23andMe Data Breach Alert!
Hackers infiltrated, using recycled login credentials to pilfer 23andMe accounts
Abe leads adversary simulation engagements and builds automation to keep incident response fast and accountable.
Hackers infiltrated, using recycled login credentials to pilfer 23andMe accounts
After building Redteam Relay as my practitioner’s notebook, I’m extending it to deliver a focused news feed. The core mission doesn’t change: short, practical writing on hacking, defensive strategy and operational security. This site blends offensive perspective with defensive execution to help you move quickly. Making timely news part of that was the logical next step.
This all-cash agreement, representing a 31% premium over Splunk's stock price, marks Cisco's largest deal to date.
The disruption, stemming from a junior engineer pushing out a bad update, has left many businesses offline, vulnerable and scrambling to secure their systems.
This is my way of bringing some of the conflict to light.
The marketplace operated as a hidden service within the encrypted TOR network, enabling anonymous criminal activities, with drugs smuggled into Finland from abroad.
Cybersecurity experts have exposed a new cybercrime entity named ShadowSyndicate (formerly Infra Storm), which may have harnessed up to seven different ransomware families in the past year.
They've been active since 2018 and are back in the spotlight this week.
Vitalik Buterin, the creator of Ethereum crypto, found himself in an unfortunate situation when his Twitter account fell victim to a hacking incident.
Get ready to dive deep into the world of digital defenses because October is Cybersecurity Awareness Month!
Today, let's delve into one of the most intriguing threat actors: insiders selling access to your very own organization!
Cryptocurrency mixers, like Sinbad, allow users to deposit crypto, which is then mixed among various wallet addresses to obscure its traceability.
MGM Resorts International revealed yesterday that it's grappling with a cybersecurity issue affecting several systems, including its primary website, online reservations, and in-casino services like ATMs, slot machines, and credit card machines.
North Korea, hacking another well known threat actor, Russia.
This marks a significant escalation in their hacking activities.
Cybersecurity month may be over, but the breaches don't stop.
Rhysida, a ransomeware-as-a-service operation, has claimed one of their first victims in the healthcare industry - Singing River Heath System.
Investigators reference organized crime and possible foreign links, but no public arrests yet.
In an international bust, the US and the UK have imposed sanctions on 11 Russian individuals associated with the TrickBot and Conti ransomware operations.
This vulnerability, a severe SQL injection flaw leading to remote code execution, was exploited by the notorious Clop ransomware gang.
Recently, companies have been seeing the abuse of Teams as a landing pad for malware.
You can take a look at the tool and its operation in the picture here.
This week’s brief focuses on two major events: a data leak impacting Qantas and dozens of other companies, and a zero‑day vulnerability exploited in Oracle’s E‑Business Suite
An uptick in third-party and vendor compromises shows how attackers are targeting trust chains. Here’s what to fix right now before your partners become your breach vector.
Let's take a dive into the culture of security together.
A short write-up of how we mitigated an attack for a client