ARTICLES  HOME  MARCH  Incindent  Articles - H  2020 1  2  3  4  5  6  7  8  9  10 


H  AI(1) APT(24) Attack(15) BigBrothers(53) BotNet(9) Crime(17) Cryptocurrency(22) Cyber(3) Exploit(23) Hacking(17) ICS(3) Incindent(10) IoT(1) Mobil(0) OS(1) Phishing(6) Ransom(32) Safety(1) Security(17) Social(7) Spam(0) Virus(107) Vulnerebility(93)


MongoDB Suffers Security Breach, Exposing Customer Data

CATEGORIE : Incindent

DATE: 17.12.23

WEB : The Hacker News

MongoDB on Saturday disclosed it's actively investigating a security incident that has led to unauthorized access to "certain" corporate systems, resulting in the exposure of customer account metadata and contact information.

The American database software company said it first detected anomalous activity on December 13, 2023, and that it immediately activated its incident response efforts.

Okta Discloses Broader Impact Linked to October 2023 Support System Breach

CATEGORIE : Incindent

DATE: 29.11.23

WEB : The Hacker News

Identity services provider Okta has disclosed that it detected "additional threat actor activity" in connection with the October 2023 breach of its support case management system.

"The threat actor downloaded the names and email addresses of all Okta customer support system users," the company said in a statement shared with The Hacker News.

Kubernetes Secrets of Fortune 500 Companies Exposed in Public Repositories

CATEGORIE : Incindent

DATE: 24.11.23

WEB : The Hacker News

Cybersecurity researchers are warning of publicly exposed Kubernetes configuration secrets that could put organizations at risk of supply chain attacks.

"These encoded Kubernetes configuration secrets were uploaded to public repositories," Aqua security researchers Yakir Kadkoda and Assaf Morag said in a new research published earlier this week.

Okta's Recent Customer Support Data Breach Impacted 134 Customers

CATEGORIE : Incindent

DATE: 4.11.23

WEB : The Hacker News

Identity and authentication management provider Okta on Friday disclosed that the recent support case management system breach affected 134 of its 18,400 customers.

It further noted that the unauthorized intruder gained access to its systems from September 28 to October 17, 2023, and ultimately accessed HAR files containing session tokens that could be used for session hijacking attacks.

1Password Detects Suspicious Activity Following Okta Support Breach

CATEGORIE : Incindent

DATE: 22.10.23

WEB : The Hacker News

Popular password management solution 1Password said it detected suspicious activity on its Okta instance on September 29 following the support system breach, but reiterated that no user data was accessed.

"We immediately terminated the activity, investigated, and found no compromise of user data or other sensitive systems, either employee-facing or user-facing," Pedro Canahuati, 1Password CTO, said in a Monday notice.

Okta's Support System Breach Exposes Customer Data to Unidentified Threat Actors

CATEGORIE : Incindent

DATE: 22.10.23

WEB : The Hacker News

Identity services provider Okta on Friday disclosed a new security incident that allowed unidentified threat actors to leverage stolen credentials to access its support case management system.

"The threat actor was able to view files uploaded by certain Okta customers as part of recent support cases," David Bradbury, Okta's chief security officer, said. "It should be noted that the Okta support case management system is separate from the production Okta service, which is fully operational and has not been impacted."

Microsoft AI Researchers Accidentally Expose 38 Terabytes of Confidential Data

Microsoft AI

CATEGORIE : Incindent

DATE: 19.9.23

WEB : The Hacker News

Microsoft on Monday said it took steps to correct a glaring security gaffe that led to the exposure of 38 terabytes of private data.

The leak was discovered on the company's AI GitHub repository and is said to have been inadvertently made public when publishing a bucket of open-source training data, Wiz said. It also included a disk backup of two former employees' workstations containing secrets, keys, passwords, and over 30,000 internal Teams messages.

