crypthon_infosec_en | Unsorted

Telegram-канал crypthon_infosec_en - cRyPtHoN™ INFOSEC (EN)

4200

Latest news of INFOSEC (EN) 1. Latest Vulnerability. 2. Latest Patch. 3. Privacy Breach. 4. Security Breach. 5. InfoSec News. German Version 🇩🇪 @cRyPtHoN_INFOSEC_DE France Version 🇫🇷 @cRyPtHoN_INFOSEC_FR Italian Version 🇮🇹 @cRyPtHoN_INFOSEC_IT

Subscribe to a channel

cRyPtHoN™ INFOSEC (EN)

Alleged Data Breach of Figure Technology Solutions Exposes 2.5 GB of PII

A post on a Tor based leak site operated by ShinyHunters claims Figure Technology Solutions, Inc., a US based financial services company operating through figure.com, was impacted by a data breach. The listing alleges that approximately 2.5 GB of data containing personally identifiable information was extracted and published.

https://databreach.io/breaches/alleged-data-breach-of-figure-technology-solutions-exposes-2-5-gb-of-pii/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Sex toys maker Tenga says hacker stole customer information

Sex toy maker Tenga notified customers of a data breach on Friday, according to an email obtained by TechCrunch.

In the message, the Japanese company said that “an unauthorized party gained access to the professional email account of one of our employees,” which gave the hacker access to the contents of the employee’s inbox.

https://techcrunch.com/2026/02/13/sex-toys-maker-tenga-says-hacker-stole-customer-information/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

260,000 Chrome Users Exposed by Fake AI Extensions Targeting Gmail

We have seen our fair share of malicious Chrome extensions in the past 17 or so years since Google released the initial version of its browser. From fake VPN extensions and outright malicious extensions to sophisticated session replay malware.

https://www.ghacks.net/2026/02/14/260000-chrome-users-exposed-by-fake-ai-extensions-targeting-gmail/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Brutus: Open-source credential testing tool for offensive security

Brutus is an open-source, multi-protocol credential testing tool written in pure Go. Designed to replace legacy tools that have long frustrated penetration testers with dependency headaches and integration gaps, Brutus ships as a single binary with zero external dependencies and native support for the JSON-based reconnaissance pipelines that define offensive security.

https://github.com/praetorian-inc/brutus

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

The Gentlemen Ransomware Hits Autostrad & Emirates National Group

The Gentlemen ransomware group claims to have breached multiple organizations in the United Arab Emirates. The latest list of alleged victims posted by the group includes:

https://dailydarkweb.net/the-gentlemen-ransomware-hits-autostrad-emirates-national-group/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Major telco breach sees 6.2 million users have personal info leaked

Dutch telecommunications company Odido has confirmed suffering a cyberattack and losing sensitive data on millions of people.

In a notice published on its website, the company says it “deeply regrets” the situation and is “fully committed” to limiting its impact.

https://www.msn.com/en-us/technology/cybersecurity/major-telco-breach-sees-6-2-million-users-have-personal-info-leaked/ar-AA1Wi3gt

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

New Windows 11 Update (28020.1611) Adds Built-In Sysmon and OneDrive Sharing Tweaks

Microsoft is rolling out Windows 11 Insider Preview Build 28020.1611 (KB5077221) to the Canary Channel. As expected with Canary builds, this release focuses on early platform changes and experimental features. Windows 11 gets built-in Sysmon and sharing improvements in thew new KB28020.1611 build.

https://www.ghacks.net/2026/02/13/new-windows-11-update-adds-built-in-sysmon-and-onedrive-sharing-tweaks/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Chrome 145 Patches 11 Vulnerabilities

Three of the security defects are high-severity flaws, two of which were found and reported by Google.

Google on Tuesday announced the release of Chrome 145 to the stable channel with fixes for 11 vulnerabilities, including three high-severity bugs.

https://www.securityweek.com/chrome-145-patches-11-vulnerabilities/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

30+ Chrome extensions disguised as AI chatbots steal users' API keys, emails, other sensitive data

Are you a good bot or a bad bot?

More than 30 malicious Chrome extensions installed by at least 260,000 users purport to be helpful AI assistants, but they steal users' API keys, email messages, and other personal data. Even worse: many of these are still available on the Chrome Web Store as of this writing.

https://www.theregister.com/2026/02/12/30_chrome_extensions_ai/

https://layerxsecurity.com/blog/aiframe-fake-ai-assistant-extensions-targeting-260000-chrome-users-via-injected-iframes/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

'Your data is public': Hacker warns victims after leaking 6.8 billion emails online

Someone posted 150GB of emails to the dark web

A hacker claims to have obtained, and leaked, 6.8 billion unique email addresses - and although the claims are unverified at this time, initial reports indicate at least half of those emails are real.

https://www.techradar.com/pro/security/your-data-is-public-hacker-warns-victims-after-leaking-6-8-billion-emails-online

https://cybernews.com/security/massive-email-database-leak-billions-records/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Odido confirms massive breach; 6.2 Million customers impacted

Hackers accessed data from 6.2 million Odido accounts, exposing names, contacts, bank details, and ID numbers. Subsidiary Ben also warned customers.

