Tag Multi-Factor Authentication

Citrix Data Breach: Iranian Hackers Exfiltrate 6TB of Confidential Information

Massive Data Breach Exposed at Citrix, Targeting U.S. Government and Corporate Networks In a concerning revelation last weekend, Citrix, a prominent provider of enterprise software that serves the U.S. military, the FBI, and various governmental agencies, announced a significant data breach of its internal network. The intrusion, attributed to “international…

Read MoreCitrix Data Breach: Iranian Hackers Exfiltrate 6TB of Confidential Information

Minor Breaches, Major Consequences: The Legal Ramifications of Small Cyber Incidents | Constangy, Brooks, Smith & Prophete, LLP

Cyberattacks against high-profile corporations often dominate headlines, casting shadows over more subtle incidents that may not receive as much attention. However, breaches affecting smaller organizations are increasingly drawing legal scrutiny and regulatory attention. Recent trends indicate that no data breach is too insignificant to evade serious legal repercussions, particularly in…

Read MoreMinor Breaches, Major Consequences: The Legal Ramifications of Small Cyber Incidents | Constangy, Brooks, Smith & Prophete, LLP

Hackers Targeting Severe Zero-Day Vulnerability in SonicWall SMA 100 Devices

SonicWall has issued a critical alert regarding active exploitation efforts targeting a zero-day vulnerability in its Secure Mobile Access (SMA) 100 series devices. This vulnerability affects both physical and virtual SMA 100 10.x devices, covering models such as the SMA 200, 210, 400, 410, and 500v. This issue came to…

Read MoreHackers Targeting Severe Zero-Day Vulnerability in SonicWall SMA 100 Devices

SolarWinds Hackers Exfiltrated Source Code for Microsoft Azure, Exchange, and Intune

Microsoft Concludes Investigation into SolarWinds Hack: Key Findings Revealed On Thursday, Microsoft announced the completion of its investigation into the SolarWinds cyberattack. The company confirmed that while the attackers were indeed able to exfiltrate source code from its repositories, there is no evidence that they leveraged this breach to access…

Read MoreSolarWinds Hackers Exfiltrated Source Code for Microsoft Azure, Exchange, and Intune

English-Language Cybercrime Hub “The COM” Coordinates Diverse Global Attacks

Over the last decade, the English-speaking cybercriminal landscape, known as “The COM,” has grown from a niche group dedicated to trading rare social media usernames into a complex, service-driven underground economy orchestrating a wide array of global cyberattacks. Foundational communities like Dark0de and RaidForums have played a critical role in…

Read MoreEnglish-Language Cybercrime Hub “The COM” Coordinates Diverse Global Attacks

Hyundai AutoEver Data Breach: Important Steps to Check Your Credit Score and Protect Yourself

Hyundai AutoEver America, LLC (HAEA), a key IT services provider for the Hyundai Motor Group, has confirmed a data breach that occurred in early 2025, potentially affecting personal information related to approximately 2.7 million vehicles and their owners. In response, the company is offering two years of complimentary credit monitoring…

Read MoreHyundai AutoEver Data Breach: Important Steps to Check Your Credit Score and Protect Yourself

Unveiling AI Secrets Hidden in Encrypted Shadows

Recent developments in the realm of artificial intelligence have brought to light a serious vulnerability affecting encrypted communications. Dubbed ‘Whisper Leak,’ this sophisticated side-channel attack, disclosed by Microsoft researchers, has the potential to glean sensitive information from encrypted traffic directed at large language models (LLMs). As outlined in a recent…

Read MoreUnveiling AI Secrets Hidden in Encrypted Shadows