Cyber Attack
Panda Restaurant Corporate Systems Hacked: Customer Data Exposed
Panda Restaurant Group, Inc., a leading name in the fast-food industry, has confirmed a significant breach in its corporate data systems.The incident, which...
Cloud
Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy
Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running. Containers are isolated software packages that are lightweight...
Cyber Attack
Kaiser Permanente Says 13.4 Million Users Impacted in Data Leak
Kaiser Permanente, one of the largest healthcare providers in the United States, was the victim of a cyber attack that compromised the personal information...
Botnet
Chinese Botnet As-A-Service Bypasses Cloudflare & Other DDoS Protection Services
A large botnet-as-a-service network originating from China was discovered, which comprises numerous domains, over 20 active Telegram groups, and utilizes other domestic communication channels. The...
Cyber Attack
Okta Warns of Credential Stuffing Attacks Using Proxy Services
Okta has issued a warning about the increasing prevalence of credential-stuffing attacks.These attacks, which leverage stolen user credentials to gain unauthorized access to...
Cyber Attack
Fileless .NET Based Code Injection Attack Delivers AgentTesla Malware
A recent malware campaign used a VBA macro in a Word document to download and execute a 64-bit Rust binary. This binary employs fileless...
CVE/vulnerability
5000+ CrushFTP Servers Hacked Using Zero-Day Exploit
Hackers often target CrushFTP servers as they contain sensitive data and are used for file sharing and storage.This makes them attractive targets for...
Cyber Attack
13,142,840 DDoS Attacks Targeted Organization Around The Globe
DDoS attacks are a significant and growing risk that can overpower websites, crash servers, and block out authorized users with never-ending waves of offensive...