Outlook Breach: Microsoft Reveals How a Crash Dump Led to a Major Security Breach

CATEGORIE : Incindent

DATE: 7.9.23

WEB : The Hacker News

Microsoft on Wednesday revealed that a China-based threat actor known as Storm-0558 acquired the inactive consumer signing key to forge tokens and access Outlook by compromising an engineer's corporate account.

This enabled the adversary to access a debugging environment that contained information pertaining to a crash of the consumer signing system and steal the key. The system crash took place in April 2021.

"A consumer signing system crash in April of 2021 resulted in a snapshot of the crashed process ('crash dump')," the Microsoft Security Response Center (MSRC) said in a post-mortem report.

Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack

CATEGORIE : Incindent

DATE: 26.8.23

WEB : The Hacker News

Risk and financial advisory solutions provider Kroll on Friday disclosed that one of its employees fell victim to a "highly sophisticated" SIM swapping attack.

The incident, which took place on August 19, 2023, targeted the employee's T-Mobile account, the company said.

"Specifically, T-Mobile, without any authority from or contact with Kroll or its employee, transferred that employee's phone number to the threat actor's phone at their request," it said in an advisory.

U.K. Electoral Commission Breach Exposes Voter Data of 40 Million Britons

U.K. Electoral Commission

CATEGORIE : Incindent

DATE: 9.8.23

WEB : The Hacker News

The U.K. Electoral Commission on Tuesday disclosed a "complex" cyber attack on its systems that went undetected for over a year, allowing the threat actors to access years worth of voter data belonging to 40 million people. "The incident was identified in October 2022 after suspicious activity was detected on our systems," the regulator said. "It became clear that hostile actors had first accessed the systems in August 2021."

"Mysterious Team Bangladesh" Targeting India with DDoS Attacks and Data Breaches

DDoS Attacks and Data Breaches

CATEGORIE : Incindent

DATE: 3.8.23

WEB : The Hacker News

A hacktivist group known as Mysterious Team Bangladesh has been linked to over 750 distributed denial-of-service (DDoS) attacks and 78 website defacements since June 2022.

"The group most frequently attacks logistics, government, and financial sector organizations in India and Israel," Singapore-headquartered cybersecurity firm Group-IB said in a report shared with The Hacker News. "The group is primarily driven by religious and political motives."

A Data Exfiltration Attack Scenario: The Porsche Experience

CATEGORIE : Incindent

DATE: 28.7.23

WEB : The Hacker News

As part of Checkmarx's mission to help organizations develop and deploy secure software, the Security Research team started looking at the security posture of major car manufacturers. Porsche has a well-established Vulnerability Reporting Policy (Disclosure Policy)[1], it was considered in scope for our research, so we decided to start there, and see what we could find.

Cybersecurity Agencies Warn Against IDOR Bugs Exploited for Data Breaches

CATEGORIE : Incindent

DATE: 28.7.23

WEB : The Hacker News

Cybersecurity agencies in Australia and the U.S. have published a joint cybersecurity advisory warning against security flaws in web applications that could be exploited by malicious actors to orchestrate data breach incidents and steal confidential data.

This includes a specific class of bugs called Insecure Direct Object Reference (IDOR), a type of access control flaw that occurs when an application utilizes user-supplied input or an identifier for direct access to an internal resource, such as a database record, without any additional validations.

VirusTotal Data Leak Exposes Some Registered Customers' Details

CATEGORIE : Incindent

DATE: 18.7.23

WEB : The Hacker News

Data associated with a subset of registered customers of VirusTotal, including their names and email addresses, were exposed after an employee inadvertently uploaded the information to the malware scanning platform.

The security incident, which comprises a database of 5,600 names in a 313KB file, was first disclosed by Der Spiegel and Der Standard yesterday.

