#filefix

[ follow ]
#data-breach
Privacy professionals
fromSilicon Canals
23 hours ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy professionals
fromSilicon Canals
23 hours ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
fromTechzine Global
1 day ago

IGEL OS can now run AI models locally on endpoints

AI Armor provides dynamic runtime security and relies on a central policy engine in the Universal Management Suite (UMS) to meet compliance requirements, ensuring that organizations can manage their security effectively.
DevOps
Privacy technologies
fromWIRED
3 days ago

This App Makes Even the Sketchiest PDF or Word Doc Safe to Open

Dangerzone is a free tool that safely opens potentially harmful documents by converting them into secure image-based PDFs.
#ai
#cybersecurity
Information security
fromZDNET
1 week ago

Cyberattackers are moving faster to break your network - how to fight back

Cybercriminals are leveraging AI for faster attacks, but human error remains the primary vulnerability in enterprise security.
fromSecurityWeek
1 month ago
Information security

How Pirated Software Turns Helpful Employees Into Malware Delivery Agents

Free pirated software often contains malware that can compromise corporate security, steal credentials, and enable ransomware attacks on company endpoints.
fromArs Technica
2 months ago
Information security

Hacker who stole 120,000 bitcoins wants a second chance-and a security job

Former black hat hacker Lichtenstein reformed in prison and seeks to use adversary skills in cybersecurity while working to regain community trust.
Healthcare
fromSecurityWeek
4 days ago

Healthcare IT Platform CareCloud Probing Potential Data Breach

CareCloud experienced a cybersecurity incident that may have compromised patient information, but the impact is believed to be limited and manageable.
Information security
fromZDNET
1 week ago

Cyberattackers are moving faster to break your network - how to fight back

Cybercriminals are leveraging AI for faster attacks, but human error remains the primary vulnerability in enterprise security.
Information security
fromSecuritymagazine
2 weeks ago

Document Protection: Why Hybrid Storage Is the Future of Security

A hybrid approach combining digital storage for frequently accessed documents and physical storage for sensitive historical information provides optimal security and efficiency.
fromComputerworld
15 hours ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Gadgets
fromZDNET
1 week ago

The Flipper One looks like a serious hacking tool, and I can't wait to try it - here's why

The Flipper Zero is an educational digital tool for hacking and exploring wireless technologies.
#malware
Information security
fromThe Hacker News
4 days ago

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

DeepLoad malware uses ClickFix tactics and AI-assisted obfuscation to evade detection and steal credentials immediately.
fromTheregister
2 months ago
Information security

Tech support detective solved crime by checking the carpark

Malware and an unauthorized local account enabled a night-shift employee to misuse a manager's PC, causing severe slowdowns and personal browsing under the manager's credentials.
Information security
fromSecurityWeek
2 days ago

New DeepLoad Malware Dropped in ClickFix Attacks

DeepLoad malware steals credentials and intercepts browser interactions, utilizing ClickFix for distribution and evading detection through sophisticated techniques.
Information security
fromThe Hacker News
4 days ago

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

DeepLoad malware uses ClickFix tactics and AI-assisted obfuscation to evade detection and steal credentials immediately.
Web development
fromTheregister
2 weeks ago

Brilliant backups landed web developer in big trouble

A website migration oversight caused a two-year disconnect where office staff viewed outdated content due to hardcoded DNS settings, while the client only discovered the issue when accessing the site from the office.
Privacy technologies
fromZDNET
2 weeks ago

My personal data has been leaked several times - this service helped clean it all up

Data removal services like DeleteMe help protect personal information from being sold online after data breaches.
DevOps
fromInfoQ
1 week ago

Panel: Security Against Modern Threats

Modern threats to software supply chains require resilience by design, integrating security into engineering workflows and empowering developers with the right tools.
Business intelligence
fromComputerWeekly.com
2 weeks ago

AI tools offer 'near-real-time' analysis of data from seized mobile phones and computers | Computer Weekly

Cellebrite's AI-powered Guardian Investigate platform enables police to rapidly analyze mobile device data, discover connections between datasets, track phone locations over time, and construct event timelines for major crime investigations.
fromTheregister
3 weeks ago

Sysadmin fixed blustering Blackbeard's PC in seconds

He stormed up to my desk, leaned over my partition, and began his rant before I could so much as say hello. He screamed about the rubbish laptops and IT systems we had, nothing ever worked, all the usual stuff. The user's rant ended with a thundered 'Just FIX IT!'
Digital life
#phishing
Privacy professionals
fromSecurityWeek
1 week ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Privacy professionals
fromSecurityWeek
1 week ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
fromTheregister
3 weeks ago

