Threat Actor: Unknown | Unknown Victim: Dropbox | Dropbox Price: N/A Exfiltrated Data Type: Email addresses, usernames, phone numbers, hashed passwords, API keys, OAuth tokens, authentication information

Additional Information:

The security breach occurred within Dropbox Sign (formerly HelloSign) service. The breach exposed customer data including email addresses, usernames, phone numbers, and hashed passwords.…
Read More

Threat Actor: Czech Republic’s Office for Personal Data Protection (ÚOOÚ) | ÚOOÚ Victim: Avast | Avast Price: $14.8 million Exfiltrated Data Type: Sensitive personal data, including browsing habits, interests, location, and financial status

Additional Information:

The fine was imposed by the Czech Republic’s Office for Personal Data Protection (ÚOOÚ) on Avast for alleged violations of the European Union’s General Data Protection Regulation (GDPR).…
Read More

Threat Actor: Chinese keyboard apps | Chinese keyboard apps Victim: Users of Baidu, Tencent, iFlytek, Honor, Huawei, OPPO, Vivo, Samsung, Xiaomi | users of Chinese keyboard apps Price: Not specified Exfiltrated Data Type: Keystrokes

Additional Information:

Massive Impact: Up to a billion users could be affected by the security flaws in Chinese keyboard apps from Baidu, Tencent, iFlytek, and popular phone brands used across China (Honor, Huawei, OPPO, Vivo, Samsung, Xiaomi).…
Read More

Threat Actor: Credential Stuffing | Credential Stuffing Victim: Roku | Roku Price: N/A Exfiltrated Data Type: User account information

Additional Information :

Roku experienced a second data breach incident, affecting over 500,000 user accounts. The breach was attributed to credential stuffing, where stolen user credentials from other platforms were used to breach Roku accounts.…
Read More

Fujitsu, the Japanese multinational technology giant, has revealed a data breach resulting from a malware infection within its corporate network. The company disclosed that sensitive files containing both personal and customer information were exposed to the attackers.

Swift Response, Ongoing Investigation

Fujitsu reports that they detected the malware during an internal investigation.…

Read More

Microsoft has confirmed a new, significant intrusion by the persistent Russia-based hacking group Midnight Blizzard (NOBELIUM). The threat actors leveraged information exfiltrated during a January cyberattack to gain recent, unauthorized access to Microsoft’s internal network, including source code repositories.

Microsoft traced the breach back to a January cyberattack where Midnight Blizzard leveraged a common but dangerous method – a password spray attack.…

Read More

Creates, a popular online retailer of hair styling tools, has suffered a significant data breach that exposed credit card details, names, addresses, and possibly even more sensitive personal information belonging to thousands of customers. An investigation revealed that attackers found weaknesses in the company’s old e-commerce platform to steal data during the checkout process.…

Read More

In a worrisome turn of events, messaging app giant Line Yahoo Corporation has revised the scope of its previously reported data breach. A deeper investigation uncovered additional compromises, significantly boosting the number of potentially leaked data points. This incident underscores the far-reaching consequences of a single infection and the challenges of securing interconnected systems.…

Read More

On February 2, 2024, AnyDesk, a popular remote desktop software provider, announced that it had fallen victim to a cyberattack that compromised its production systems. The breach, orchestrated by malicious actors, has far-reaching implications for AnyDesk customers.

The incident came to light when AnyDesk released a public statement about possible security breaches on some of its systems.…

Read More

Ofuji Fishing Tackles, a renowned fishing tackle wholesaler and manufacturer in Japan has recently faced a severe cyber threat. The company disclosed a potential data breach involving personal customer information, a consequence of a ransomware attack targeting their systems. This incident, confirmed on December 13, 2023, has raised concerns about the leakage of customer data, including membership numbers, names, addresses, dates of birth, and phone numbers, affecting approximately 200,000 individuals.…

Read More

Ateam Inc., a developer of content for smartphones, disclosed that 935,779 personal data records stored in their cloud service were accessible over the Internet.

The company stated that they use the cloud service ‘Google Drive’ across their group. However, they discovered permission-setting errors in 1,369 files containing personal information.…

Read More

Panasonic Avionics Corporation (PAC), revealed that they suffered a cyberattack at the end of 2022, which may have led to the leak of personal information related to employees.

According to Panasonic, the internal network systems of PAC were compromised in a cyberattack. The breach was discovered approximately a year ago, on December 30, 2022, and an investigation ensued with external assistance.…

Read More

As the world adorned its festive attire, the cybercriminal community in the shadowy realms of the Dark Web orchestrated their chilling celebration – “Leaksmas.” This event, coinciding with the Christmas season, unfolded as a sinister display of data sharing among hackers, as observed by Resecurity.

The “Free Leaksmas” tag, a twisted token of gratitude, marked the substantial data dumps resulting from breaches and intrusions across a diverse range of companies and government agencies.…

Read More

The ransomware group Akira has declared responsibility for the recent cyberattack on the systems of Nissan in Australia and New Zealand. The hackers claim to have exfiltrated over 100 GB of documents from the automaker.

Now, the malefactors are threatening to release confidential business and client data online, as negotiations with Nissan regarding a ransom have been unsuccessful—either due to the company’s refusal to engage with the hackers or its unwillingness to pay the demanded sum.…

Read More