PayPal has sent out data breach notifications to thousands of users whose accounts were accessed through credential stuffing attacks, which exposed some personal data. Credential stuffing attacks are automated attempts by hackers to access an account by using username and password pairs sourced from data leaks on various websites. The attack targets users who use […]
Blog Grid
Security experts have warned that email addresses linked to over 200 million Twitter profiles are being circulated on underground hacker forums, which could potentially expose the identities of anonymous users and make it easier for cybercriminals to take over Twitter accounts or victims’ accounts on other websites. The leaked data includes users’ names, account handles, […]
Yesterday, an anonymous Twitter user shared a set of 10,000 API keys reportedly obtained from the cryptocurrency trading platform 3Commas. These keys are used by 3Commas bots to interact with cryptocurrency trading exchanges and perform automated investment and trading actions on behalf of customers. The Twitter user claimed to hold 100,000 API keys and plans […]
H-Hotels, a prominent hospitality company with 60 hotels in Germany, Austria, and Switzerland, experienced a cyberattack on December 11th, 2022. Play ransomware has claimed responsibility for the attack, which caused communication outages for the hotel chain, affecting the ability of hotel staff to receive or answer customer requests sent via email. Although guest bookings were […]
Colombian healthcare provider Keralty and its subsidiaries, EPS Sanitas and Colsanitas, have been hit by a ransomware attack. The incident disrupted the company’s IT operations, websites, and scheduling of medical appointments. Although Keralty initially described the disruption as technical issues, it later confirmed that the companies’ computer servers had been targeted by cybercriminals, causing technical […]
Cybersecurity firm ESET has uncovered a previously unknown backdoor called Dolphin, which has been used by North Korean hackers in highly targeted operations for more than a year. The backdoor was employed by the APT 37 group (also known as Reaper, Red Eyes, Erebus, ScarCruft) against specific targets aligned with North Korean interests. ESET’s researchers […]