lemmydev2

joined 2 years ago
 

OVHcloud denies breach after hacker claims 600TB data theft affecting millions of sites, with experts doubting authenticity due to weak proof

 

Crims 'creating a snowball effect' across open source projects RSAC 2026  Thousands of organizations' cloud environments have been infected with secret-stealing malware as a result of the Trivy supply-chain attack last week, and now the crims that compromised the open source scanners are working with notorious extortion crews like Lapsus$.…

 

U.S. sentences Russian hacker Aleksei Volkov to 81 months in prison for aiding ransomware attacks, causing over $9M in damages. A U.S. court sentenced Aleksei Olegovich Volkov to 81 months in prison for supporting ransomware groups like Yanluowang. He helped carry out dozens of attacks, causing over $9M in losses. Arrested in Italy in 2024 […]

 

DarkSword exploit leak puts up to 270 million iPhones at risk, with hackers able to access data through…

 

The Dutch Ministry of Finance confirmed on Monday that some of its systems were breached in a cyberattack detected last week. [...]

 

WebinarTV hosts 200,000 “webinars.” A Zoom call you may thought was private might be one of them.

 

JPMorgan Chase uses digital fingerprints and digital twins to spot online attackers and malicious behaviors while also reducing pesky false alerts.

 

FCC says routers can be approved for sale, but so far, none are

 

Bug bounty platform HackerOne is notifying hundreds of employees that their data was stolen after attackers hacked Navia, one of its U.S. benefits administrators. [...]

 

Finland put on ice a plan to move its election platform to Amazon Web Services Inc., the latest development in Europe’s drive towards digital autonomy as trust in the US frays.

 

Comments

 

Exploits remain the leading entry point for attackers for the sixth consecutive year, according to Mandiant’s M-Trends 2026 report, which draws on more than 500,000 hours of incident response work conducted in 2025. The data shows attackers speeding up their internal hand-offs, shifting away from email phishing, and targeting backup and virtualization infrastructure with greater precision. Initial infection vector 2025 (Source: Mandiant) Voice phishing surges as email phishing continues to decline Voice phishing climbed to … More → The post Attackers are handing off access in 22 seconds, Mandiant finds appeared first on Help Net Security.

view more: ‹ prev next ›