Ahold Delhaize Data Breach Exposes Info of 2.2 Million People

In a significant cybersecurity incident, Ahold Delhaize, the multinational retail giant behind well-known supermarket chains such as Food Lion, Stop & Shop, Giant Food, and Hannaford, has confirmed that a major data breach has exposed the personal information of more than 2.2 million individuals across the United States. The breach was the result of a … Continued

Hackers Use Microsoft Tool to Secretly Attack Energy Sector Companies

A new cyberattack campaign named OneClik has been discovered, and it is mainly targeting companies in the energy, oil, and gas industries. This attack is very sneaky and smart because it uses trusted tools like Microsoft ClickOnce and cloud services from Amazon to avoid being noticed. Security researchers from Trellix have been tracking this threat … Continued

Iran’s Charming Kitten Tries to Spy on Israeli Cyber Experts

A hacking group from Iran called Charming Kitten has been trying to spy on cybersecurity experts in Israel. This group is known by other names too, like APT35, APT42, and Phosphorus. Security researchers believe it is backed by the Iranian government, and it has been active for years targeting people and organizations around the world. … Continued

Unpatchable Printer Bug Exposes Millions of Brother Devices to Hackers

A major security issue has been discovered in millions of Brother printers. Researchers from Rapid7 found that these printers have eight different security flaws, and one of them is extremely serious. This particular flaw allows anyone to figure out the device’s administrator password without logging in. It has been given a critical severity score of … Continued

35 Malicious npm Packages Found in Job-Themed North Korean Cyberattack

A new cyberattack campaign linked to North Korea has been discovered, and it is targeting developers through the npm package manager. Researchers at Socket have identified 35 malicious packages that were uploaded to npm with the goal of stealing sensitive data from developers. The attack is part of a long-running operation known as the “Contagious … Continued

Hackers Hijack Docker to Secretly Mine Crypto Over Tor

Hackers are now targeting exposed Docker APIs to secretly mine cryptocurrency on vulnerable systems, and they’re using the Tor network to cover their tracks. This new cyberattack campaign has caught the attention of security researchers, who say it’s currently affecting cloud-based systems across industries like tech, finance, and healthcare. What’s surprising is that the attackers … Continued

Newsletter line