JumpCloud Blames 'Sophisticated Nation-State' Actor for Security Breach

JumpCloud

CATEGORIE : Incindent

DATE: 18.7.23

WEB : The Hacker News

A little over a week after JumpCloud reset API keys of customers impacted by a security incident, the company said the intrusion was the work of a sophisticated nation-state actor.

The adversary "gained unauthorized access to our systems to target a small and specific set of our customers," Bob Phan, chief information security officer (CISO) at JumpCloud, said in a post-mortem report. "The attack vector used by the threat actor has been mitigated." The U.S. enterprise software firm said it identified anomalous activity on June 27, 2023, on an internal orchestration system, which it traced back to a spear-phishing campaign mounted by the attacker on June 22.

Hackers Steal $20 Million by Exploiting Flaw in Revolut's Payment Systems

Revolut's Payment Systems

CATEGORIE : Incindent

DATE: 10.7.23

WEB : The Hacker News

Malicious actors exploited an unknown flaw in Revolut's payment systems to steal more than $20 million of the company's funds in early 2022.

The development was reported by the Financial Times, citing multiple unnamed sources with knowledge of the incident. The breach has not been disclosed publicly.

The fault stemmed from discrepancies between Revolut's U.S. and European systems, causing funds to be erroneously refunded using its own money when some transactions were declined.

JumpCloud Resets API Keys Amid Ongoing Cybersecurity Incident

JumpCloud

CATEGORIE : Incindent

DATE: 7.7.23

WEB : The Hacker News

JumpCloud, a provider of cloud-based identity and access management solutions, has swiftly reacted to an ongoing cybersecurity incident that impacted some of its clients.

As part of its damage control efforts, JumpCloud has reset the application programming interface (API) keys of all customers affected by this event, aiming to protect their valuable data.

Western Digital Confirms Customer Data Stolen by Hackers in March Breach

CATEGORIE : Incindent

DATE: 8.5.23

WEB : The Hacker News

Digital storage giant Western Digital confirmed that an "unauthorized third party" gained access to its systems and stole personal information belonging to the company's online store customers.

"This information included customer names, billing and shipping addresses, email addresses and telephone numbers," the San Jose-based company said in a disclosure last week.

"In addition, the database contained, in encrypted format, hashed and salted passwords and partial credit card numbers. We will communicate directly with impacted customers."

Kodi Confirms Data Breach: 400K User Records and Private Messages Stolen

Kodi Suffers Data Breach

CATEGORIE : Incindent

DATE: 14.4.23

WEB : The Hacker News

Open source media player software provider Kodi has confirmed a data breach after threat actors stole the company's MyBB forum database containing user data and private messages.

What's more, the unknown threat actors attempted to sell the data dump comprising 400,635 Kodi users on the now-defunct BreachForums cybercrime marketplace.

"MyBB admin logs show the account of a trusted but currently inactive member of the forum admin team was used to access the web-based MyBB admin console twice: on 16 February and again on 21 February," Kodi said in an advisory.

Western Digital Hit by Network Security Breach - Critical Services Disrupted!

CATEGORIE : Incindent

DATE: 4.4.23

WEB : The Hacker News

Data storage devices maker Western Digital on Monday disclosed a "network security incident" that involved unauthorized access to its systems.

The breach is said to have occurred on March 26, 2023, enabling an unnamed third party to gain access to a "number of the company's systems."

Following the discovery of the hack, Western Digital said it has initiated incident response efforts and enlisted the help of cybersecurity and forensic experts to conduct an investigation.

OpenAI Reveals Redis Bug Behind ChatGPT User Data Exposure Incident

ChatGPT

CATEGORIE : Incindent

DATE: 25.3.23

WEB : The Hacker News

OpenAI on Friday disclosed that a bug in the Redis open source library was responsible for the exposure of other users' personal information and chat titles in the upstart's ChatGPT service earlier this week.

The glitch, which came to light on March 20, 2023, enabled certain users to view brief descriptions of other users' conversations from the chat history sidebar, prompting the company to temporarily shut down the chatbot.