Blog

Your blog category

Twilio Data Breach: 12,000 Sensitive Call Records Exposed in Major Security Incident

In a significant cyberattack, Twilio, a prominent communication service provider, has suffered a breach leading to the leak of 12,000 sensitive call records. These exposed records include customer conversations, call metadata, timestamps, and other private details, now reportedly circulating on the dark web. This incident underscores the growing threat communication platforms face in today’s digital […]

Twilio Data Breach: 12,000 Sensitive Call Records Exposed in Major Security Incident Read More »

Mastercard completes $2.65 billion acquisition of cybersecurity firm

Mastercard has agreed to acquire the cybersecurity firm Recorded Future for $2.65 billion from Insight Partners. Recorded Future, based in Boston, serves 1,900 clients across 75 countries and generates around $300 million in annual revenue. The acquisition is expected to strengthen Mastercard’s cybersecurity capabilities, building on their existing partnership, which uses AI to help banks

Mastercard completes $2.65 billion acquisition of cybersecurity firm Read More »

Deloitte’s Confidential Internal Communications Exposed

IntelBroker claimed responsibility for leaking Deloitte’s internal communications. The breach occurred in September 2024, due to an exposed Apache Solr server with default login credentials, enabling unauthorized access. The compromised data includes email addresses, internal settings, and intranet communications. IntelBroker is linked to the BreachForums community, a hub for trading stolen data and hacking tools,

Deloitte’s Confidential Internal Communications Exposed Read More »

Data Breach: Star Health Customer Medical Records Exposed

In a shocking privacy breach, customer data, including sensitive medical records from India’s largest health insurer, Star Health, has been made publicly accessible through Telegram chatbots, according to a report by Reuters. This incident follows allegations against Telegram’s founder for enabling criminal activities on the platform. A security researcher informed Reuters about a user, known

Data Breach: Star Health Customer Medical Records Exposed Read More »

When Your Security Tools Turn Into Vulnerabilities

In today’s rapidly evolving threat landscape, the very tools designed to protect your organization may turn into liabilities if not properly managed. Recent incidents have demonstrated that attackers are increasingly exploiting endpoint detection and response (EDR) agents to gain unauthorized access, manipulate systems, and disable defenses. Even worse, some security tools are being hijacked to

When Your Security Tools Turn Into Vulnerabilities Read More »

CrowdStrike Performance Issue Sparks Concerns for Endpoint Security

A recent performance issue with CrowdStrike’s Falcon platform has raised alarms among customers relying on its real-time cybersecurity capabilities. For approximately 13 hours, the disruption affected critical services such as data retrieval and cloud stability. Although CrowdStrike promptly resolved the issue, it has led to concerns about the reliability of essential security solutions. Key Highlights:

CrowdStrike Performance Issue Sparks Concerns for Endpoint Security Read More »

Alert: AppleCare Scam Targeting Mac Users – Stay Protected!

A new scam is making the rounds, preying on Mac users searching for AppleCare+ support. Scammers are buying Google ads that redirect users to fake AppleCare+ websites hosted on GitHub. These counterfeit sites mimic Apple’s branding, tricking visitors into calling a toll-free number where fraudsters attempt to steal financial and personal information. The scam is

Alert: AppleCare Scam Targeting Mac Users – Stay Protected! Read More »

GitHub Malware [Lumma Stealer] Attack

Malware Name: Lumma Stealer is being spread via fake “fixes” posted in comments on GitHub projects. Method of Distribution: Cybercriminals are adding malicious comments in GitHub repositories, offering solutions that lead to downloading malware-packed files. Initial Report: The campaign was first flagged by a contributor to the Teloxide Rust library, who encountered multiple fake comments.

GitHub Malware [Lumma Stealer] Attack Read More »

Cybercriminals Abusing Google Sheets Data Theft by using Voldemort

A newly discovered malware, “Voldemort” (aptly named after the infamous villain), is making headlines with a terrifyingly simple yet effective strategy: it uses Google Sheets to siphon off stolen data. By avoiding the complexity of setting up dedicated servers, hackers are turning Google Sheets into a command-and-control center, slipping past traditional security measures. To make

Cybercriminals Abusing Google Sheets Data Theft by using Voldemort Read More »