The Industrial Spy marketplace offers different tiers of data offerings, with “premium” stolen data packages costing millions of dollars and lower-tier data that can be bought as individual files for as little as $2.
The latest Emotet campaign broke out in mid-November of 2021 and is spread using malicious documents attached to phishing emails. FortiGuard Labs has tracked a number of variants used to evade detection in this campaign.
Internal government emails, obtained by The Canadian Press through the Access to Information Act, said officials were “unable to confirm the full extent of the information that was accessed.”
Users of the Microsoft Teams platform at Army Futures Command earlier this month potentially exposed personal and health identifying information to an unsecured number of department employees, according to a memo obtained by Breaking Defense.
In the alert sent to its clients, McDonald’s advised that client names, marital status, address, email, document identity number, and phone numbers had been left unprotected.
The CISA has added nine more security flaws to its list of actively exploited bugs, including a VMware privilege escalation flaw and a Google Chrome zero-day that could be used for remote code execution.
Newman Regional Health notifies 52,224 patients after long-running breach of employee email accounts
Newman Regional Health (NRH) is notifying more than 52,000 patients after an investigation revealed unauthorized access to a limited number of their employee e-mail accounts.
The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) issued a warning after multiple customers have filed reports of being targeted by this new SMS phishing (smishing) campaign.
Since this campaign was first spotted on April 12, 2022, the threat actor has already accessed and stolen data from dozens of victim organizations using Heroku and Travis-CI-maintained OAuth apps, including npm.
As many as five security vulnerabilities have been addressed in Aethon Tug hospital robots that could enable remote attackers to seize control of the devices and interfere with the timely distribution of medication and lab samples.