Bug that wiped customer data saved the day - and a contract

I looked at the config and noticed the customer did not have a default route set. He wasn't sure if that was the problem, so he made some changes he thought might be useful. The router Caleb worked on then rebooted, which he expected. But when it restarted, its previous configuration was gone.
Tech industry
Information security
fromSecurityWeek
3 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Information security
fromTechRepublic
3 days ago

Google Drive Expands AI Ransomware Detection, File Recovery to More Users

Google Drive now features AI-powered ransomware detection and built-in file recovery, significantly improving threat identification and response capabilities.
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Business intelligence
fromEntrepreneur
3 weeks ago

The Game-Changing Tech Saving Companies From Data Disasters

Combining Continuous Data Protection with AI capabilities enables businesses to achieve near-zero Recovery Point Objectives and minimal Recovery Time Objectives, preventing data loss and minimizing downtime.
fromZDNET
1 month ago

Why encrypted backups may fail in an AI-driven ransomware era

What if I told you that everything you know and everything you do to ensure quality backups is no longer viable? In fact, what if I told you that in an era of generative AI, when it comes to backups, we're all pretty much screwed?
Miscellaneous
Information security
fromSecurityWeek
3 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
#system-imaging
fromZDNET
4 weeks ago
Gadgets

How I used CloneZilla to fully back up my PC in case disaster strikes (and it's free)

fromZDNET
3 weeks ago
Software development

How to fully back up your Windows PC for free (even if it's working properly today)

fromZDNET
4 weeks ago
Gadgets

How I used CloneZilla to fully back up my PC in case disaster strikes (and it's free)

fromZDNET
3 weeks ago
Software development

How to fully back up your Windows PC for free (even if it's working properly today)

Information security
fromSecurityWeek
3 days ago

Exploitation of Critical Fortinet FortiClient EMS Flaw Begins

Threat actors exploit a critical SQL injection vulnerability in Fortinet FortiClient EMS, allowing remote code execution without authentication.
Privacy professionals
fromComputerworld
3 weeks ago

Cyber criminals too are working from home... your home

The FBI warns that cybercriminals use residential proxies to mask illegal activities by hijacking IoT devices, smartphones, and routers, threatening both consumers and enterprises, particularly older devices.
Artificial intelligence
fromFuturism
1 month ago

AI Tools Are Supercharging Hackers

AI systems are increasingly weaponized for cybercrime, enabling hackers to exploit vulnerabilities at scale with minimal technical expertise, as demonstrated by recent attacks on Mexican government networks and global firewall systems.
Information security
fromComputerWeekly.com
3 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Information security
fromSecurityWeek
1 week ago

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

macOS users are targeted by a ClickFix campaign delivering a Python-based information stealer through a fake Cloudflare verification page.
Privacy professionals
fromTheregister
1 month ago

Turns out most cybercriminals are old enough to know better

Middle-aged adults aged 35-44 comprise 37% of cybercrime arrests, with 25-44 year-olds accounting for nearly 60% of cases, contradicting the teenage hacker stereotype.
Information security
fromTechzine Global
2 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Mental health
fromSecuritymagazine
1 month ago

Security Insights Delivered Through Podcasts

Security professionals face significant mental-health risks and team burnout, requiring leaders to integrate empathetic practices and psychological safety into security operations.
Information security
fromThe Hacker News
2 weeks ago

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader

LeakNet ransomware group uses ClickFix social engineering via compromised websites for initial access, employing a Deno-based C2 loader to execute payloads in memory, followed by consistent post-exploitation sequences detectable before ransomware deployment.
Information security
fromSecurityWeek
2 weeks ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
Digital life
fromZDNET
1 month ago

Your Windows PC has a secretly useful backup tool - here's how to access it

Windows includes a hidden built-in Backup tool that can back up files and system images to discs, drives, or network locations but is deprecated.
Information security
fromThe Hacker News
2 weeks ago

ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers

Three ClickFix campaigns deliver MacSync, a macOS information stealer, by tricking users into executing terminal commands without requiring exploits.
Tech industry
fromDataBreaches.Net
2 months ago

INC ransomware opsec fail allowed data recovery for 12 US orgs - DataBreaches.Net

Researchers recovered data stolen by the INC ransomware gang from a dozen U.S. organizations after an operational security failure exposed attacker infrastructure.
#clickfix-attack
Information security
fromSecurityWeek
3 weeks ago

