Search results for:
breach
Cyber Attack
Cyberattackers Targeting IT Help Desks for Initial Breach
Cybercriminals are increasingly impersonating IT support personnel and trusted authorities to manipulate victims into granting access to critical systems, according to recent analyses by...
Cyber Security News
Hackers Exploit Host Header Injection to Breach Web Applications
Cybersecurity researchers have reported a significant rise in web breaches triggered by a lesser-known technique: Host Header Injection.
This sophisticated attack vector has enabled hackers...
Cyber Security News
LockBit Ransomware Group Breached: Internal Chats and Data Leaked Online
The notorious LockBit ransomware group, once considered one of the world’s most prolific cyber extortion rings, has itself become the victim of a major...
Cyber Security News
Signal App Used by Trump Associate Targeted in Security Breach
A major security scare has erupted in Washington after reports emerged that a Trump associate was using an unofficial version of the secure messaging...
Azure
Commvault Confirms Zero-Day Attack Breached Its Azure Cloud Environment
Commvault, a global leader in data protection and information management, has confirmed that a sophisticated cyberattack involving a zero-day vulnerability breached its Azure cloud...
cyber security
RansomHub Ransomware Deploys Malware to Breach Corporate Networks
The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging SocGholish malware, also known as FakeUpdates, was uncovered targeting corporate...
Cyber Security News
Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords
A hacker collective known as R00TK1T claims to have breached TikTok's user database, allegedly leaking login information for over 900,000 users.
The group, which has...
cyber security
Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations
Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where threat actors are leveraging stolen certificates and private keys to...