Categories
Breach Bug Cyber Security Hacking Malware Ransomware Scam Snooping Vulnerability

Dating apps breaches leak millions of sensitive data, Bug in LinkedIn iOS app resorts to clipboard snooping, and more

Major cybersecurity events on 6th July 2020 (Evening Post): Multi-stage bitcoin scam leaks data personal data of 2,50,000 people. Russian MoFA Twitter account hijacked, data offered for sale. New, more sinister Mac ransomware infects Apple’s Mac computers.Continue readingDating apps breaches leak millions of sensitive data, Bug in LinkedIn iOS app resorts to clipboard snooping, and more

Categories
Breach CVE Cyber Security DDoS Malware Ransomware Snooping Vulnerability

TikTok stops clipboard snooping after Apple exposes it, 5 million DeviceLock users’ data leaked, and more

Major cybersecurity events on 29th June 2020: CloudSEK researcher reports 40,000 Indiamart suppliers’ data. Aspire News App, domestic violence assistance app, suffers data breach. Hackers threaten to leak beverage firm Lion’s stolen files, following a ransomware attack. Continue readingTikTok stops clipboard snooping after Apple exposes it, 5 million DeviceLock users’ data leaked, and more

Categories
Breach CVE Cyber Security Malware Ransomware Snooping Trojan Vulnerability

CloudSEK Daily Threat Bulletin – 12th March 2020

Round Up of Major Breaches and Scams Comcast accidentally published 200,000 “unlisted” phone numbers Comcast mistakenly published the names, phone numbers, and addresses of nearly 200,000 customers who paid monthly fees to make their numbers unlisted. The names and numbers were made available on Ecolisting, a directory run by Comcast, and picked up by third-party directories.…Continue readingCloudSEK Daily Threat Bulletin – 12th March 2020

Categories
Malware MiTM Phishing Ransomware Snooping Trojan Vulnerability

CloudSEK Daily Threat Bulletin – 10th March 2020

Round Up of Major Breaches and Scams Years-long campaign targets hackers through trojanized hacking tools Vietnam based threat group has been hacking other hackers through njRAT infected hacking tools. Instead of directly hacking systems, spreading trojanized hacking tools gives them complete access to a much larger pool of hacked data. These trojanized tools have been…Continue readingCloudSEK Daily Threat Bulletin – 10th March 2020