The CISA Vulnerability Bulletin has highlighted several new vulnerabilities identified within various software products, primarily focusing on vulnerabilities that pose risks of arbitrary code execution, cross-site scripting, and SQL injection among others. The vulnerabilities are categorized based on their severity. High-profile examples include serious security weaknesses in software from Enrich Technology, Apache Software Foundation, and WordPress plugins.…
Read More
Tag: IMPACT
The Snowflake attack showcases a sophisticated exploitation of refresh tokens and infostealer malware to breach security defenses, leading to mass data compromise. Cybercriminals utilized tools to manipulate token management practices, resulting in unauthorized access across multiple platforms. The incident highlights vulnerabilities within authentication systems and emphasizes the necessity for robust cybersecurity measures.…
Read More
Xloader is a sophisticated malware family that targets various applications to steal sensitive information and deploy additional payloads. With its evolving obfuscation techniques and encryption layers, Xloader complicates detection and analysis efforts. This article provides a detailed examination of the latest versions (6 and 7) of Xloader, focusing on its behavior, persistence mechanisms, and advanced obfuscation methods.…
Read More
Summary: A new uncensored AI chatbot called GhostGPT has emerged, enabling cybercriminals to create malware and execute scams with ease. Unlike mainstream AI tools, it is designed to bypass security measures and provide unrestricted responses, facilitating illegal activities. Its popularity is rising among bad actors due to its functionalities and anonymous operational model.…
Read More
Hunters International is a ransomware strain that operates under a Ransomware-as-a-Service model, focusing on data exfiltration and ransom demands. It shares significant code similarities with the now-dismantled Hive ransomware but is not a direct rebrand. AttackIQ has released an attack graph to help organizations evaluate their defenses against this ransomware.…
Read More
Victim: www.computan.com
Country : CA
Actor: babuk2
Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/dc7ee87eb6a2e25dcd3f3dfd202126715f6160d98647bff01de1092dd89f9e33/
Discovered: 2025-01-27 07:11:02.227031
Published: 2025-01-27 07:09:56.304798
Description :
Sure! Here are some key points about Computan based on the information typically associated with companies in the technology and IT services sector:
Expertise in providing custom software development solutions.…
Read More
Victim: www.industrialdealimentos.com
Country : CO
Actor: babuk2
Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/43109641a8e48eacf077ae756b301acf81e33689c26a6170abf6e17983895bf4/
Discovered: 2025-01-27 07:14:28.540731
Published: 2025-01-27 07:13:21.356763
Description :
Here are some key points about the website www.industrialdealimentos.com:
Specializes in industrial food products and services.
Offers a wide range of food ingredients and solutions for various sectors.
Focuses on quality and innovation in food processing.…
Read More
Summary: UK telecommunications firm TalkTalk has confirmed a data breach involving a third-party supplier, triggered by unauthorized access to sensitive customer information. A threat actor claimed to be selling data of over 18.8 million customers, although TalkTalk disputes this number. Investigations are ongoing, and the company is collaborating with the third-party supplier to address the issue and safeguard customer data.…
Read More
Summary: Cyber Insights 2025 highlights the evolving landscape of cybersecurity regulations, driven by political, technological, and societal factors. The article discusses potential regulatory challenges stemming from artificial intelligence and differing approaches between the US and EU, as well as the implications of conservative politics on compliance.…
Read More
Summary: Natco Home Group faced critical vulnerabilities due to outdated backup systems, which prompted a significant overhaul of their data protection strategy. Transitioning to a modern cloud-first solution not only fortified their data security but also improved business continuity, especially during peak operational periods. This shift is a crucial reminder for organizations to proactively reassess their data protection strategies to stay resilient against evolving cyber threats.…
Read More
Victim: www.hcisystems.net
Country : US
Actor: babuk2
Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/cc5adb91cc4cdf96bb0a1236b37f9a9fffc0dabee01e286e779e5de765c2f33a/
Discovered: 2025-01-27 07:22:03.582036
Published: 2025-01-27 07:20:50.923600
Description :
Here are some key points about HCISystems from the provided website:
HCISystems specializes in healthcare information technology solutions.
The company offers a range of services, including electronic health records (EHR) systems.…
Read More
Victim: www.skywaycoach.ca
Country : CA
Actor: babuk2
Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/21d76746113e42307fe8fe34abb2cf5d6582549feab72e9293c63bedfd78b0ad/
Discovered: 2025-01-27 07:25:27.447091
Published: 2025-01-27 07:24:23.065378
Description :
Here are some key points about Skyway Coach from their website:
Skyway Coach offers charter bus services across Canada and the United States.
