“Various claims are filed as a result of the issuance of duplicate SIM cards to third parties other than subscribers. As a result of the above, the holders of the telephone line are not only left without service, but the third parties access their bank accounts.” “Spanish DPA carries out research actions to analyze the […]
The German hosting company ZAP-Hosting has warned customers about a data breach in which their private data was stolen and then published on the internet. Customers are offered a discount voucher of twenty euros as an apology. Due to the attack, ZAP was forced to shut down part of the infrastructure. According to ZAP, an […]
The Google Dialer and Messages apps, which are installed by default on Android phones, collect all kinds of private data from users and send it to Google, according to researchers from Trinity College Dublin based on their own research. The apps are used for calling and sending and receiving SMS and other messages. According to […]
Criminals have managed to hijack 1.1 million accounts at 17 companies by means of reused passwords, says New York Attorney General Letitia James. According to James, the accounts could be taken over through credential stuffing attacks. Credential stuffing uses previously leaked email addresses and passwords to gain automated access to accounts. Attackers check whether they […]
The personal and salary data of 637,000 Albanians, about a quarter of the population, has been stolen and leaked on the internet. It concerns names, identity card and passport numbers, telephone numbers, salary, position and employer that are contained in two Excel documents that are shared via WhatsApp, according to the Albanian Exit News. The […]
A hacker released almost 500,000 Fortinet VPN login names and passwords that were allegedly scraped from exploitable devices last summer. While many appliances with the exploited Fortinet vulnerability have since been patched, many VPN credentials seem still to be valid. With these VPN credentials access to a network can be gained to perform data exfiltration, install […]
According to the CEO the bad actor leveraged their knowledge of technical systems, along with specialized tools and capabilities, to gain access to our testing environments and then used brute force attacks and other methods to make their way into other IT servers that included customer data.”Compromised information includes customer names, addresses, Social Security numbers […]
Power Apps, a low-code development platform for creating business-intelligence tools, were susceptible to a default configuration that made their data sets findable by search engines or anyone with knowledge of the web address. 38 million records pf 47 organizations— containing names, dates of birth, addresses and, in some cases, Social Security numbers were exposed.
Cyberinsurance giant AXA said that it would no longer be writing policies to cover ransomware payments. Now AXA in Thailand, Malaysia, Hong Kong, and the Phillippines have reportedly been hit… by a ransomware attack. The ransomware gang posted on its website over the weekend that it had stolen 3 terabytes worth of data, including: customers’ […]
Researchers reported on Tuesday that Amazon Web Services System Manager (SSM) misconfigurations led to the potential exposure of more than 5 million documents with personally identifiable information and credit card transactions on more than 3,000 SSM documents.