Tag: security

Mac users targeted with new malware, so be on your guard

Hackers seen running malvertising campaign promoting a fake Homebrew package Victims were targeted with AMOS, a powerful infostealer Campaign has since been taken down, but users should still be on guard Mac users are once again being targeted with powerful malware as hackers try to steal their login information, sensitive…

Read More

Hackers are abusing Zendesk to run brand impersonation scams

Security researchers from CloudSEK observed hackers running pig butchering scams They’re impersonating legitimate businesses through Zendesk’s services The researchers said Zendesk’s vetting system isn’t thorough enough A new report from cybersecurity researchers CloudSEK has found that cybercriminals are abusing Zendesk to run brand impersonation scams, with hackers abusing simple Zendesk…

Read More

HPE investigating claims that hacker breached developer environments, source code

In mid-January, IntelBroker offered an HPE archive for sale The hacker claims it contains sensitive data such as source code and access HPE said it was investigating the claims Hewlett Packard Enterprise (HPE) said it was investigating claims of a data breach, recently made by a known leakster IntelBroker. On…

Read More

Millions of hotel guest reservations leaked in Otelier data breach

A threat actor used an infostealer to gain access to Otelier’s AWS S3 bucket The threat actor exfiltrated almost 8TB of sensitive data Reservations, personally identifiable data, and more, were all taken High-profile hotel chains, including Marriott and Hilton, have had sensitive customer data lost as part of a supply-chain…

Read More

Chinese cybersecurity firm sanctioned by US Treasury over alleged links to Salt Typhoon hackers

A Chinese cybersecurity firm has been sanctioned by the US Treasury The firm allegedly has ties to hacking group Salt Typhoon Salt Typhoon is accused of carrying out a cyberattack on 9 telco giants A Chinese cybersecurity firm has been sanctioned by the US Department of the Treasury’s Office of…

Read More

Racing against time on a menacing caldera: survey finds majority of organizations take days to tackle critical vulnerabilities, each of them a potential open goal for cybercriminals

Survey finds nearly 70% of orgs leave critical vulnerabilities unresolved for 24 hours or more Managing vulnerability fog is a major challenge, as AI promises to make it easier for criminals to identify targets Zero-day and unpatched legacy vulnerabilities remain a major cause of cybercriminal proliferation Over two-thirds (68%) of…

Read More