Date Reported: 2024-11-13 Country: USA Victim: Youth Eastside Services | Youth Eastside Services Website: youtheastsideservices.org Additional Information :

The non-profit organization Youth Eastside Services experienced a cyberattack in November 2024. An unauthorized third party accessed their computer system and viewed sensitive consumer information. Compromised data included names, birth dates, addresses, demographic information, medical information, and insurance details.…
Read More

Date Reported: 2024-12-22 Country: JPN | Japan Victim: Nikki-Universal | Nikki-Universal Website: n-u.co.jp Additional Information :

Nikki-Universal, a chemical manufacturer, suffered a sophisticated ransomware attack. Hackers stole 761.8 GB of data during the breach. The ransomware group Hunters International claimed responsibility for the attack. Hunters International is known for its aggressive tactics in cybercrime.…
Read More

Summary: FireScam is an Android malware disguised as a premium Telegram app that steals sensitive data and maintains remote control over infected devices through a sophisticated multi-stage infection process.

Threat Actor: Unknown | FireScam Victim: Android Users | Telegram

Key Point :

FireScam is distributed via a phishing site that mimics the RuStore app store, delivering a dropper APK that installs the main malware payload.…
Read More

Summary: Recent developments in cybersecurity reveal significant vulnerabilities in trusted software like browser extensions and voice assistants, exposing sensitive user data to malicious actors. This week’s focus highlights the ongoing risks associated with digital convenience and the importance of vigilance in online activities.

Threat Actor: Flax Typhoon (Chinese state-sponsored) | Flax Typhoon Victim: Cyberhaven | Cyberhaven

Key Point :

Dozens of Google Chrome extensions were found stealing sensitive data from 2.6 million devices.…
Read More

Summary: Cybersecurity researchers have identified malicious npm packages impersonating the Nomic Foundation’s Hardhat tool, designed to steal sensitive data from developers. These packages exploit trust in open source plugins to exfiltrate critical information such as private keys and mnemonics.

Threat Actor: _lain | _lain Victim: Developers using npm packages | developers using npm packages

Key Point :

Malicious npm packages impersonating legitimate tools have been found, with one package attracting over 1,000 downloads.…
Read More

Summary: A phishing campaign has emerged where hackers impersonate the United States Social Security Administration (SSA) to distribute the ConnectWise Remote Access Tool (RAT), compromising victims’ devices and stealing sensitive information. This campaign, which began in September 2024, utilizes sophisticated brand impersonation and evasion techniques to deceive users into downloading malware.…
Read More

Summary: Researchers at Socket have identified malicious campaigns that exploit Out-of-Band Application Security Testing (OAST) techniques, traditionally used for ethical hacking, to exfiltrate sensitive data and establish command-and-control channels. This misuse of OAST tools poses significant risks to developers and organizations by leveraging trusted package ecosystems like npm, PyPI, and RubyGems.…
Read More

Summary: ESET warns Windows 10 users to upgrade to Windows 11 or Linux before support ends in October 2025 to avoid significant security risks. The firm highlights that millions of users remain vulnerable to cyber threats due to the outdated operating system.

Threat Actor: Cyber Criminals | cyber criminals Victim: Windows 10 Users | Windows 10 users

Key Point :

ESET emphasizes the urgency for users to upgrade to Windows 11 or switch to Linux to mitigate security risks.…
Read More

Threat Actor: Unknown | Lelivrescolaire.fr Victim: Lelivrescolaire.fr | Lelivrescolaire.fr Price: Not disclosed Exfiltrated Data Type: User account details, student and educator data

Key Points :

The breach exposes sensitive user information, raising privacy concerns. Potential risks include identity theft and phishing attacks. Highlights the need for improved cybersecurity measures in educational platforms.…
Read More

Threat Actor: Unknown | unknown Victim: Argentina | Argentina Price: Not disclosed Exfiltrated Data Type: Personal information

Key Points :

43 million records exposed, marking one of the largest data leaks in Argentina’s history. Compromised data includes names, identification numbers, and contact details. Risks include identity theft, financial fraud, and misuse of personal data.…
Read More