore, the threat actor…
A threat actor alleging to of a serious security vulnerability on Android and iOS devices, posing a serious threat to user privacy and security. This exploit enables Remote Code Execution (RCE), granting attackers control over targeted devices. The threat actor hasn’t provided any proof of concept or evidence regarding the Zero-click…
La société Iddink Learning Materials, basée à Ede et spécialisée dans la distribution de livres et de matériel pédagogique, a été victime d’une cyberattaque jeudi, avec une possible fuite ou consultation de données personnelles, incluant noms, adresses e-mail et informations bancaires de clients tels que des écoles et des élèves. L’attaque a été découverte le même jour, et une enquête est en cours pour déterminer l’étendue des dommages, tandis que les systèmes affectés ont été immédiatement isolés et les autorités compétentes alertées. Le groupe responsable de l’attaque s’identifierait sous le nom de Cactus, mais aucun contact n’a été établi avec eux.
A threat actor has emerged, claiming to offer unauthorized access to the Shell admin of Spanish Shopping Websites. The threat actor alleges that the first website processes monthly transactions of 3800 credit cards, while the second website processes transactions with 720 credit cards. They claim to have had access to your…
A threat actor alleging to of a serious security vulnerability on the popular messaging platform Telegram. This vulnerability, which affects Telegram’s desktop versions, enables remote code execution (RCE) attacks. The attacker claims that with the Zero-click attack, they can take over the entire device. The buyer will get exclusive rights on…
In a concerning turn of events, a threat actor has allegedly sale of a one-day vulnerability tailored explicitly for a Windows 1-day Local Privilege Escalation (LPE) exploit. The actor has claimed that it works on Windows 10-11 and all versions of Windows Server. In addition, the actor claims that the sale…
Roku announced that 576,000 accounts were compromised in a new wave of credential stuffing attacks. Roku announced that 576,000 accounts were hacked in new credential stuffing attacks, threat actors used credentials stolen from third-party platforms. “Credential stuffing is a type of attack in which hackers use automation and lists of compromised usernames…
A threat actor has claimed responsibility for a data breach targeting the Intelligence and Communication Center of Hidalgo, allegedly exposing confidential files related to investigations, vehicle inquiries, and more. The actor points fingers at Seguritech, citing lax cybersecurity measures. The compromised data includes sensitive user information obtained from vulnerable API systems,…
A significant security flaw has been unearthed within Palo Alto Networks’ PAN-OS software, specifically targeting the GlobalProtect feature. Designated as CVE-2024-3400, this vulnerability poses a grave risk to the integrity and security of affected systems, potentially allowing malicious actors to execute arbitrary code with root privileges on vulnerable firewalls. Vulnerability Overview…
Un incident de sécurité important survenu dans le Centre de Fertilité de Bielefeld le 4 avril 2024. Le système informatique a été la cible d’une attaque avec ransomware ce jour-là. Il n’est pas possible de confirmer avec certitude si des données de patients ont été affectées, mais les experts en forensique estiment qu’il n’y a pas eu de fuite de données.
A threat actor is allegedly selling data from the Thai Public Security Internal Network Operator System. The actor claims to have access to 5000 million pieces of data from Thai public security internal network operators, encompassing all operators in Thailand. Additionally, the threat actor is offering two other types of data:…