The server contained 3TB ata dating back to 2018, including airport employee records. While the team was not able to… Read More
An Amazon S3 bucket owned by D.W. Morgan was misconfigured, exposing more than 2.5 million files equating to over 100GB… Read More
Security researchers have discovered over two million social media user profiles scraped from the internet after they were unwittingly exposed… Read More
The researchers said that over 61 million records were contained in the data repository, including vast swathes of user information… Read More
A database filled with the medical records of nearly 200,000 U.S. military veterans was exposed online by United Valor, a… Read More
Eversource Energy is warning customers that the unsecured cloud storage server exposed their name, address, phone number, social security number,… Read More
Kubernetes clusters can and should be configured for greater security, but when left unsecured, these clusters can be accessed anonymously… Read More
Threat actors are targeting mission-critical SAP applications unsecured against already patched vulnerabilities, exposing the networks of commercial and government organizations… Read More
A Utah company exposed the information of more than 50,000 customers by storing data on an unsecured server. Sensitive customer… Read More
Bykea had exposed all its production server information and allowed access to over 200GB of data containing more than 400… Read More
Scientists from industrial cybersecurity firm OTORIO revealed that a group of Iranian hackers obtained access to a un unprotected industrial… Read More
Particulars of the fund's sign up of customers and correspondence with its traders could be freely examine by any person… Read More
Drawing minor focus to by themselves, threat actors have spent the earlier two-three several years mass-scanning the online for ENV… Read More
Though data leak incidents by using exposed servers are not unusual, this time, the ignorant company is a tech giant.… Read More
A back-end server affiliated with Microsoft Bing exposed delicate details of the research engine's mobile software consumers, such as look… Read More
According to Recorded Long run, RDP is the most frequent intrusion technique used by danger actors—to get entry to Home… Read More