You should know that most websites share your in-site search queries with third parties

If you are using a website’s internal search function, chances are good that your search terms are being leaked to third parties in some form, researchers with NortonLifeLock have found. They tested 512,701 of the top 1 million sites that had int… Continue reading You should know that most websites share your in-site search queries with third parties

COVID-19 data put for sale on the Dark Web

Resecurity, a California-based cybersecurity company protecting Fortune 500, has identified leaked PII stolen from Thailand’s Department of Medical Sciences containing information about citizens with COVID-19 symptoms. The incident was uncovered and sh… Continue reading COVID-19 data put for sale on the Dark Web

Conti effectively created an extortion-oriented IT company, says Group-IB

In slightly more than a month, the Conti ransomware collective compromised more than 40 companies worldwide, and the fastest attack took only three days, Group-IB’s noted in its latest report detailing the workings of one of the most prolific ransomwar… Continue reading Conti effectively created an extortion-oriented IT company, says Group-IB

Ransomware gang publishes stolen victim data on the public Internet

The Alphv (aka BlackCat) ransomware group is trying out a new tactic to push companies to pay for their post-breach silence: a clearnet (public Internet) website with sensitive data about the employees and customers stolen from a victim organization. A… Continue reading Ransomware gang publishes stolen victim data on the public Internet

The most common exploit paths enterprises leave open for attackers

Exposed version control repositories, leaked secrets in public code repositories, a subdomain vulnerable to takover, exposed Amazon S3 buckets, and Microsoft Exchange Server servers vulnerable to CVE-2021-42321 exploitation are the most common exploit … Continue reading The most common exploit paths enterprises leave open for attackers

Data leaks and shadow assets greatly exposing organizations to cyberattacks

CybelAngel published a research revealing that data leaks and shadow assets are the greatest source of exposure to cyberattacks faced by large organizations across the globe. The report also highlights how the market pressures of 2021 led to an increas… Continue reading Data leaks and shadow assets greatly exposing organizations to cyberattacks

Your supply chain: How and why network security and infrastructure matter

With digital transformation, the rapid adoption of cloud computing and the IoT, and the global scale of today’s supply chains, cybercriminals have more entry points to networks and access to data than ever before. In the past year alone, cyberattacks o… Continue reading Your supply chain: How and why network security and infrastructure matter

Exposing “Moses Staff” Data Leaks Gang – An OSINT Analysis

I’ve recently came across to a currently active data leaks campaign launched by a newly formed hacking and data leaks group and I’ve decided to share with everyone an in-depth technical and relevant OSINT analysis with the idea to assist everyone with … Continue reading Exposing “Moses Staff” Data Leaks Gang – An OSINT Analysis