Attacks & Breaches

Nissan source code leaked due to admin: admin credentials

The source code of mobile applications and internal tools of the North American division of Nissan has been leaked to the network. The leak occurred...

Ho.mobile Data Breach – Ho.Mobile Users Data are being Sold on Darknet

In the last days of 2020, rumors about the theft of data from 2.5 million ho.mobile users have raised many concerns, and it seems that the...

Microsoft has identified the ultimate target of hackers hacked into SolarWinds

According to Microsoft experts, the ultimate goal of the hackers who hacked SolarWinds was to gain access to the cloud assets of the victims...

Whirlpool became a victim of Nefilim operators, part of the data was leaked to the Network

The American corporation Whirlpool, one of the largest manufacturers of household appliances in the world, closes 2020 with a not very pleasant incident: the...

EXMO cryptocurrency exchange was hacked. About 5% of all funds were stolen

British cryptocurrency exchange EXMO has reported that unknown hackers have stolen nearly 5% of its assets, compromising hot wallets. According to official EXMO statistics, the daily trading...

Ledger Crypto Data Breach – 270,000 Wallet Owners Data has been leaked

A hacker forum found a database containing email addresses and physical addresses of the owners of Ledger hardware wallets, according to Bleeping Computer . Journalists remind that...

Codes used by national central banks software leaked to the Network

Banking software codes used by national central banks of different countries have been published in open repositories. The leaked code was developed by CMA, a company...

Last.fm developers fix credential leak

Due to incorrect configuration of the Symphony PHP application (which ran in debug mode and "leaked" logs), the Last.fm streaming service had a credential...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

LastPass for Android found seven built-in trackers

German cybersecurity expert Mike Kuketz noticed that there are seven trackers in the LastPass app for Android that monitor users. The researcher...

More than 400 phishing campaigns per week were associated with Valentine’s Day

Check Point experts report that hackers "celebrated" Valentine's Day in a big way. The company's analysts recorded more than 400 phishing campaigns...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

Fortinet has fixed vulnerabilities discovered by Positive Technologies

Fortinet has closed four vulnerabilities in FortiWeb identified by...

Scientists turn a robot vacuum cleaner into a spy device

Household robotic vacuum cleaners can be hacked remotely and...

Why Is It Important To Have Intrusion Detection And Prevention ?

This article describes why detection and prevention of burglaries...