Threat Actor: Unknown | unknown Victim: FunFun688.com | FunFun688.com Price: Not disclosed Exfiltrated Data Type: Personal data (names, phone numbers, password hashes)

Key Points :

A data breach at FunFun688.com has compromised the personal data of 130,000 users. The leaked database includes sensitive information such as names, phone numbers, and password hashes.…
Read More

Threat Actor: Unknown | unknown Victim: Trifecta.com | Trifecta.com Price: Not disclosed Exfiltrated Data Type: Sensitive user information

Key Points :

A data breach has compromised the official database of Trifecta.com. The breach has exposed sensitive user information, raising privacy concerns. Affected users are advised to update their credentials and enable two-factor authentication.…
Read More

Threat Actor: Unknown | Postman Data Leak Victim: Various Organizations | Postman Price: Potentially millions in damages Exfiltrated Data Type: API keys, access tokens, refresh tokens, proprietary user data

Key Points :

Over 30,000 publicly accessible Postman workspaces exposed sensitive data. Data leaks could lead to massive data breaches and unauthorized misuse.…
Read More

### #CrushFTPAlert #AccountTakeoverRisk #PasswordResetExploitation

Summary: CrushFTP has issued a critical security advisory regarding a vulnerability (CVE-2024-53552) that could allow attackers to take over user accounts through manipulated password reset links. Users are urged to update to the latest versions immediately to mitigate this risk.

Threat Actor: Cybercriminals | cybercriminals Victim: CrushFTP Users | CrushFTP users

Key Point :

Vulnerability CVE-2024-53552 has a CVSS score of 9.8, indicating high severity.…
Read More

### #HacktivistAlliance #CyberPropaganda #GeopoliticalCyberThreats

Summary: The emergence of the Holy League, a hacktivist group formed from the merger of pro-Russian and pro-Palestinian factions, marks a significant shift in cyber warfare targeting Western nations. Their coordinated attacks and sophisticated propaganda highlight their intent to disrupt political and economic systems globally.…

Read More

### #WPLMSVulnerabilities #WordPressPlugins #OnlineCourseSecurity

Summary: Security researchers have identified critical vulnerabilities in the WPLMS and VibeBP plugins for WordPress, which could lead to unauthorized access and data breaches. These vulnerabilities have now been patched, but users are urged to update their systems immediately.

Threat Actor: Unknown | unknown Victim: WPLMS and VibeBP Users | WPLMS and VibeBP Users

Key Point :

Critical vulnerabilities included arbitrary file uploads, privilege escalation, and SQL injection.…
Read More

### #WebminSecurity #CommandInjection #ServerCompromise

Summary: A critical command injection vulnerability (CVE-2024-12828) in the widely used web-based system administration tool Webmin could allow attackers to gain control of servers, affecting an estimated one million installations globally. The flaw, which has a CVSS score of 9.9, allows even less-privileged users to escalate their privileges and execute arbitrary code.…

Read More

### #WindowsVulnerability #PrivilegeEscalation #CloudFilesExploit

Summary: A critical vulnerability (CVE-2024-30085) in the Windows Cloud Files Mini Filter Driver allows local attackers to escalate privileges to SYSTEM level, posing a significant security risk. The flaw stems from improper validation of user-supplied data, enabling potential exploitation.

Threat Actor: Local Attackers | Local Attackers Victim: Windows 11 Users | Windows 11 Users

Key Point :

Vulnerability rated with a CVSS score of 7.8, indicating a high severity level.…
Read More

### #HailCockBotnet #IoTSecurity #LegacyDeviceRisks

Summary: The Hail Cock botnet, a variant of Mirai, is actively exploiting vulnerabilities in outdated devices like the DigiEver DS-2105 Pro DVR, highlighting the risks associated with unsupported hardware. This botnet employs advanced encryption techniques to evade detection and maintain persistence.

Threat Actor: Hail Cock botnet | Hail Cock botnet Victim: DigiEver DS-2105 Pro DVR | DigiEver DS-2105 Pro DVR

Key Point :

The Hail Cock botnet exploits a remote code execution vulnerability in the DigiEver DS-2105 Pro DVR through the /cgi-bin/cgi_main.cgi…
Read More

Threat Actor: Unknown | WilsonSD.org Victim: Wilson School District | WilsonSD.org Price: Not disclosed Exfiltrated Data Type: Social Security Numbers, Email Addresses

Key Points :

1,765 data rows compromised, including 1,340 Social Security Numbers. 28 email addresses were also exposed in the breach. The incident raises significant concerns about data privacy and security.…
Read More

### #FlagstarBank #SECSettlement #DataBreachConsequences

Summary: Flagstar Bank has been fined $3.5 million by the SEC for making misleading statements regarding a cyberattack in 2021 that compromised the personal information of 1.5 million customers. The bank’s failure to disclose the full impact of the breach led to allegations of negligence in its communications.…

Read More