#data-exfiltration

[ follow ]
Information security
fromIT Pro
1 day ago

This new Android attack could let hackers swipe 2FA codes and snoop on private messages - 'Pixnapping' affects Samsung and Google smartphones, but experts warn more could be at risk

Pixnapping enables malicious Android apps to steal displayed pixels from other apps using a GPU side channel, revealing 2FA codes and sensitive data without permissions.
fromThe Hacker News
1 day ago

npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for attackers to exfiltrate data to a channel under their control. "Importantly, webhook URLs are effectively write-only," Socket researcher Olivia Brown said in an analysis. "They do not expose channel history, and defenders cannot read back prior posts just by knowing the URL."
Information security
fromThe Hacker News
1 week ago

New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise

For years, security leaders have treated artificial intelligence as an "emerging" technology, something to keep an eye on but not yet mission-critical. A new Enterprise AI and SaaS Data Security Report by AI & Browser Security company LayerX proves just how outdated that mindset has become. Far from a future concern, AI is already the single largest uncontrolled channel for corporate data exfiltration-bigger than shadow SaaS or unmanaged file sharing.
Information security
Artificial intelligence
fromThe Verge
1 week ago

Google's AI bounty program pays bug hunters up to $30K

Google launched an AI bug bounty focused on rogue actions and data-exfiltration in AI products, offering rewards (including $20,000) for qualifying reports.
Information security
fromDataBreaches.Net
1 week ago

Update on the emerging CL0P extortion campaign targeting Oracle E-Business Suite - DataBreaches.Net

CL0P exploited CVE-2025-61882 to exfiltrate large volumes of Oracle E-Business Suite data; apply Oracle patches and investigate for historical compromise.
#ransomware
fromSecuritymagazine
1 month ago
Information security

Pharmaceutical Firm Hit With Ransomware Attack

Inotiv suffered a Qilin ransomware attack that encrypted systems, exfiltrated 176 GB of proprietary research, causing operational disruptions and ongoing remediation.
fromDatabreaches
5 months ago
Privacy professionals

ELENOR-corp Ransomware: A New Mimic Ransomware Variant Attacking the Healthcare Sector

Mimic version 7.5 presents evolved tactics in ransomware attacks, particularly in credential harvesting and intrusions.
Information security
fromThe Hacker News
1 week ago

CometJacking: One Click Can Turn Perplexity's Comet AI Browser Into a Data Thief

CometJacking uses a malicious URL to instruct Perplexity's Comet AI browser to exfiltrate connected-service data (email, calendar) via obfuscated prompts.
Privacy professionals
fromZDNET
1 week ago

Cybercrooks breach Red Hat's private GitLab repos - what we know about affected customers

Red Hat's private GitLab repositories were breached, exposing consulting data and customer engagement reports that may enable attackers to access downstream customer infrastructure.
Information security
fromSecurityWeek
1 week ago

Red Hat Confirms GitLab Instance Hack, Data Theft

A compromised Red Hat Consulting GitLab instance resulted in theft of compressed data from thousands of private repositories, including source code, credentials, and customer reports.
Information security
fromThe Hacker News
2 weeks ago

Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits

Three now-patched vulnerabilities in Google's Gemini AI could have allowed prompt and search-injection attacks and user data exfiltration across cloud services and browsing tools.
#salesforce-agentforce
Information security
fromThe Hacker News
2 weeks ago

Crash Tests for Security: Why BAS Is Proof of Defense, Not Assumptions

Breach and Attack Simulation (BAS) performs real-world adversary crash tests to reveal security gaps that dashboards, logs, and compliance reports fail to expose.
#salesforce-breach
#salesforce
Information security
fromThe Hacker News
3 weeks ago

ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent

A zero-click HTML prompt-injection (ShadowLeak) in ChatGPT Deep Research allowed exfiltration of Gmail inbox data via a single crafted email without user interaction.
#agentic-ai
fromArs Technica
3 weeks ago

New attack on ChatGPT research agent pilfers secrets from Gmail inboxes

Accordingly, OpenAI mitigated the prompt-injection technique ShadowLeak fell to-but only after Radware privately alerted the LLM maker to it. A proof-of-concept attack that Radware published embedded a prompt injection into an email sent to a Gmail account that Deep Research had been given access to. The injection included instructions to scan received emails related to a company's human resources department for the names and addresses of employees. Deep Research dutifully followed those instructions.
Information security
Information security
fromTheregister
3 weeks ago

Scattered Spider gang feigns retirement, breaks into bank

Scattered Spider remains active and has shifted focus to the financial sector, conducting a targeted intrusion against a US bank.
Information security
fromSecurityWeek
4 weeks ago

ChatGPT's New Calendar Integration Can Be Abused to Steal Emails

A ChatGPT calendar integration using MCP can be abused via crafted invites to execute attacker commands and exfiltrate a user's email data without invite acceptance.
Information security
fromThe Hacker News
1 month ago

Russian APT28 Deploys "NotDoor" Outlook Backdoor Against Companies in NATO Countries

APT28 deployed an Outlook VBA backdoor called NotDoor that monitors emails for a trigger to exfiltrate data, upload files, execute commands, and persist via DLL side-loading.
Information security
fromIT Pro
1 month ago

Cybersecurity experts issue urgent warning amid surge in Stealerium malware attacks

Stealerium infostealer has surged, exfiltrating credentials, crypto wallets, Wi‑Fi and VPN data via multiple channels and leveraging social‑engineering lures for global campaigns.
Information security
fromThe Hacker News
1 month ago

Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

Storm-0501 performs cloud-native data exfiltration, destroys backups, and extorts victims without traditional malware, targeting hybrid cloud and multi-tenant environments to escalate privileges and evade detection.
Information security
fromThe Hacker News
1 month ago

ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots

ShadowSilk conducts spear-phishing campaigns to exfiltrate data from government organizations across Central Asia and APAC, leveraging YoroTrooper-related tooling and bilingual operators.
Information security
fromThe Hacker News
1 month ago

Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data

Hackers breached Salesloft to steal Drift OAuth and refresh tokens, enabling exfiltration of Salesforce data and credentials from multiple corporate instances.
Information security
fromTheregister
1 month ago

'Screenshot-grabbing' Chrome VPN extension still available

A popular Chrome VPN extension secretly captured page screenshots and transmitted them to a remote server despite verified status and Chrome Web Store safeguards.
#cybersecurity
Information security
fromHackernoon
4 months ago

In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft | HackerNoon

Optical data exfiltration makes air-gapped systems vulnerable, relying on LEDs to transmit sensitive information covertly.
Growth hacking
fromThe Hacker News
3 months ago

Water Curse Hijacks 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign

Introduction of a new threat actor, Water Curse, utilizing GitHub for malware distribution, targeting data exfiltration and persistent access.
fromHackernoon
4 months ago
Information security

In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft | HackerNoon

fromIT Pro
3 months ago

Developers face a torrent of malware threats as malicious open source packages surge 188%

"Attackers are no longer simply experimenting with open source. The numbers are telling us that threat actors have identified data as the most profitable target, and developers as the easiest way in."
Privacy technologies
Node JS
fromThe Hacker News
5 months ago

Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers

A malicious campaign utilizes Node.js to distribute payloads that enable data theft, masquerading as cryptocurrency trading software.
LA Dodgers
fromTheregister
5 months ago

Whistleblower describes how DOGE tore through NLRB IT system

Whistleblower claims serious security breaches at NLRB due to DOGE's unrestricted data access.
[ Load more ]