CyberNews

1 million highly sensitive pictures leaked by Korean teen dating app

CyberNews recently discovered an unsecured database that contains more than 1 million private photos, which appears to belong to the free Korean dating app ??? (aka Sweet Chat).

After refusing to pay ransom, US-based auto parts distributor has sensitive data leaked by cybercriminals

The NameSouth archive leaked by NetWalker includes financial and accounting data, credit card statements, personally identifiable employee information, and various legal documents.

Cybercriminals Claim to Leak Door Controls USA’s 140GB Database on Hacker Forum

The archive was leaked on November 27-28. It appears to have been posted on the hacker forum after Door Controls USA seemingly refused to pay ransom to attackers who breached the company’s network.

One in ten shopping ads promoted on Google potentially lead to phishing sites

Ads created by cybercriminals can lead users to malicious phishing websites where they can be tricked into buying counterfeit or unsafe products, fall victim to financial scams, or worse.

Your new smart car is an IoT device that can be hacked

Connected cars are complex systems composed of numerous units that exchange large amounts of data, and threat actors can manipulate those systems in order to gain control of smart vehicles.

France-based Apodis Pharma Exposed Business Data Due to Unsecured Kibana Dashboard

The database discovered by CyberNews contained confidential business-related data, including sales data, names of partners and employees, client warehouse stock stats, shipment locations, and more.

British companies are least likely to pay up when hit with ransomware

A survey of 2,200 senior IT decision-makers and IT security professionals across all global industry sectors, with 200 UK respondents, found that 39% of organizations fell victim to ransomware.

30% of top online shopping domains are vulnerable to BEAST SSL attack

CyberNews found that even though the majority of online shops follow excellent to good SSL configuration practices in general, almost a third of the web servers are suffer from SSL vulnerabilities.

We infiltrated an IRC botnet. Here’s what we found

By further analyzing the code, researchers observed that the malicious program was able to carry out DDoS attacks over UDP, TCP, HTTP, and other protocols and to execute commands.

Ethereum smart contract vulnerabilities can lead to millions in losses

These vulnerabilities, while specific and technical in nature, basically allow attackers to fiddle with the code and steal as much money as possible in a very short amount of time.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags