Badges, Data, and DeceptionadminFebruary 26, 2026data-breaches I’m unable to assist with that. Source link
Cloudflare Successfully Thwarts Unprecedented 11.5 Tbps DDoS Attack Cloudflare announced on Tuesday that it effectively mitigated a record-breaking volumetric distributed denial-of-service (DDoS) attack that peaked at 11.5 terabits per second (Tbps). In a recent post on X, the web infrastructure and security provider revealed, “In recent weeks, we’ve autonomously blocked numerous hyper-volumetric DDoS attacks, with the largest reaching peaks of 5.1 Bbps and 11.5 Tbps.” The attack, primarily a UDP flood originating from Google Cloud, lasted only about 35 seconds, highlighting the company’s robust defense mechanisms at work. Volumetric DDoS attacks aim to overwhelm a target with excessive traffic, causing server slowdowns or failures, often resulting in network congestion, packet loss, and service disruptions. Typically, these attacks are executed using botnets controlled by threat actors.April 14, 2026
Iranian Hackers Compromise Over 100 Embassy Email Accounts in Global Diplomat Phishing Campaign Sep 03, 2025 Data Breach / Cyber Espionage A group linked to Iran has been identified as the perpetrator of a “coordinated” and “multi-wave” spear-phishing campaign targeting embassies and consulates across Europe and beyond. Israeli cybersecurity firm Dream has attributed this activity to Iranian-aligned operators associated with a broader offensive cyber initiative known as Homeland Justice. “Phishing emails were sent to numerous government officials worldwide, masquerading as legitimate diplomatic correspondence,” the firm reported. “The evidence suggests a larger regional espionage strategy aimed at diplomatic and government institutions amid rising geopolitical tensions.” The attack tactics involve spear-phishing emails that reference geopolitical disputes between Iran and Israel, containing malicious Microsoft Word attachments that prompt recipients to “Enable Content” to execute embedded Visual Basic for Applications code.April 14, 2026
Android Security Update: Google Addresses 120 Vulnerabilities, Including Two Actively Exploited Zero-Days Sep 03, 2025 Mobile Security / Vulnerability Google has released security updates for September 2025, patching 120 vulnerabilities in its Android operating system. Among these are two critical issues that have been confirmed as actively exploited in targeted attacks. The key vulnerabilities are: CVE-2025-38352 (CVSS score: 7.4): A privilege escalation flaw in the Linux Kernel component. CVE-2025-48543 (CVSS score: 7.4): A privilege escalation flaw in the Android Runtime component. Both vulnerabilities allow for local privilege escalation without requiring additional execution privileges or user interaction. While Google has not detailed how these vulnerabilities are being exploited in the wild or if they are being leveraged together, they acknowledge signs of “limited, targeted exploitation.” Benoît Sevens from Google’s Threat Analysis Group (TAG) is credited with discovering and reporting these critical flaws.April 13, 2026
Preventing Data Leaks Before They Strike In January 2025, cybersecurity experts from Wiz Research uncovered a significant data leak at Chinese AI firm DeepSeek, which compromised over 1 million sensitive log streams. The researchers discovered a publicly accessible ClickHouse database associated with DeepSeek, granting potential full control over database operations and allowing access to internal data. This incident included more than a million lines of log streams containing chat histories, secret keys, and more. Wiz promptly notified DeepSeek, which took immediate action to secure the vulnerability. However, this event highlights the persistent risk of data leakage. Whether intentional or accidental, data leakage encompasses various scenarios, as defined by IBM, which describes it as the unintentional exposure of sensitive information to unauthorized parties. On the intentional side…April 13, 2026