-
Ransomware
Advance Auto Parts Confirms Data Breach In SEC Filing
The cyberattacker claimed to have stolen three terabytes of data from the company’s Snowflake cloud storage. by Krishna Murthy June…
-
Ransomware
CISA SAFECOM Guidelines: Emergency Communications Boost
The NCSWIC and CISA work closely together to develop and maintain the SAFECOM Guidelines. by Ashish Khaitan June 20th, 2024…
-
Data Breach News
Chris Pashley Joins ARPA-H As CISO To Enhance Cybersecurity
With his extensive background in cybersecurity and proven leadership, Pashley is well-equipped to guide ARPA-H in protecting its vital research…
-
Ransomware
European Union Ups Cybersecurity: Rules & Third-Party Assist
Recognizing the urgent need for stronger cybersecurity measures, the EU has implemented the NIS Directive and DORA. by Samiksha Jain…
-
DarkWeb
Intelbroker Advertises Massive AMD Data Breach On Dark Web
According to the hacker's assertions, the AMD data leak involves a wide range of sensitive information extracted from AMD's databases.…
-
Ransomware
CDK Global Cyberattack Cripples Car Sales Across US
According to the news reports, CDK reported that they had restored some of their systems after conducting extensive tests and…
-
Ransomware
Alleged AMCOM Data Breach Exposes Military Docs On Dark Web
The AMCOM data leak on BreachForums by IntelBroker exposed technical documents and images of Boeing CH-47F Chinook and Sikorsky H-60…
-
Ransomware
Researchers Observe Evasive New ‘ONNX Store’ Phishing Kit
Researchers believe ONNX Store is likely a rebranding of existing Caffeine phishing kit. by Alan J June 20th, 2024 Share…
-
Ransomware
Void Arachne Threat Actor Group Targets Chinese Audience
Void Arachne utilizes multiple techniques to distribute malicious installers to covertly load the Winos backdoor on compromised systems. by Alan…
-
Ransomware
Lack Of MFA Likely Caused Massive Medibank Data Breach
Australian privacy watchdog provides a comprehensive analysis of security failures and consequences in the Medibank data breach incident. by Mihir…
-
Compliance
EU Chat Control Proposal To Prevent Child Sexual Abuse Slammed By Critics – The Cyber Express
“Whether you call it a backdoor, a front door or 'upload moderation,' it undermines encryption and creates significant vulnerabilities,” Signal…
-
Ransomware
CISA Guide To Modernizing Network Access Security
The agency urges business owners of all sizes to move toward more robust security solutions, such as Zero Trust, that…
-
Espionage
Vermin Hackers Resurface To Target Ukrainian Defense Forces With SPECTR Malware – The Cyber Express
The attackers leveraged the legitimate Syncthing software’s synchronization functionality to download stolen documents, files, passwords and other sensitive information. by…
-
Ransomware
Researchers Deep Dive Into UNC3886 Actors’ Cyberespionage Realm – The Cyber Express
UNC3886 has it all in its threat arsenal: rootkits, custom malware, leveraging trusted third-party services for C2, and installing SSH…
-
Ransomware
Apple Data Breach Exposes Internal Tools, Claims IntelBroker
Threat actor releases sample source code of Apple website's internal tools by Krishna Murthy June 19th, 2024 Share on LinkedInShare…
-
Data Breach News
Sav-Rx Data Breach Compromised PII And Health Data Of 2.8M People
Company said the threat actor destroyed the acquired data but has not yet confirmed if any ransom payment was made…
-
Ransomware
FBI Seeks Victims In Richard Michael Roe Cyberstalking Case
The indictment against Richard Michael Roe is a significant step in addressing the cyberstalking activities that allegedly took place from…
-
Ransomware
Irish Hacker Avoids Jail For Teenage Cyberattacks On XBox
The hacker had launched DDoS attacks that cost millions. Now reformed, the court suspended his sentence due to his age…
-
Ransomware
Proactive Security Soars: New Study Shows Rapid Adoption
The report highlights a gap in industry guidance on best practices for building a proactive security strategy. by Samiksha Jain…
-
Cyber Warfare
Known Exploited Vulnerabilities (KEV) Catalog By CISA
CISA has urged organizations and all federal agencies to strictly follow the Known Exploited Vulnerabilities catalog as a step against…
-
Data Breach News
An ‘Unwelcome Development’ In MediSecure Data Breach Incident – The Cyber Express
Allegedly leaked data set appears for sale on a Russian hacking forum for $50,000 by Mihir Bagwe May 24th, 2024…
-
Data Breach News
Alleged Luxor Data Breach Exposes Sensitive SQL Database
The alleged leaked data, initially shared on the Telegram channel Leakbase, comprises 692 MB of SQL data, encompassing a trove…
-
Data Breach News
Fortify Your Systems With An Effective API Security Strategy
API security is not a one-time fix but a continuous process of improvement and adaptation. by thecyberexpress January 21st, 2024…
-
Data Breach News
Internet Traffic Hacking: TAs Exploiting Trusted Platforms
Internet traffic hacking relies on legitimate internet services (LIS): 25% leverage LIS in their operations, with 68.5% utilizing multiple LIS…
-
Ransomware
Maxicare Data Breach: Probe Launched, Impact Limited
Maxicare assures its members that no sensitive medical information has been exposed. by Samiksha Jain June 19th, 2024 Share on…
-
Ransomware
Are You Following Safe Browsing Patterns?
Cybercriminals are using bogus ads at the top of your search results to lure you. A visit is enough to…
-
Ransomware
Passenger Finds Exploitable Bug In Airline Wi-Fi Service 2022
After creating a test account and browsing some pages online while being onboard, the individual noticed a request that contained…
-
Ransomware
Anime/Manga: Fueling Threat Actors’ Cyber Attacks?
What has cybercriminal gangs got to do with Anime/Manga characters? They share common names!! by thecyberexpress Last updated on June…
-
Vulnerabilities
Google Search Ranking Explosive Leak Of Internal Documents
A leak of Google documents offers a glimpse into the factors influencing search results. The leak's impact is likely to…
-
Vulnerabilities
Fortinet FortiSIEM Vulnerability Raises RCE Risks
Successful exploitation of these FortiSIEM vulnerabilities could enable remote attackers to execute code using the affected service account. by Ashish…