KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
Twitter Images Can Be Abused To Hide ZIP, MP3 Files — Here’s How Yesterday, a researcher disclosed a method of hiding up to three MB of data inside a Twitter image. In his demonstration, the researcher showed both MP3 audio files and ZIP archives contained within the PNG images hosted on Twitter. Although the art of hiding non-image data in images
Hacker Leaks Payment Data From Defunct WeLeakInfo Breach Site The now-defunct WeLeakInfo data breach site has suffered its own data breach after a threat actor leaked the service’s payment information and customer info. WeLeakInfo was a website that offered paid subscriptions for searchable access to a database containing 12.5 billion user records stolen during data
New Botnet Targets Network Security Devices With Critical Exploits Authors of a new botnet are targeting connected devices affected by critical-level vulnerabilities, some of them impacting network security devices. The attacks are still active and use publicly available exploits, sometimes only a few hours after being published. Exploit code for at least ten vulnerabilities has
Mimecast: SolarWinds Hackers Stole Some Of Our Source Code Email security company Mimecast has confirmed today that the state-sponsored SolarWinds hackers who breached its network earlier this year downloaded source code out of a limited number of repositories. To breach Mimecast’s network, the attackers used the Sunburst backdoor, a malware distributed by the SolarWinds hackers to roughly