Remove Accountability Remove Cyber Attacks Remove Information Security Remove Passwords
article thumbnail

Ukraine warns of attacks aimed at taking over Telegram accounts

Security Affairs

Ukraine’s technical security and intelligence service warns of threat actors targeting aimed at gaining access to users’ Telegram accounts. State Service of Special Communication and Information Protection (SSSCIP) of Ukraine spotted a new wave of cyber attacks aimed at gaining access to users’ Telegram accounts.

article thumbnail

MongoDB investigates a cyberattack, customer data exposed

Security Affairs

MongoDB on Saturday announced it is investigating a cyberattack that exposed customer account metadata and contact information. MongoDB on Saturday disclosed it is investigating a cyber attack against certain corporate systems. We detected suspicious activity on Wednesday (Dec.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Resecurity warns about cyber-attacks on data center service providers

Security Affairs

After communication with CNCERT around January 24, 2023, the affected organization forced customers to change their passwords. Likely, the reason behind this step was in an unexpected, forced password change by the data centers organization dating back to the 1st episode. The 3rd episode of the campaign was related to a U.S.

article thumbnail

GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia’s invasion of Ukraine

The Last Watchdog

Cyber attack targets. Russia isn’t the only cyber actor increasing its pace of cyber operations during this time. Segment or isolate portions of your network that are critical to your business, process, or store sensitive information. Accounting for humans.

article thumbnail

Okta warns of unprecedented scale in credential stuffing attacks on online services

Security Affairs

A credential stuffing attack is a type of cyber attack where hackers use large sets of username and password combinations, typically obtained from previous data breaches, phishing campaigns, or info-stealer infections, to gain unauthorized access to user accounts on various online services.

VPN 110
article thumbnail

FBI: Compromised US academic credentials available on various cybercrime forums

Security Affairs

This exposure of sensitive credential and network access information, especially privileged user accounts, could lead to subsequent cyber attacks against individual users or affiliated organizations.” Crooks obtain the information by conducting spear-phishing and ransomware attacks, or other means.

article thumbnail

Data Breach at Britain JD Sports leaks 10 million customers

CyberSecurity Insiders

JD Sports, Britain’s online retailer of branded sportswear, has reportedly become a victim of a cyber attack that leaked information of over 10 million customers. JD Sports has assured that hackers accessed no passwords related to their accounts and issued an apology for failing to protect the customer info.