Global technology firm Intel Corporation (Intel) confirmed a data leak after 20GB of its confidential proprietary data was made available online. Not long after, Intel also published the details of a critical-severity vulnerability affecting a range of its products, including motherboards and server systems. An anonymous hacker claimed to have obtained the data, from an insecure Akamai server; however, Intel says the leak originated with its Resource and Design Center and that someone with legitimate access released the data. It is likely that more confidential data belonging to Intel will be leaked in the short-term future (one to three months) and that threat actors will capitalize on future vulnerabilities in Intel products to gain access to more sensitive data.
Remote workers have been falling victim to a voice-phishing (vishing) campaign that involves phone calls an...
Most Recent Flipbooks
A vulnerability in Kaseya’s virtual system/server administrator (VSA) software has been exploited to deliver the “REvil” ransomware to multiple managed service providers.
The 14th Five Year Plan (FYP) adopted by the People’s Republic of China (PRC) in March 2021 has laid out key areas of focus for the country that are likely to prompt nation-state cyber espionage.
Several Clop members were arrested in association with money laundering, and the officials seized infrastructure the group has used in ransomware attacks globally.
A newly identified advanced persistent threat (APT) group, “Agrius”, has been exposed as the perpetrator of destructive attacks against Israeli organizations since late 2020.
The notorious Russia-based ransomware group “REvil” (aka Sodinokibi) has been blamed for the latest high-profile ransomware attack, on the world’s largest meat supplier.
The latest work of the notorious Russian state-associated “NOBELIUM” threat group is an email phishing campaign against multiple countries and sectors.
US President Joe Biden recently signed an executive order (EO) aimed at strengthening network security for US federal government departments, and agencies and contractors working with them.
A “Conti” ransomware attack on Ireland’s healthcare system, the Health Service Executive (HSE), significantly delayed the delivery of medical laboratory results and affected many outpatient services.
Colonial Pipeline Company fell victim to a cyber attack that resulted in 5,500 miles of its US fuel pipelines being shut down, causing public distress and fears of fuel shortages.
Security researchers discovered two unrelated cyber-threat campaigns targeting Microsoft SharePoint.
The FBI made digital copies of malicious web-shells before removing them from hundreds of vulnerable servers in the US, without any warning to affected organizations.
A cyber-espionage campaign was found targeting the Vietnamese military and government, as well as other sectors and some entities in Thailand and Central Asia.
A user of the cybercriminal forum RaidForums has offered 533 million records of Facebook user data for only a few US dollars.
Insurance provider CNA Financial has announced it was targeted in a cyber attack, later confirmed as involving the newly identified “Phoenix Cryptolocker” ransomware.
The new Internet of Things (IoT) botnet ZHtrap has been turning devices it has infected into honeypots, in a novel technique that highlights yet another risk presented by exposed IoT devices.
Four zero-day vulnerabilities in Microsoft Exchange Servers have been linked to more than 30,000 cyber attacks taking place in the week following their discovery.