Keypoints :
Attackers exploit user trust by using platforms like YouTube to share fake installer links.…Tag: PASSWORD
Key Points :
Threat actor: Klammer from “Deathnote Hackers International” (DNH) Systems compromised: Electronic Document Filing System (EDFS) and Military Integrated Information System (MIIS) Exploited vulnerabilities: Predictable credentials and insufficient rate limiting Critical weakness: Outdated password for a jet fighter pilot, unchanged for over a year Number of files exposed: 53,000 sensitive files, including classified documents from 1977 to 2025 Potential risk: Vulnerabilities could be exploited by foreign entities, particularly Chinese hackers Recommendations: Mandatory password changes every six months, implementation of two-factor authentication (2FA), and stronger app usage policies Deep Web Konek has notified the Philippine Air Force about the breach; no official response yetOriginal Source: https://kukublanph.data.blog/2025/01/10/philippine-air-force-systems-compromised-hackers-warn-of-critical-security-flaws/…
Keypoints :
HexaLocker was first discovered in mid-2024, with version 2 introducing significant updates.…“`html
Check Point Research has identified a new version of the Banshee macOS stealer malware, which has been evading detection since September 2024. The malware targets macOS users, stealing sensitive information and utilizing an encryption algorithm similar to Apple’s XProtect. Despite the shutdown of its original operations after a code leak, Banshee continues to be distributed through phishing websites and malicious GitHub repositories.…Key Points :
A massive data breach has exposed approximately 296,896,878 URL login credentials and passwords. The leaked database contains sensitive user information, raising significant online security and privacy concerns.…Threat Actor: (authenticated attacker, unauthenticated attacker) | threat actor Victim: (Palo Alto Networks, SonicWall, Aviatrix) | Palo Alto Networks, SonicWall, Aviatrix
Key Point :
Palo Alto Networks addressed multiple vulnerabilities in its Expedition tool, including SQL injection and XSS flaws.…You will find more than 100 GB of private corporate doc uments including: SSNs, driver licenses, passports, con tact numbers and e-mail addresses of employees, family information, medical insurance documents etc.,…
You will find more than 100 GB of private corporate doc uments including: SSNs, driver licenses, passports, con tact numbers and e-mail addresses of employees, family information, medical insurance documents etc.,…
Threat Actor: N/A | N/A Victim: N/A | N/A
Key Point :
1Password’s acquisition of Trelica strengthens its offerings in access management and security.…Threat Actor: Unknown | unknown Victim: Linux Systems | Linux Systems
Key Point :
The vulnerability affects OpenSSH versions 8.5p1 through 9.8p1 on glibc-based Linux systems.…Keypoints :
Black Basta utilizes phishing emails to create a smokescreen for attacks.…Keypoints :
redtail is a cryptocurrency mining malware that stealthily installs itself on compromised systems.…Gmail For Exfiltration: Malicious npm Packages Target Solana Private Keys and Drain Victims’ Wallets
Threat Actor: Unknown | unknown Victim: Green Bay Packers | Green Bay Packers
Key Point :
Malicious code allowed unauthorized access to customer payment information during checkout.…Threat Actor: Muddling Meerkat | Muddling Meerkat Victim: Various sectors including legal, government, and construction | Various sectors
Key Point :
Threat actors are using old, neglected domains to spoof sender addresses and evade security checks.…Threat Actor: Initial Access Brokers (IABs) | Initial Access Brokers Victim: Various organizations | Amazon Web Services, Geico, ADT
Key Point :
IABs operate like legitimate businesses, offering tiered pricing and customer support for stolen access.…