The Breach News

CISA Issues Urgent Warning on Exploited D-Link Router Vulnerabilities – Update Your Devices Immediately

Cybersecurity Alert: Vulnerabilities Detected in D-Link Routers On May 16, 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced the inclusion of two serious security vulnerabilities affecting certain models of D-Link routers in its Known Exploited Vulnerabilities (KEV) catalog. This action was prompted by evidence suggesting that these weaknesses…

Read MoreCISA Issues Urgent Warning on Exploited D-Link Router Vulnerabilities – Update Your Devices Immediately

DDoS 2.0: IoT Triggers Fresh DDoS Warnings

The Rise of IoT-Driven DDoS Attacks: A Growing Threat to Security The Internet of Things (IoT) is significantly reshaping operational efficiencies across various industries, including healthcare and logistics. However, its rapid proliferation is accompanied by escalating security risks, particularly in the form of IoT-driven Distributed Denial-of-Service (DDoS) attacks. This phenomenon…

Read MoreDDoS 2.0: IoT Triggers Fresh DDoS Warnings

Okta Issues Alarm Over Unprecedented Rise in Proxy-Driven Credential Stuffing Attacks

Surge in Credential Stuffing Attacks Raises Alarm for Online Services In a recent advisory, Okta, a prominent identity and access management (IAM) service provider, has reported a significant increase in the frequency and scale of credential stuffing attacks targeting online services. These aggressive attempts are reportedly leveraging easily accessible residential…

Read MoreOkta Issues Alarm Over Unprecedented Rise in Proxy-Driven Credential Stuffing Attacks

Hackers Claim to Have Access to Nokia’s Internal Data, Offering it for Sale at $20,000

Data Breach Claims Allege Unauthorized Access to Nokia’s Internal Systems Hackers have reportedly infiltrated Nokia, one of the global leaders in telecommunications, by exploiting vulnerabilities in a third-party contractor’s systems. This breach has led to the alleged theft of critical internal data, including SSH keys, source code, and internal credentials,…

Read MoreHackers Claim to Have Access to Nokia’s Internal Data, Offering it for Sale at $20,000

Protecting Your Commits Against Known CVEs Using GitGuardian SCA and Git Hooks

Understanding Open-Source Vulnerability Risks: A Guide for Developers In today’s software development landscape, the aspiration for creating robust and secure applications remains a top priority for developers. However, the increasing reliance on open-source components complicates this goal. Recent studies reveal that a staggering 96% of software relies on some form…

Read MoreProtecting Your Commits Against Known CVEs Using GitGuardian SCA and Git Hooks

Mysterious ‘Sandman’ Threat Actor Strikes Telecom Providers on Three Continents

In a recent development within the cybersecurity landscape, a new and previously unidentified threat actor known as Sandman has emerged, launching a series of cyber attacks against telecommunications providers across the Middle East, Western Europe, and the South Asian region. Analysts have noted that the tactics employed during these intrusions…

Read MoreMysterious ‘Sandman’ Threat Actor Strikes Telecom Providers on Three Continents