Attacks & Breaches

Codes used by national central banks software leaked to the Network

Banking software codes used by national central banks of different countries have been published in open repositories. The leaked code was developed by CMA, a company...

Last.fm developers fix credential leak

Due to incorrect configuration of the Symphony PHP application (which ran in debug mode and "leaked" logs), the Last.fm streaming service had a credential...

Spotify accounts hacked

According to vpnMentor’s research team, a possible credential stuffing operation whose origins are unknown, could have affected over 300k Spotify accounts Criminal Hackers have been attempting...

Old school cool: Windows XP source code leaked

Windows XP, Microsoft old school operating system, has had its source code leaked online - even tho it's not 100% confirmed - along with...

DDoS attacks are back with a vengeance

The current Pandemic of Covid-19 has no doubt given a massive boost to all sort of criminal activity, with phishing and ransomware on the...

Why Companies Should Care More About Credential Breach?

Phishing attacks and stolen credentials are becoming more common in the world of data security, and employee errors are helping to pave the way,...

Elasticsearch Data Breach – Genealogy Software Maker Exposes Data on 60,000 Users

A US tech company that manages popular family tree software has exposed tens of thousands of its users’ personal information online via a misconfigured...

Latest news

Advertising of ransomware was banned on the XSS hacker forum

The administration of the popular hacker forum XSS (formerly DaMaGeLab) has banned the advertising and sale of any ransomware...

One of the subgroups of Darkside has hacked the supplier of video surveillance systems

Mandiant experts report that a hack group, which previously worked with the ransomware group DarkSide, hacked the website of an unnamed...

Avaddon malware operators publish data decryption keys

Operators of the ransomware Avaddon stopped working and provided the Bleeping Computer with the keys to decrypt the victims' data. On the...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

760$ million stolen from Bitfinex in 2016 transferred to other wallets

Edition of The Record reports that, according to the Whale Alert...

Big Data And Cyber Security

Companies are constantly looking for new ways to protect...

T-Mobile reveals fourth data breach in three years

The American mobile operator T-Mobile announced another data breach,...