Author: Aditya Kumar

Crunchyroll Data Breach: Threat Actor Claims Exfiltration of 100 GB of User Data

Crunchyroll Data Breach: Threat Actor Claims Exfiltration of 100 GB of User Data

Streaming platforms have become massive repositories of user data, handling millions of accounts, payment details, and personal preferences. As their scale grows, so does their attractiveness to attackers. New reporting from Cybersecurity News reveals a data breach impacting Crunchyroll, raising concerns around user data exposure and account security. Incidents like this highlight how consumer platforms

Read More
CISA Warns SolarWinds and Ivanti Vulnerabilities Are Actively Exploited

CISA Warns SolarWinds and Ivanti Vulnerabilities Are Actively Exploited

Organizations often prioritize patching vulnerabilities based on severity scores, assuming that lower-rated issues pose limited risk. In practice, attackers frequently exploit vulnerabilities that remain unpatched in real environments, regardless of their official severity rating. New reporting from The Hacker News highlights that the Cybersecurity and Infrastructure Security Agency (CISA) has added multiple vulnerabilities affecting products

Read More
Iranian APT Hack Targets US Airport Bank and Software Company

Iranian APT Hack Targets US Airport Bank and Software Company

Critical infrastructure organizations continue to face sustained pressure from nation-state cyber operations. Airports, financial institutions, and software companies represent high-value targets because of the operational and economic disruption that a successful intrusion can create. New reporting from SecurityWeek details how an Iranian advanced persistent threat group conducted cyber intrusions against organizations, including a U.S. airport,

Read More
When Trusted Authentication Enables Privilege Escalation

When Trusted Authentication Enables Privilege Escalation

Active Directory remains the backbone of enterprise identity. Despite years of modernization efforts, many organizations still rely on legacy authentication protocols that were never designed for today’s threat landscape. New reporting from Dark Reading highlights how attackers continue to abuse NTLM and Kerberos within Microsoft Active Directory environments to escalate privileges, move laterally, and maintain

Read More

Categories

Seceon Inc