Tag: theft
-
Rekt: 1Inch – Rekt
Source URL: https://www.rekt.news/1inch-rekt Source: Rekt Title: 1Inch – Rekt Feedly Summary: One hacker transformed 1inch resolver contracts into a $5 million ATM through an integer underflow exploit – all with a negative 512 value. Attacker pocketed $450K as a “bounty" for exposing two years of an undetected vulnerability. AI Summary and Description: Yes Summary: This…
-
Microsoft Security Blog: Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-impersonates-booking-com-delivers-a-suite-of-credential-stealing-malware/ Source: Microsoft Security Blog Title: Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware Feedly Summary: Starting in December 2024, leading up to some of the busiest travel days, Microsoft Threat Intelligence identified a phishing campaign that impersonates online travel agency Booking.com and targets organizations in the hospitality industry. The…
-
The Register: That ‘angry guest’ email from Booking.com? It’s a scam, not a 1-star review
Source URL: https://www.theregister.com/2025/03/13/bookingdotcom_phishing_campaign/ Source: The Register Title: That ‘angry guest’ email from Booking.com? It’s a scam, not a 1-star review Feedly Summary: Phishers check in, your credentials check out, Microsoft warns An ongoing phishing campaign disguised as a Booking.com email casts keystroke and credential-stealing malware into hospitality employees’ inboxes for financial fraud and theft, according…
-
Rekt: Not So Safe
Source URL: https://www.rekt.news/not-so-safe Source: Rekt Title: Not So Safe Feedly Summary: North Korea’s Lazarus Group stole $1.4B from Bybit’s signers by exploiting a simple vulnerability in Safe’s system. A single yaml.load execution bypassed high-end security, turning a supposedly impenetrable system into one of the industry’s biggest disasters. AI Summary and Description: Yes Summary: The text…
-
Hacker News: ‘Uber for nurses’ exposes 86K+ medical records, PII via open S3 bucket
Source URL: https://www.websiteplanet.com/news/eshyft-report-breach/ Source: Hacker News Title: ‘Uber for nurses’ exposes 86K+ medical records, PII via open S3 bucket Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant cybersecurity incident involving the exposure of a non-password-protected database belonging to ESHYFT, a healthtech company. The incident raises critical issues about privacy…
-
The Register: ‘Uber for nurses’ exposes 86k+ medical records, PII in open S3 bucket for months
Source URL: https://www.theregister.com/2025/03/11/uber_for_nurses_exposes_86k/ Source: The Register Title: ‘Uber for nurses’ exposes 86k+ medical records, PII in open S3 bucket for months Feedly Summary: Non-password-protected, unencrypted 108GB database…what could possibly go wrong Exclusive More than 86,000 records containing nurses’ medical records, facial images, ID documents and more sensitive info linked to health tech company ESHYFT was…
-
Threat Research Archives – Unit 42: RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector
Source URL: https://unit42.paloaltonetworks.com/macos-malware-targets-crypto-sector/ Source: Threat Research Archives – Unit 42 Title: RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector Feedly Summary: AI Summary and Description: Yes Summary: The text details a significant malware campaign targeting macOS systems, notably linked to North Korean nation-state actors employing advanced…
-
Threat Research Archives – Unit 42: Uncovering .NET Malware Obfuscated by Encryption and Virtualization
Source URL: https://unit42.paloaltonetworks.com/malware-obfuscation-techniques/ Source: Threat Research Archives – Unit 42 Title: Uncovering .NET Malware Obfuscated by Encryption and Virtualization Feedly Summary: AI Summary and Description: Yes **Summary:** This article provides a detailed examination of sophisticated obfuscation techniques utilized by various malware families, specifically focusing on how these methods enhance the ability of malware to evade…
-
Slashdot: Feds Link $150M Cyberheist To 2022 LastPass Hacks
Source URL: https://it.slashdot.org/story/25/03/10/1532234/feds-link-150m-cyberheist-to-2022-lastpass-hacks?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Feds Link $150M Cyberheist To 2022 LastPass Hacks Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the findings of cybersecurity researchers that link a series of significant cyberheists to vulnerabilities in LastPass, a password manager. It highlights a specific case of a $150 million cryptocurrency heist…
-
The Register: Rhysida pwns two US healthcare orgs, extracts over 300K patients’ data
Source URL: https://www.theregister.com/2025/03/10/rhysida_healthcare/ Source: The Register Title: Rhysida pwns two US healthcare orgs, extracts over 300K patients’ data Feedly Summary: Terabytes of sensitive info remain available for download Break-ins to systems hosting the data of two US healthcare organizations led to thieves making off with the personal and medical data of more than 300,000 patients.……