Data Breach
-
Read moreAttackers abuse Oracle Database Scheduler's External Jobs via extjobo.exe to execute commands, tunnel RDP with Ngrok, escalate privileges, and deploy ransomware. Learn about the breach tactics, cleanup methods, and key mitigations to secure database environments.
-
Read moreKawa4096 ransomware, active since June 2025, attacks multinational firms using double extortion by stealing data before encryption and threatening public leaks. It employs partial encryption and deletes shadow copies to prevent recovery.
-
Read moreThe Everest ransomware group alleges stealing 600,000 lines of BMW’s internal documents, including audit reports and engineering files, and threatens public release. BMW has yet to confirm the breach or respond.
-
Read moreInsight Partners suffered a data breach from a social engineering attack that exposed personal data from HR and finance systems. The breach went undetected for nearly three months before ransomware deployment. Affected users receive identity protection.
-
Read moreThe Pixie Dust attack targets vulnerabilities in Wi-Fi Protected Setup (WPS) to recover router PINs offline, allowing attackers to access wireless networks. Disabling WPS or updating firmware is essential to prevent this exploit.
-
Read moreQantas penalizes CEO Vanessa Hudson and top executives nearly A$800,000 (₹44.8 crore) in pay cuts following a cyberattack affecting 5.7 million customers. Learn about the breach, response, and governance reforms.
-
Read moreChess.com confirms a data breach affecting 4,541 users, with hackers accessing personal information. Learn about the incident, user notifications, and security measures underway.
-
Read moreFarmers Insurance discloses a data breach impacting 1.1 million customers due to unauthorized access to a third-party vendor’s Salesforce-linked database. Learn about the exposed data, response actions, and identity protection tips.
-
Read moreA sophisticated OneDrive spearphishing campaign targets corporate executives with fake HR emails and Microsoft Office 365 login pages to steal credentials. Learn how to recognize and prevent this threat.
-
Read moreDiscover how the TamperedChef malware uses a fake PDF editor to steal login credentials and sensitive data in a widespread 2025 cyberattack.