article thumbnail

8Base ransomware operators use a new variant of the Phobos ransomware

Security Affairs

The group has been active since March 2022, it focused on small and medium-size businesses in multiple industries, including finance, manufacturing, business services, and IT. Security experts attributed 67 attacks to the group in May 2023, most of the victims are in the U.S. and Brazil. ” reads the report published by Talos.”Once

article thumbnail

Volvo retailer leaks sensitive files

Security Affairs

The Brazilian retail arm of car manufacturing giant Volvo leaked sensitive files, putting its clientele in the vast South American country in peril. Other research by Cybernews has revealed that BMW , a German luxury vehicle manufacturer producing around 2.5 The issue causing the leak has been fixed.

Retail 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A million at risk from user data leak at Korean beauty platform PowderRoom

Security Affairs

Backed by beauty-product manufacturers, PowderRoom has hundreds of thousands of followers on social media, and its Android app has been downloaded more than 100,000 times on Google Play. Established in 2003, PowderRoom is a South Korean beauty content platform connecting 3.5 The dataset included over a million email addresses.

Risk 94
article thumbnail

The Week in Cyber Security and Data Privacy: 20 – 26 November 2023

IT Governance

Most of the leaked data is company information and emails, but includes employee names, phone numbers, employment contract numbers and emails, as well as email attachments, metadata and other sensitive information that could be exploited in supply chain attacks. The dashboard was first spotted in June 2021.

article thumbnail

SBOMs: Securing the Software Supply Chain

eSecurity Planet

A software bill of materials (SBOM) is a machine-readable inventory of components, dependencies, metadata, and the hierarchical relationship for a given software product. Threat intelligence can help scan IT environments for the latest malware, but that’s just one security layer against zero-day threats.

Security 130
article thumbnail

Trojanized Comm100 Live Chat app installer distributed a JavaScript backdoor

Security Affairs

The malicious installer was used to infect organizations in multiple sectors, including the industrial, healthcare, technology, manufacturing, insurance and telecommunications sectors in North America and Europe. The attackers used the Microsoft Metadata Merge Utility binary to load a the MidlrtMd DLL. 156 at the time of the incident.”

Metadata 114
article thumbnail

Enterprise SIEMs Miss 76 Percent of MITRE ATT&CK Techniques

eSecurity Planet

Security information and event management (SIEM) systems only have detections for 24 percent of the 196 techniques in MITRE ATT&CK v13, according to a new report. “This implies that adversaries can execute around 150 different techniques that will be undetected by the SIEM,” says the CardinalOps report.

Metadata 108