Generative Data Intelligence

Tag: Security Affairs

Burger King Serves Up Sensitive Data, No Mayo

A misconfiguration in the site for Burger King France has exposed sensitive data that could have been used to launch a whopper of a...

Top News

OneCoin Ponzi Scheme Accused of Terrorist Financing

Billionaire Crypto Criminal Ruja Ignatova Under Protection of State Sponsor of Terrorism London: A previously unreleased document made available to Plaintiff’s counsel Dr. Jonathan Levy in the lawsuit CCRT v. OneCoin shows that “Cryptoqueen” Ruja Ignatova may be under the protection of a powerful state sponsor of terror in the Middle East. The document authored by the Kuwaiti Ministry of Interior was delivered to the Dubai Chief of Police by special courier in 2015.  The document warned that Ruja Ignatova’s OneCoin was a front for terrorism financing.  The report authored by Assistant Undersecretary for Criminal Security Affairs Major General Abdul Hamid Abdul Rahim Al-Awadi stated: Ruja

Security Affairs newsletter Round 263

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs Please give me your vote...

North Korea-linked Lazarus APT uses a Mac variant of the Dacls RAT

North Korea-linked Lazarus APT group employed a Mac variant of the Dacls Remote Access Trojan (RAT) in recent attacks. North Korea-linked Lazarus APT...

3.68 Million MobiFriends User details leaked online

The personal details of 3.68 million MobiFriends users are available for download since April 2020, it seems that they have been stolen in...

Sodinokibi gang hacked law firm of the celebrities and threatens to release the docs

The Sodinokibi ransomware gang stolen gigabytes of legal documents from the law firm of the stars, Grubman Shire Meiselas & Sacks (GSMLaw). ...

SilverTerrier gang uses COVID-19 lures in BEC attacks against healthcare, government organizations

Nigerian cyber gang SilverTerrier, specialized in BEC attacks, used COVID-19 lures in recent attacks on healthcare and government organizations. Researchers at Palo Alto...

Poulight Stealer, a new Comprehensive Stealer from Russia

Researchers from Cybaze-Yoroi ZLab monitored the evolution and the diffusion of an infostealer dubbed Poulight that most likely has a Russian origin. Introduction...

Microsoft spotted multiple malspam campaigns using malware-laced ISO and IMG files

Microsoft warns of threat actors targeting organizations with malware-laced ISO and IMG files aimed at delivering a remote access trojan. Microsoft advanced machine...

DHS CISA alert provides recommendations on securing Office 365 installs

The US DHS CISA agency issued a new alert that includes recommendations on how organizations should properly secure Microsoft Office 365 installs. The...

Hackers are scanning the internet for vulnerable Salt installs, Ghost blogging platform hacked

Hackers are conducting a mass-scanning the Internet for vulnerable Salt installs that could allow them to hack the organizations, the last victim is the...

TrickBot operators exploit COVID-19 as lures

IBM X-Force researchers spotted a new COVID-19-themed campaign spreading the infamous TrickBot trojan through fake messages. IBM X-Force researchers uncovered a new COVID-19-themed...

Hackers are targeting recently patched WebLogic security vulnerability

Oracle warns of attacks in the wild exploiting a recently patched vulnerability in WebLogic servers for which a PoC code is available on...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?