Threat Actor: Unknown | Revolution Beauty Victim: Revolution Beauty | Revolution Beauty Price: Not disclosed Exfiltrated Data Type: Personal customer information

Key Points :

Approximately 8,000 records were exposed in the breach. Leaked data includes names, email addresses, phone numbers, and order-related information. Affected users are at risk of phishing attacks, identity theft, and unauthorized account access.…
Read More

Summary: A new Android malware named FireScam has been identified as an information stealer and spyware, capable of harvesting sensitive information from various applications. It is distributed through a phishing website disguised as the legitimate ‘Telegram Premium’ application, targeting devices running Android 8 and newer.

Threat Actor: Unknown | FireScam Victim: Android Users | Android Users

Key Point :

FireScam is distributed via a phishing website that mimics the RuStore application store.…
Read More

### #LDAPExploitation #DoSVulnerability #RemoteCodeExecution

Summary: A proof-of-concept exploit for a critical Windows LDAP vulnerability (CVE-2024-49113) has been released, enabling denial-of-service attacks and potential remote code execution. The flaw was patched by Microsoft in December 2024, but unpatched systems remain at risk.

Threat Actor: Independent Security Researcher | Yuki Chen Victim: Windows Server Users | Windows Server

Key Point :

Vulnerability CVE-2024-49113 has a CVSS score of 7.5 and can crash unpatched Windows Servers.…
Read More

LegionLoader is a sophisticated downloader malware that has evolved since its emergence in 2019. It delivers malicious Chrome extensions capable of altering user data and monitoring activities, while also employing advanced techniques for evasion and payload delivery. The malware’s recent adaptations include the use of DLL side-loading and encrypted communication with command and control servers.…
Read More

Threat Actor: Unknown | unknown Victim: CIRCA Jewelry and Watch Platform | CIRCA Jewelry and Watch Platform Price: Not disclosed Exfiltrated Data Type: Personal identification details, KYC documents

Key Points :

145,000 users affected by the data breach. 11,000 Know Your Customer (KYC) documents compromised. Significant vulnerabilities in the platform’s data security measures.…
Read More

### #RIBridgesBreach #BrainCipherGang #DataLeakAlert

Summary: The Brain Cipher ransomware group has begun leaking sensitive documents stolen from Rhode Island’s RIBridges social services platform, affecting approximately 650,000 individuals. This breach exposes personal information, including names, addresses, and Social Security numbers, raising significant concerns for the impacted residents.…

Read More

Threat Actor: Unknown | Unknown Victim: Farline.net | Farline.net Price: Not disclosed Exfiltrated Data Type: Sensitive user information

Key Points :

Data breach reported involving Farline.net, a multiservice network in Simferopol, Russia. Exposed data raises serious privacy and data security concerns in the telecommunications sector. Risks include identity theft, unauthorized access, and misuse of personal data.…
Read More

Threat Actor: Unknown | unknown Victim: Ex-Times.com | Ex-Times.com Price: Not disclosed Exfiltrated Data Type: Personal and sensitive information

Key Points :

The breach raises significant privacy and security concerns. Ex-Times.com is a platform that may have stored sensitive user data. The exact details of the breach and the data compromised are still under investigation.…
Read More

The Digital Operational Resilience Act (DORA) is a crucial regulation set to take effect in 2025, aimed at enhancing operational resilience across the EU financial sector. It imposes significant penalties for non-compliance, emphasizing the need for organizations to proactively manage digital risks and third-party relationships. #DORA #OperationalResilience #Cybersecurity

Keypoints :

DORA will be enforced starting January 2025, targeting organizations with a daily turnover exceeding €50 million.…
Read More

CloudSEK’s XVigil is a transformative digital risk protection platform that enhances cybersecurity by providing comprehensive threat monitoring and actionable insights. Its capabilities have proven essential for organizations like Reddoorz in identifying and mitigating cyber threats effectively. #Cybersecurity #DigitalRiskProtection #XVigil

Keypoints :

CloudSEK’s XVigil enhances cybersecurity by monitoring digital ecosystems.…
Read More

### #CrossDomainDefense #IdentityExploitation #UnifiedSecurityApproach

Summary: Cross-domain attacks are increasingly being utilized by adversaries to exploit vulnerabilities across interconnected environments, emphasizing the critical need for a unified approach to identity security. Organizations must move beyond fragmented solutions to effectively defend against these sophisticated threats.

Threat Actor: SCATTERED SPIDER, FAMOUS CHOLLIMA | SCATTERED SPIDER, FAMOUS CHOLLIMA Victim: Various Organizations | Various Organizations

Key Point :

Adversaries leverage compromised credentials to infiltrate organizations, moving laterally and evading detection.…
Read More

Gamaredon APT is a Russian cyber espionage group known for targeting Ukrainian government and military sectors since 2013. They utilize advanced tactics, including spear-phishing and malware, to achieve their objectives, particularly during geopolitical crises. #GamaredonAPT #CyberEspionage #ThreatIntelligence

Keypoints :

Gamaredon APT, also known as Primitive Bear, has been active since 2013.…
Read More

Threat Actor: Cybercriminals | Cybercriminals Victim: Rhode Island Health Benefits System | Rhode Island Health Benefits System Price: Not disclosed Exfiltrated Data Type: Health benefits data

Key Points :

Data stolen from Rhode Island’s health benefits system has been leaked on the dark web. Governor Daniel McKee confirmed the state is informing impacted individuals.…
Read More