Discord hacked, reset your passwords
Users of Discord have been informed of a data breach that was caused after a threat actor got unauthorized access to the support request queue of a third-party customer careRead More →
Users of Discord have been informed of a data breach that was caused after a threat actor got unauthorized access to the support request queue of a third-party customer careRead More →
The Toyota Motor Corporation confirmed on Friday that the car data of 2.15 million customers in Japan, including those of its premium brand Lexus, had been publicly accessible for almostRead More →
The Federal Bureau of Investigation (FBI) made the announcement on Tuesday that it had successfully disabled a network of compromised computers that Russian agents had been using for years toRead More →
Researchers from VulnCheck have created a new attack for the previously discovered serious issue in PaperCut servers. This exploit, which is tagged as CVE-2023-27350 and has a CVSS score ofRead More →
Facebook, Instagram, and WhatsApp’s parent company, Meta, often shares its research with other members of the cyber defense community as well as with other professionals in the field. An expertRead More →
Bitmarck, which is one of the main IT service providers working inside Germany’s statutory health insurance system, said on Sunday that it had taken all of its client and internalRead More →
A new piece of malware known as Atomic macOS Stealer (AMOS) was recently discovered by researchers as it was being offered for sale on Telegram. The threat actor who isRead More →
The most significant bottler for Coca-Cola, Coca-Cola FEMSA Mexico, was the one who disclosed the cyberattack that was reported this week. Coca-Cola carried out a forensic investigation while simultaneously puttingRead More →
Researchers at TrendMicro have uncovered a new risk to Docker containers, a piece of malware that they have called “TrafficStealer.” The purpose of this program is to earn income byRead More →
EvilExtractor is an attack tool that is meant to target Windows operating systems to extract data and files from endpoint devices. EvilExtractor is also occasionally written Evil Extractor. It comesRead More →