ClickFix Attack Uses Windows Terminal to Evade Detection

A new ClickFix attack variant bypasses Run dialog protections by instructing victims to use Windows Terminal for executing malicious PowerShell commands that lead to Lumma Stealer infections.
Information security
fromSecurityWeek
3 weeks ago

ClickFix Attack Uses Windows Terminal to Evade Detection

A new ClickFix attack variant bypasses Run dialog protections by instructing victims to use Windows Terminal for executing malicious PowerShell commands that lead to Lumma Stealer infections.
Gadgets
fromTheregister
2 months ago

Engineer caused data loss by cleaning PCs with welding tools

A structural engineer destroyed five AutoCAD PCs by using oil-laden compressed air and acetone, causing hardware failure and loss of engineering files.
Digital life
fromZDNET
2 months ago

There's a right way to wipe your Windows PC before getting rid of it - here's how I do it

Migrate apps and files, securely erase personal data, and reset the OS before reusing, donating, selling, or recycling an old PC.
Information security
fromThe Hacker News
3 weeks ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
fromZDNET
1 month ago

Is spyware hiding on your phone? How to find out and remove it - fast

Spyware is one of the top threats to your mobile security and can severely impact your handset's performance if you are unlucky enough to become infected. It is a type of malware that typically lands on your iPhone or Android phone through malicious mobile apps or through phishing links, emails, and messages. While appearing to be a legitimate software package or useful utility, spyware will operate quietly in the background to monitor your movements,
Privacy technologies
Information security
fromBusiness Matters
3 weeks ago

More companies paying ransoms as AI-powered cyberattacks intensify

Ransom payment rates surged to 24.3% in 2025 from 14.4% in 2024, driven by AI-enhanced ransomware attacks targeting sensitive data with greater precision and personalization.
Information security
fromSecurityWeek
3 weeks ago

Cloned AI Tool Sites Distribute Malware in 'InstallFix' Campaign

InstallFix campaign uses cloned webpages and malvertising to distribute information-stealing malware through fake installation pages for popular development tools.
fromMail Online
1 month ago

Smartphones are now the most crucial piece of evidence in crime probes

Smartphones are now the most crucial source of digital evidence in solving nearly every criminal investigation, a report has found. Detectives rely on the wealth of information held on the devices in 97 per cent of cases - double the number in which data from laptops was needed. With the devices containing swathes of detailed messages, photos and location data, police chiefs told the Mail the devices had become 'a crime scene in your pocket'.
Digital life
Gadgets
fromZDNET
2 months ago

Skipping this PC maintenance step could cost you - here's the right way to clean your system

Regular physical and software maintenance preserves desktop performance, prevents heat-related damage, and extends hardware lifespan using inexpensive or free tools.
fromZDNET
2 months ago

New laptop? How to wipe your old Windows PC clean before getting rid of it

Before you do any of those things, your top three priorities should be migrating your apps and files to your new device, expunging your personal data from the old PC, and resetting the operating system on the device you plan to recycle, so the new owner can be productive right away. As with all things Windows, there are multiple ways to accomplish these goals.
Gadgets
Information security
fromComputerworld
4 weeks ago

ClickFix attackers using new tactic to evade detection, says Microsoft

Threat actors exploit Windows Terminal to deliver ClickFix phishing attacks, bypassing traditional Run command defenses and security awareness training through malicious PowerShell commands.
Information security
fromTheregister
4 weeks ago

Microsoft spots ClickFix scam spreading Lumma infostealer

A new ClickFix scam variant tricks Windows users into pasting malware commands into Windows Terminal, deploying the Lumma credential-stealing infostealer to compromise browser vaults.
#bitlocker
fromTechCrunch
2 months ago
Privacy professionals

Microsoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: reports | TechCrunch

fromZDNET
2 months ago
Information security

How to keep your PC encryption key safe - from Microsoft and the FBI

fromTechCrunch
2 months ago
Privacy professionals

Microsoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: reports | TechCrunch

fromZDNET
2 months ago
Information security

How to keep your PC encryption key safe - from Microsoft and the FBI

Information security
fromThe Hacker News
1 month ago

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

North Korean threat actor ScarCruft deployed the Ruby Jumper campaign using malware families that abuse Zoho WorkDrive for C2 communications and removable media to compromise air-gapped networks.
Information security
fromTheregister
1 month ago

Double whammy: Steaelite RAT bundles data theft, ransomware

Steaelite, a new remote access trojan sold on cybercrime networks, enables double extortion attacks on Windows machines through ransomware, data theft, credential stealing, and live surveillance controlled via a centralized browser-based dashboard.
fromThe Hacker News
1 month ago

ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories

The average e-crime breakout time - the period between initial access and lateral movement onto another system - dropped to 29 minutes, a 65% increase in speed from 2024. One such intrusion undertaken by Luna Moth targeting a law firm moved from initial access to data exfiltration in four minutes.
Information security
fromDataBreaches.Net
1 month ago

Hospitals at Risk of BeyondTrust Ransomware Hacks - DataBreaches.Net

U.S. federal authorities and industry officials are urging hospitals and clinics to address a critical flaw in BeyondTrust Remote Support and Privileged Remote Access software, which if exploited, could give an attacker a foothold inside a corporate network. The U.S. Department of Health and Human Services in an alert Thursday warned healthcare and public health sector organizations to review and address the vulnerability in light of rising cyberattacks targeting those entities.
Information security
fromTechzine Global
1 month ago

Infostealer steals identity of AI agent OpenClaw

Security researchers have discovered a live infection in which an infostealer has stolen the configuration files of an OpenClaw AI agent. The attack was carried out through a broad file-theft routine that automatically searched for sensitive file extensions and specific folder names, including .openclaw. The malware was not specifically designed for OpenClaw; it arose by chance from capturing the operational context of the victim's AI assistant. What makes the attack particularly serious is the combination of stolen data.
Information security
Information security
fromTechRepublic
6 months ago

Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt

Wondershare RepairIt stored user files unencrypted in cloud storage and hardcoded permissive access tokens, enabling attackers to tamper AI models and execute supply chain attacks.
Information security
fromTheregister
1 month ago

Nitrogen can't unlock its own ransomware after coding error

Nitrogen's VMware ESXi ransomware corrupts the public key via a stack overlap, making decryption impossible even if victims pay.
#ransomware
Information security
fromZDNET
1 month ago

7 apps I use to lock down, encrypt, and store my private files - and most are free

Use dedicated file-and-folder security apps across devices, stay vigilant about sharing and access, and keep operating systems and apps up to date.
Information security
fromEntrepreneur
2 months ago

How to Keep Your Company's Data Out of the Wrong Hands

Data security requires keeping sensitive data local, restricting access strictly, and holding vendors to higher standards to prevent breaches, leaks, and legal exposure.
Information security
fromTechzine Global
2 months ago

Acronis launches Archival Storage for long-term data protection

Acronis Archival Storage provides MSPs S3-compatible, compliant, cost-predictable long-term object storage integrated with Acronis Cyber Protect Cloud.
Information security
fromThe Hacker News
1 month ago

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

Vendors released critical security patches across Microsoft, Adobe, SAP, and Intel TDX, addressing actively exploited zero-days, code-injection, authorization flaws, and multiple other vulnerabilities.
fromZDNET
1 month ago

This new 'sleeperware' doesn't set off alarms or crash your system - it sneaks in and waits

In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."
Information security
Information security
fromComputerworld
1 month ago

Windows shortcut files targeted by ransomware gang Global Group

Phishing campaigns now weaponize Windows .lnk shortcut files to silently deploy Global Group ransomware via 'Your document' email attachments.
Information security
fromThe Hacker News
2 months ago

Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud

Microsoft and law enforcement dismantled RedVDS, a subscription service providing disposable RDPs that enabled roughly $40 million in reported fraud losses.
Information security
fromTechzine Global
2 months ago

New Windows backdoor emerges in ransomware attack

PDFSider is a stealthy Windows backdoor deployed via social engineering and DLL side-loading to provide persistent, encrypted access and data exfiltration over DNS.
Information security
fromTheregister
2 months ago

Vulnerability exploits now dominate intrusions

Exploit of disclosed vulnerabilities now causes most intrusions, with attackers weaponizing new flaws within hours while many organizations patch slowly.
fromThe Hacker News
2 months ago

Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

Since then, the vulnerability has come under widespread exploitation, with attack chains typically concealing the malicious file, such as a Windows shortcut (LNK), within the alternate data streams ( ADS) of a decoy file inside the archive, causing the payload to be extracted to a specific path (e.g., the Windows Startup folder) and automatically executing it once the user logs in to the machine after a restart.
Information security
Information security
fromMedium
3 months ago

Where DFIR Fits in NIST's Cyber AI Profile

DFIR is a cross-cutting capability essential to operationalizing the Cyber AI Profile's Secure, Defend, and Thwart focus areas.
[ Load more ]