Category: Kamban
A data breach at an unnamed French hospital exposed the medical records of 750,000 patients after a threat actor gained access to its electronic patient record system. A threat actor using the nickname ‘nears’ (previously near2tlg) claimed to have attacked multiple healthcare facilities in France, alleging that they have access to the patient records of over…
Read MoreMITRE has shared this year’s top 25 list of the most common and dangerous software weaknesses behind more than 31,000 vulnerabilities disclosed between June 2023 and June 2024. Software weaknesses refer to flaws, bugs, vulnerabilities, and errors found in software’s code, architecture, implementation, or design. Attackers can exploit them to breach systems where the vulnerable…
Read MoreFinastra has confirmed it warned customers of a cybersecurity incident after a threat actor began selling allegedly stolen data on a hacking forum. Finastra is a financial software company serving over 8,000 institutions across 130 countries, including 45 of the world’s top 50 banks and credit unions. The company employs 12,000 people, and last year,…
Read MoreThe U.S. Justice Department has charged five suspects believed to be part of the financially motivated Scattered Spider cybercrime gang with conspiracy to commit wire fraud. Between September 2021 and April 2023, they were able to steal over $11 million from cryptocurrency wallets using victims’ credentials stolen in SMS phishing attacks targeting dozens of targets,…
Read MoreFive local privilege escalation (LPE) vulnerabilities have been discovered in the needrestart utility used by Ubuntu Linux, which was introduced over 10 years ago in version 21.04. The flaws were discovered by Qualys and are tracked as CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003. They were introduced in needrestart version 0.8, released in April 2014, and…
Read More‘This settlement demonstrates the department’s commitment to hold accountable those who overcharge the government through collusion or other unlawful conduct,’ said Principal Deputy Assistant Attorney General Brian M. Boynton, head of the Justice Department’s Civil Division, in a statement. Over a period of four years Dell Technologies knowingly submitted high bids on US Army hardware…
Read MoreCybercriminals have devised a novel method to cash out from stolen credit card details linked to mobile payment systems such as Apple Pay and Google Pay, dubbed ‘Ghost Tap,’ which relays NFC card data to money mules worldwide. The tactic builds upon the methods previously deployed by mobile malware like NGate, documented by ESET in…
Read MoreMicrosoft has confirmed a new issue affecting Windows 24H2 systems and causing game audio to unexpectedly increase to full volume when using USB DAC sound systems. As the company explained in a support document published on Tuesday, this known issue occurs on Windows 24H2 gaming systems where affected gamers use a Creative Sound BlasterX G6 USB…
Read MoreFord is investigating allegations that it suffered a data breach after a threat actor claimed to leak 44,000 customer records on a hacking forum. The leak was announced on Sunday by threat actor ‘EnergyWeaponUser,’ also implicating the hacker ‘IntelBroker,’ who supposedly took part in the November 2024 breach. The threat actors leaked on BreachForums 44,000…
Read MoreAmazon, Amazon Music, and Audible, an Amazon-owned online audiobook and podcast service, have been flooded with bogus listings that push dubious “forex trading” sites, Telegram channels, and suspicious links claiming to offer pirated software. Amazon listings promote illicit sites Yesterday, BleepingComputer reported how threat actors were abusing Spotify playlists and podcasts to promote pirated software and game…
Read MoreRecent Posts
- Cyberattack at French hospital exposes health data of 750,000 patients
- Nvidia: ‘We Are Racing To Scale Supply To Meet Incredible’ Blackwell Demand
- MITRE shares 2024’s top 25 most dangerous software weaknesses
- The 10 Coolest Cloud Computing Startup Companies Of 2024
- Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution