compromised

MyRepublic customer data compromised in third-party security breach

MyRepublic says almost 80,000 of its mobile subscribers in Singapore have had their personal data compromised, following a security breach… Read More

3 years ago

Pantagrule – Large Hashcat Rulesets Generated From Real-World Compromised Passwords

gargantuan hashcat rulesets generated from compromised passwords Project maintenance warning: This project is deemed completed. No pull requests or changes… Read More

3 years ago

A New Phishing Attack Uses Compromised SharePoint Website

Attackers rely on convincing emails and a few other techniques to bypass detection, that includes an Office 365 phishing page,… Read More

3 years ago

CISA Warns of 13 Different Malware Samples Found on Compromised Pulse Secure Devices

Since at least June 2020, Pulse Secure devices at U.S. government agencies, critical infrastructure entities, and private sector organizations have… Read More

3 years ago

WEC: No data compromised in ransomware attack

While a ransomware attack was launched against the Alabama-based Wiregrass Electric Cooperative during the weekend, officials have verified that no… Read More

3 years ago

SolarWinds Hackers Compromised Denmark’s Central Bank and Remained Hidden for Months

The network intrusion was revealed by the technology outlet Version2, which obtained official documents from the Danish central bank through… Read More

3 years ago

Hackers Breached Colonial Pipeline Using Compromised Password

The hack that took down the largest fuel pipeline in the U.S. and led to shortages across the East Coast… Read More

3 years ago

FBI to share compromised passwords with Have I Been Pwned

The FBI will soon start to share compromised passwords that were discovered during law enforcement investigations with the Have I… Read More

3 years ago

Compromised Microsoft Exchange Server Used to Host Cryptominer

Researchers at Sophos have reported that an unknown attacker is attempting to use a compromised Microsoft Exchange Server to deliver… Read More

3 years ago

Hackers Compromised a Popular Carding Site Exposing 300,000 User Account Details

The data breach on Card Mafia, a forum for stealing and trading credit cards, exposed email addresses, hashed passwords, usernames,… Read More

3 years ago

Columbo – A Computer Forensic Analysis Tool Used To Simplify And Identify Specific Patterns In Compromised Datasets

Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down… Read More

3 years ago

In Yet Another Supply Chain Attack, PHP's Git Server Gets Compromised

To compromise the PHP codebase, two malicious commits were pushed to a Git repository maintained by the PHP development team.… Read More

3 years ago

Godehashed – Tool That Uses The Dehashed.Com API To Search For Compromised Assets

A golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a… Read More

3 years ago

Hackers hide credit card data from compromised stores in JPG file

Hackers have come up with a sneaky method to steal payment card data from compromised online stores that reduces the… Read More

3 years ago

Compromised SendGrid Accounts Used in Phishing Attacks to Steal Outlook, Office 365 Logins

Using Zoom invites as a lure and an extensive list of email addresses, the operators of the campaign delivered messages… Read More

3 years ago

Gootkit RAT Using SEO Methods to Distribute Malware Through Compromised Sites

Dubbed "Gootloader," the expanded Javascript-based malware delivery system comes amid a surge in the number of infections targeting users in… Read More

3 years ago