Incident Blog News(103)-    2024  2023  2022  2021  2020  2019  2018

APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog

DATE

NAME

Info

CATEG.

WEB

31.8.24

No, not every Social Security number in the U.S. was stolen

It’s not unusual for a threat actor to exaggerate the extent of a hack or breach to drum up interest, and hopefully, the eventual purchase or ransom price.

Incident blog

Cisco Blog

20.7.24

It's best to just assume you’ve been involved in a data breach somehowTelecommunications provider AT&T disclosed earlier this month that adversaries stole a cache of data that contained the phone numbers and call records of “nearly all” of its customers.Incident blogCisco Blog

13.7.24

Cloudflare 1.1.1.1 incident on June 27, 2024On June 27, 2024, a small number of users globally may have noticed that 1.1.1.1 was unreachable or degraded. The root cause was a mix of BGP (Border Gateway Protocol) hijacking and a route leak... Incident blogCloudflare

13.7.24

Impact of data breaches is fueling scam campaignsData breaches have become one of the most crucial threats to organizations across the globe, and they’ve only become more prevalent and serious over time.Incident blogCisco Blog
29.6.24Snowflake isn’t an outlier, it’s the canary in the coal mineBy Nick Biasini with contributions from Kendall McKay and Guilherme Venere Headlines continue to roll in about the many implications and follow-on attacks originating from leaked and/or stolen credentials for the Snowflake cloud data platform. Adversaries obtained stolen loginIncident blogCisco Blog
15.6.24560 million Ticketmaster customer data for sale? – Week in security with Tony AnscombeTicketmaster seems to have experienced a data breach, with the ShinyHunters hacker group claiming to have exfiltrated 560 million customer dataIncident blogEset
8.6.24The murky world of password leaks – and how to check if you’ve been hitPassword leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky – unless you know where to lookIncident blogEset
23.3.24Threat actors leverage document publishing sites for ongoing credential and session token theftTalos IR has responded to several recent incidents in which threat actors used legitimate digital document publishing sites such as Publuu and Marq to host phishing documents as part of ongoing credential and session harvesting attacks.Incident blogCisco Blog
25.2.242024 Unit 42 Incident Response Report: Navigating the Shift in Cybersecurity Threat TacticsOur annual survey of incident data from more than 250 organizations and more than 600 incidents provides a Unit 42 perspective on the current state of security exposures. Incident blogPalo Alto