Recent Cyber Attacks & Data Breaches In 2023

Security experts provide their analysis on the latest cyber attacks you need to know

Security Insights / Data Breaches

Expert Analysis On The Latest Cyber Attacks

 

As data breaches become more pervasive in our interconnected world so must our understanding of modern day cyber attacks.

 

In this series, our team of certified and experienced security researchers analyze recent attacks, explain the impact, and provide mitigation steps to keep you and your organization protected.

Explore Breaches

 

 

2023 Cyber Attack Newsletters

 

Don’t have time to click through and read each article? No worries! We curate all of our publications into a FREE monthly newsletter – no email required (coming soon).

Threat actors don’t sleep… Neither should your security.

600%

 

increase in cybercrime since the beginning of the pandemic.

350%

 

increase in the rate of ransomware attacks since 2018.

60%

 

of SMBs go under 6 months following a cyber attack.

Recent Cyber Attacks

Microsoft Azure Services Vulnerable To SSRF

On January 17, 2023, four vulnerabilities in Microsoft Azure services were vulnerable to server-side request forgery (SSRF) attacks. Services included Azure API Management, Azure Functions, Azure Machine Learning, and Azure Digital Twins.

Explore Resource

Inside Slack’s GitHub Account Hack

On December 29, 2022, Slack became a victim to a hacker. The threat actor had also downloaded private code repositories on December 27, but neither Slack’s primary codebase nor were any customer data included in the downloaded repositories.

Explore Resource

Data Of More Than 200 Million Twitter Users Is Leaked

Data collection sale was started on 4th December 2022 containing more than 200 million Twitter profiles. The breached data was released as a 59 GB RAR archive.

Explore Resource

Linux Malware Targets 30+ WordPress Plugins

A Linux backdoor malware has been discovered that has the capabilities to exploit around 30 WordPress plugins with the goal to inject malicious JavaScript code and make user redirects to harmful, malicious, phishing sites created by the attackers.

Explore Resource

Top 10 Cyber Attacks In 2022

As cyber threats continue to evolve, it is important to stay informed and proactive in safeguarding against potential attacks. This report aims to provide valuable information for organizations and individuals to stay ahead of the constantly changing threat landscape.

Explore Resource

Top 10 Most Exploited Vulnerabilities In 2022

The year 2022 saw its fair share of significant vulnerabilities that made headlines and affected a wide range of systems and devices. These vulnerabilities impacted a wide range of systems and devices, including web servers, collaboration platforms, office software, and network devices.

Explore Resource

Data Of 228 Million Deezer Users Stolen

On November 6th, 2022, a hacker posted on a forum a 60GB CSV file containing personal information including that of the 228 million Deezer members. It is recommended to reset your passwords on the Deezer platform as well as enable two-factor authentication (2FA).

Explore Resource

Kubernetes Clusters Hacked: What You Need To Know

In order to get early access to Kubernetes setups, the threat actors behind the Kinsing Crypto Jacking operation have been seen taking advantage of unprotected and improperly configured PostgreSQL servers.

Explore Resource

All Topics

More Topics