data leak
![Trello](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/23111837/trello-1400-400x200.jpg)
Data of 15 million Trello users scraped and offered for sale
Someone is selling scraped data of millions of users of Trello, a popular a web-based list-making application and project management platform, on a dark web hacker forum. The …
![large language models](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160752/llms-2-400x200.jpg)
Top LLM vulnerabilities and how to mitigate the associated risk
As large language models (LLMs) become more prevalent, a comprehensive understanding of the LLM threat landscape remains elusive. But this uncertainty doesn’t mean progress …
![digital identity](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20132922/digital_identity4-400x200.jpg)
Selective disclosure in the identity wallet: How users share the data that is really needed
Name, date of birth, address, email address, passwords, tax records, or payroll – all this sensitive user data is stored by companies in huge databases to identify individuals …
![Progress MOVEit](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/01163802/progress-moveit3-400x200.jpg)
Cl0p’s MOVEit attack tally surpasses 2,000 victim organizations
The number of victim organizations hit by Cl0p via vulnerable MOVEit installations has surpassed 2,000, and the number of affected individuals is now over 60 million. The …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/05134549/zaun-400x200.jpg)
LockBit leaks sensitive data from maximum security fence manufacturer
The LockBit ransomware group has breached Zaun, a UK-based manufacturer of fencing systems for military sites and critical utilities, by compromising a legacy computer running …
![VPN](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/02120400/vpn-tunnel-400x200.jpg)
Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks
Several vulnerabilities that affect most VPN products out there can be exploited by attackers to read user traffic, steal user information, or even attack user devices, …
![VirusTotal](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/18183005/virustotal-hns-1200-400x200.jpg)
VirusTotal leaked data of 5,600 registered users
VirusTotal has suffered a data leak that exposed the names and email addresses of 5,600 of its registered users. The leaked data reportedly includes information about …
![Progress MOVEit](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/06123401/progress-moveit-glow-400x200.jpg)
A third MOVEit vulnerability fixed, Cl0p lists victim organizations (CVE-2023-35708)
Progress Software has asked customers to update their MOVEit Transfer installations again, to fix a third SQL injection vulnerability (CVE-2023-35708) discovered in the web …
![Switzerland](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/13160903/switzerland-attack-400x200.jpg)
Switzerland under cyberattack
Swiss government websites are under DDoS attacks, but several ransomware gangs have also turned their sights on Swiss government organizations, cantonal governments, cities …
![GitHub](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/27111139/github-27042023-01-400x200.jpg)
Never leak secrets to your GitHub repositories again
GitHub is making push protection – a security feature designed to automatically prevent the leaking of secrets to repositories – free for owners of all public …
![MSI](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/08131757/msi-logo-400x200.jpg)
MSI’s firmware, Intel Boot Guard private keys leaked
The cybercriminals who breached Taiwanese multinational MSI last month have apparently leaked the company’s private code signing keys on their dark web site. The breach …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
IT and security pros pressured to keep quiet about data breaches
Organizations globally are under tremendous pressure to address evolving threats like ransomware, zero-day vulnerabilities, and espionage, and they face challenges in …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders