• View

Ransomware Vulnerability is exploited by the New Black Basta decryptor to recover files

Researchers have developed a Black Basta decryptor that takes advantage of a vulnerability in the Black Basta ransomware to unlock victims’ files. Th... Read more

Millions of Users Affected by an Integris Health Data Breach

Integris Health Data Breach, Patients have been notified affecting their data. The biggest nonprofit healthcare system in Oklahoma, Integris Health h... Read more

Image

Happy 14th Birthday, KrebsOnSecurity!

KrebsOnSecurity celebrates its 14th year of existence today! I promised myself this post wouldn’t devolve into yet another Cybersecurity Year in Revi... Read more

Water Transport Data of Ukraine Claims Leaking by Anonymous Central

The State Service for Maritime, Inland Waterway Transport, and Shipping of Ukraine is the target of a cyberattack, according to the cybercriminal org... Read more

First American Operations Disrupts Due To Cyberattack

Following the cybersecurity incident on December 20, First American, the second-largest title insurer in the country, and a few of its subsidiaries a... Read more

Image

Lulz Security Indonesia, claims Cyberattack On the Australian PM Website

A hacktivist group called Lulz Security Indonesia has made audacious claims about a cyberattack on the Australian PM website. Although the group show... Read more

Millions of Hacked Data Exposes via Leaksmas Darkweb Event

The cyber underworld brought in a terrifying twist to Christmas, known as “Leaksmas,” a time of year marked by widespread data dumps that target peop... Read more

Cyberattack at Abdali Hospital: Rhysida Hacking Group Demand 10 BTC

The infamous hacking group Rhysida is said to have broken into vital infrastructure once more, this time focusing on Jordan’s Abdali Hospital. The al... Read more

Minnesota’s Clay County residents are impacted by a cyberattack

Residents of Clay County are being informed about a data security incident by officials. On Friday, they started sending letters to the residents. Th... Read more

Bully 2 Files, GTA 5 Source Code, and GTA 6 Code Allegedly Leaked

There seems to have been another leak targeting Rockstar Games. Grand Theft Auto 5’s whole source code may have been leaked, according to several rep... Read more

Kazakhstan will send a Russian cybersecurity expert sought by the United States to Moscow

On December 21, the Prosecutor-General’s Office of Russia announced that Nikita Kislitsin, a cybersecurity expert from Russia, would be extradited to... Read more

German law enforcement shuts down Kingdom Market

The servers of the darknet marketplace Kingdom Market, which served as a bazaar for illegal drugs, malware, forged documents, and other tools for cyb... Read more

Chameleon Android Malware Disables Biometric Unlock To Steal PINs

In a recent cybersecurity development, a new strain of Android malware named Chameleon has emerged as a significant threat. This malicious software e... Read more

Comcast data breach impacts almost 36 million users

Hackers now have access to almost every customer’s personal information thanks to a data breach at Xfinity. This Comcast data breach impacts almost 3... Read more

Image

BlackCat Ransomware Raises Ante After FBI Disruption

The U.S. Federal Bureau of Investigation (FBI) disclosed today that it infiltrated the world’s second most prolific ransomware gang, a Russia-based... Read more

Analysis of Rhadamanthys Malware

In the final quarter of 2022, the infostealer malware, Rhadamanthys, was found. Given that it could target browser extensions and wallet clients inst... Read more

A security breach at MongoDB exposes customer data

On Saturday, MongoDB announced that it is currently looking into a security incident that resulted in the disclosure of customer account metadata and... Read more

China releases a draft emergency plan in case of data security incidents

China highlighted Beijing’s concerns about widespread data leaks and hacking within its borders on Friday by proposing a four-tier classification to... Read more

Dell PowerProtect Vulnerabilities allows hackers to run OS Commands

Numerous vulnerabilities related to SQL injection, cross-site scripting (XSS), privilege escalation, command injection, and path tracing have been fo... Read more