Threat Actor: Unknown | unknown Victim: Ex-Times.com | Ex-Times.com Price: Not disclosed Exfiltrated Data Type: Personal and sensitive information

Key Points :

The breach raises significant privacy and security concerns. Ex-Times.com is a platform that may have stored sensitive user data. The exact details of the breach and the data compromised are still under investigation.…
Read More

### #DataExposure #APIFlaws #AccessControlIssues

Summary: Recently discovered vulnerabilities in Dynamics 365 and Power Apps Web API could lead to significant data exposure, including sensitive information such as password hashes and email addresses. These flaws, identified by Stratus Security, have been patched as of May 2024, but highlight the ongoing risks in API security.…

Read More

Threat Actor: Cybercriminals | Cybercriminals Victim: Rhode Island Health Benefits System | Rhode Island Health Benefits System Price: Not disclosed Exfiltrated Data Type: Health benefits data

Key Points :

Data stolen from Rhode Island’s health benefits system has been leaked on the dark web. Governor Daniel McKee confirmed the state is informing impacted individuals.…
Read More

### #ChromeExtensions #OAuthExploitation #PhishingAttack

Summary: A sophisticated phishing campaign has compromised at least 35 Chrome browser extensions, injecting data-stealing code aimed at harvesting Facebook user information. The attack exploited OAuth authorization flows, tricking developers into granting malicious permissions.

Threat Actor: Unknown | unknown Victim: Chrome extension developers | chrome extension developers

Key Point :

The phishing emails mimicked Google communications, falsely claiming policy violations to lure developers.…
Read More

### #HealthDataSecurity #HIPAAUpdates #CyberResilience

Summary: The U.S. Department of Health and Human Services is proposing significant updates to HIPAA to enhance the security of patient health data in response to increasing cyberattacks and data breaches in the healthcare sector. These updates aim to enforce stricter cybersecurity measures for healthcare organizations to protect sensitive information.…

Read More

### #ExtensionExploitation #DataTheft #BrowserSecurityAwareness

Summary: A recent attack campaign has compromised over 25 browser extensions, affecting more than two million users, by injecting malicious code to steal credentials. Organizations are urged to assess their risk exposure and take protective measures against such threats.

Threat Actor: Unknown | unknown Victim: Users of compromised extensions | users of compromised extensions

Key Point :

Browser extensions are increasingly targeted due to extensive access permissions that can lead to severe data exposure.…
Read More

### #DigitalDefense #ThreatIntelligence #CyberAwareness

Summary: This week’s cybersecurity update highlights significant threats and vulnerabilities impacting various sectors, emphasizing the need for vigilance and proactive measures to safeguard digital environments. Key developments include high-severity flaws, emerging malware, and notable cybercrime incidents involving threat actors.

Threat Actor: TraderTraitor | TraderTraitor Victim: DMM Bitcoin | DMM Bitcoin

Key Point :

High-severity PAN-OS flaw could lead to denial-of-service attacks on vulnerable devices.…
Read More

### #AIOffense #LLMInnovation #CyberChallenge

Summary: A recent study reveals that large language models (LLMs) have achieved a groundbreaking 95% success rate in offensive cybersecurity tasks, significantly outperforming previous benchmarks. This research highlights the potential of LLMs to transform cybersecurity strategies while raising concerns about their implications in real-world scenarios.…

Read More

### #APT-C-26 #LazarusGroup #FinancialCyberThreats

Summary: The Lazarus group has launched a new campaign targeting financial institutions and cryptocurrency exchanges by weaponizing the IPMsg installer to deliver backdoors and steal sensitive information. This sophisticated attack showcases their advanced social engineering tactics and evasion techniques.

Threat Actor: APT-C-26 (Lazarus) | Lazarus Victim: Financial Institutions and Cryptocurrency Exchanges | financial institutions and cryptocurrency exchanges

Key Point :

The attack begins with a weaponized version of the IPMsg installer, which deploys both a legitimate installer and a malicious DLL file.…
Read More

### #APTThreats #GovernmentCybersecurity #SupplyChainExploitation

Summary: The U.S. Department of the Treasury has reported a significant cybersecurity breach involving unauthorized access to sensitive information through a third-party software vulnerability. This incident, linked to a state-sponsored threat actor from China, highlights critical concerns regarding the security of government systems.…

Read More

Threat Actor: Unknown | OneTigris Victim: OneTigris | OneTigris Price: Not disclosed Exfiltrated Data Type: Customer data, payment information

Key Points :

OneTigris experienced a significant data breach affecting their e-commerce platform. The breach raised concerns regarding the security measures in place for online transactions. Exfiltrated data included sensitive customer information and payment details.…
Read More

Threat Actor: Unknown | KBanknow.com Victim: KBanknow.com Users | KBanknow.com Price: Not disclosed Exfiltrated Data Type: Sensitive financial information, including bank loan details

Key Points :

A data breach has compromised sensitive information from KBanknow.com, a major financial platform in South Korea. The exposed data includes details related to bank loans, raising concerns about financial security.…
Read More

Threat Actor: Unknown | unknown Victim: Kaizen Pharmaceuticals | Kaizen Pharmaceuticals Price: Not disclosed Exfiltrated Data Type: Sensitive customer and corporate information

Key Points :

A reported data breach has exposed the CRM database of Kaizen Pharmaceuticals. The leaked data includes sensitive information, raising concerns about data security in the healthcare sector.…
Read More