The company provides a fleet of modern, comfortable coaches equipped with amenities for passenger convenience.…
Read More
Victim: Alo Center (hq.aloteknik.se)
Country : SE
Actor: lynx
Source: http://lynxblog.net/leaks/67978a0305a779c3d32e2bfa
Discovered: 2025-01-27 14:55:44.232013
Published: 2025-01-27 14:54:38.405314
Description :
ALO started more than 80 years ago as a family-owned business in Sweden.
Passionate about producing machines for sawblades since the beginning.
Committed to originating principles of innovation and manufacturing.…
Read More
Victim: Aquasys
Country : CZ
Actor: dragonforce
Source: http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog/?post_uuid=2638ff55-c088-4975-b8e1-e387c80bdfbc
Discovered: 2025-01-27 14:12:30.364590
Published: 2025-01-27 14:11:23.126449
Description :
Specializes in construction
Focuses on water infrastructure
Expertise in environmental construction
Transport network development
Engineering network construction
About Country: CZ (Czech Republic)
Read More
– Cybersecurity Framework: The Czech Republic has established a comprehensive national cybersecurity strategy, governed by the National Cyber and Information Security Agency (NÚKIB).…
Victim: lhps.org
Country : US
Actor: incransom
Source: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/67977b1f038775d37837fdae
Discovered: 2025-01-27 12:52:50.072423
Published: 2025-01-27 12:51:40.261889
Description :
Founded in 1970
8th largest coeducational independent day school in the nation
Two campuses totaling 42 acres in Orlando
Approximately 1,950 students in grades Pre-K through 12
Rigorous college preparatory program
Accredited by Florida Council of Independent Schools, Southern Association of Colleges and Schools, and Florida Kindergarten Council
About Country: US
Read More
– Cybersecurity Landscape: The US has a robust cybersecurity framework led by agencies such as the Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA).…
Summary: The Open Web Application Security Project (OWASP) has launched the Non-Human Identity (NHI) Top 10 to address crucial security risks associated with machine credentials and workload identities. NHIs encompass various elements such as API keys and service accounts, which have become frequent targets of cyber attacks.…
Read More
Summary: Swedish authorities have seized the cargo ship Vezhen, suspected of damaging a communications cable in the Baltic Sea, prompting a preliminary investigation into sabotage. This event follows heightened scrutiny over subsea infrastructure due to previous incidents, including one involving the ship Eagle S. Various Swedish agencies, including the Security Service, are collaborating on this investigation amid rising tensions regarding maritime activities in the region.…
Read More
Summary: UnitedHealth Group has announced that approximately 190 million individuals were affected by the Change Healthcare data breach following a ransomware attack in February 2024, making it the largest healthcare data breach of the year. Initially estimated at 100 million, the revised figure underscores the extent of the breach.…
Read More
Victim: www.dvttechnologyltd.com
Country : US
Actor: babuk
Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/720acf2ad8b733584750bc37aad17dfbd6accf6634e9ac4ca5348ae0e55f986c/
Discovered: 2025-01-27 07:32:23.071242
Published: 2025-01-27 07:31:17.618408
Description :
www.dvttechnologyltd.com has been previously claimed by ransomhub.
This could suggest a potential new attack.
There may be a cross-claim between brands by the same threat actor.
It indicates the possibility of recycling previously leaked stolen data.…
Read More
Victim: qed.co.ug
Country : UG
Actor: funksec
Source: http://funkxxkovrk7ctnggbjnthdajav4ggex53k6m2x3esjwlxrkb3qiztid.onion/qed.co.ug
Discovered: 2025-01-27 11:36:56.476038
Published: 2025-01-27 11:36:56.476038
Description :
QED Solutions Ltd operates a Ugandan-based recruitment platform: qed.co.ug
Connects employers with potential employees
Offers a range of human resource services
Services include recruitment, consultancy, and training
Covers various sectors: finance, IT, sales, oil and gas
Serves entities seeking small to large workforces
About Uganda (UG) – Cybersecurity Perspective
Read More
– Cybersecurity Framework: Uganda has established a national cybersecurity framework to enhance its capacity to protect its information systems and data.…