A Credential Stuffing Attack Affected PayPal Accounts

Credential Stuffing

PayPal recently suffered a large-scale credential stuffing attack with thousands of accounts compromised with credential stuffing, a type of cyber attack which uses stolen usernames and passwords taken from other data breaches to gain access to online accounts. This article will explain Credential Stuffing and how PayPal accounts were affected by it. Read: T-Mobile suffers […]

University of Duisburg-Essen in Germany is the new victim of Vice Society

University of Duisburg-Essen

In November last year, the University of Duisburg-Essen (UDE) in Germany suffered a system breach. This breach was so great that it forced the institution to rebuild its IT infrastructure again, which is still ongoing today. After almost two months, the Vice Society group claims its authorship, publishing the stolen documents on its Tor site. […]

Chrome is remotely controlled through malicious extensions

malicious extensions

Google’s browser, Chrome, and Chromium-based browsers like Edge, are vulnerable to malicious extensions due to a bonnet called “Cloud9.” Through this method, they manage to steal online accounts, log keystrokes, inject ads and malicious JS code, and enlist the victim’s browser in DDoS attacks. To know the details, continue reading the following lines. Read: Dropbox […]

Dropbox suffered a security breach through phishing

DropBox

The Dropbox storage service confirmed that it suffered a security breach in mid-October, all due to a phishing attack that targeted one of its employees. Thanks to these credentials, the attackers had access to the GitHub repositories and stole several pieces of information. Find out the details in the following lines. Read: Passkeys, the future […]

Los Angeles school district was the victim of a ransomware attack

Los Angeles school district

The second largest school district in the United States fell victim to a ransomware attack this past weekend. Los Angeles school district took immediate action, going as far as shutting down all of its computer systems. However, this attack is just one of many that have taken place in the country, specifically targeting educational institutions […]

Symbiote is the new malware on Linux

Symbiote

Linux is an operating system that, for a long time, had the reputation of being considered free of viruses and malware. But in recent years, cybercriminals have demonstrated their capabilities, gaining access and even attacking it with malware and ransomware. However, this time they reached a new level of attack with Symbiote, a malware that, […]

T-Mobile confirms to have been a Lapsus$’s victim

T-Mobile

Although it had been believed that the Lapsus$ extortion group had retired for a vacation, added to the news that several of its members were arrested, including the alleged leader, it turns out that between March and April they have been very active with other attacks on important companies. In this case, T-Mobile, dedicated to […]

Mailchimp faces a breach to launch phishing scams

Mailchimp

The email marketing firm Mailchimp was compromised at the end of March due to an access to its database. All this as part of a very well-planned plan by hackers to launch a phishing campaign, in which mining cryptocurrencies was the key. In this access, not only were the systems of the largest email marketing […]

Microsoft is Lapsus$’s latest victim

LAPSUS$

This time, the extortion group Lapsus$ went against Microsoft, obtaining around 40GB of information. Both parties confirmed and announced the attack, increasing this group’s danger, though there are not many details about them. This adds to the series of attacks on important profiles in the world. Learn more about this new security breach in the […]

Three WordPress Plugins are Vulnerable

WordPress plugins

WordPress is one of the main hosting services for websites that exist. To offer the best sites, a series of plugins are used that help different functionalities depending on the nature of it. But in recent days, researchers found a security flaw in 3 of these plugins that affects the security of users who rely […]