Hackers broke into Dutch telecom firm Odido and accessed data from 6.2 million accounts. The company confirmed the breach and said attackers took names, addresses, phone numbers, email addresses, bank account details, dates of birth, and passport or ID numbers.

https://securityaffairs.com/187927/uncategorized/odido-confirms-massive-breach-6-2-million-customers-impacted.html

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Shelly IoT door controller config fail: leaving your garage, home and security exposed

Introduction

I love my Shelly devices. They are an essential part of my smart home setup. I use them for everything from lights and plugs to garage doors and garden sprinkler control! One of the first Shelly devices I installed about five years ago recently stopped working, so I replaced it with one of their new fourth-generation Shelly 1 devices. That’s when I noticed an issue I hadn’t seen in previous generations.

https://www.pentestpartners.com/security-blog/shelly-iot-door-controller-config-fail-leaving-your-garage-home-and-security-exposed/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Moscow moves to throttle Telegram as Kremlin pushes its own messaging app

Russia has moved to further restrict Telegram, the popular messaging platform, as users across the country report widespread service disruptions.

WhatsApp says Russia tried to fully block platform, push users to state app

Russia attempted to fully block the WhatsApp messaging app on Thursday in an effort to push users toward a state-backed alternative, the company said in a statement.

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

ApolloMD Data Breach Impacts 626,000 Individuals

The company says hackers stole the personal information of patients of affiliated physicians and practices.

Over 626,000 individuals were impacted by a May 2025 cyberattack at healthcare physician and practice management services provider ApolloMD.

https://www.securityweek.com/apollomd-data-breach-impacts-626000-individuals/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Ransomware gang claims recent cyber attack on Canadian retailer

Ransomware gang, Akira, has added prominent Canadian retailer, Ardene, to its data leak site and alleges to have stolen 58 GB of data.

https://www.comparitech.com/news/ransomware-gang-claims-recent-cyber-attack-on-canadian-retailer/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Contain your Windows apps inside Linux Windows

Can't live without Adobe? Get on board WinBoat – or WinApps sails a similar course

Hands-on Run real Windows in an automatically managed virtual machine, and mix Windows apps in their own windows on your Linux desktop.

https://www.theregister.com/2026/02/14/winapps_and_winboat/

https://github.com/TibixDev/winboat

https://github.com/winapps-org/winapps

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Hollywood studios now have another weapon to take down pirate websites in India: domain name registrar takedowns that can kill sites instantly

Indian court orders move beyond basic ISP blocks

For years, anti-piracy enforcement in India relied largely on instructing local internet providers to block access to specific websites.

Those measures often resulted in limited impact, as operators could switch domain names or mirror their services elsewhere.

https://www.techradar.com/pro/hollywood-studios-now-have-another-weapon-to-take-down-pirate-websites-in-india-domain-name-registrar-takedowns-that-can-kill-sites-instantly

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL malware.

https://securityaffairs.com/187976/hacking/suspected-russian-hackers-deploy-canfail-malware-against-ukraine.html

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

BeyondTrust Vulnerability Targeted by Hackers Within 24 Hours of PoC Release

Exploitation attempts target CVE-2026-1731, a critical unauthenticated remote code execution flaw in BeyondTrust Remote Support.

Threat actors began targeting a recently patched BeyondTrust vulnerability shortly after a proof-of-concept (PoC) exploit was released.

https://www.securityweek.com/beyondtrust-vulnerability-targeted-by-hackers-within-24-hours-of-poc-release/

https://www.hacktron.ai/blog/cve-2026-1731-beyondtrust-remote-support-rce

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

ʎɹǝʌoɔǝᴚ sʍopuᴉM ʇɐ sǝʇɐuᴉɯɹǝʇ snq sᴉɥ┴

One destination passengers were definitely not hoping to reach

Bork!Bork!Bork! As if to demonstrate that whatever one operating system can do, Windows can do it better, bluer, and upside down, we present a bus stopping only at bork.

Today's example of signage woes - thanks to reader Spike - comes from a Nottingham bus, headed for Recovery (though hopefully the right way up).

https://www.theregister.com/2026/02/13/bus_bork/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

60,000 Records Exposed in Cyberattack on Uzbekistan Government

An alleged Uzbekistan cyberattack that triggered widespread concern online has exposed around 60,000 unique data records, not the personal data of 15 million citizens, as previously claimed on social media.

https://thecyberexpress.com/uzbekistan-cyberattack-limited-to-60k-records/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.

Google DeepMind and GTIG report a rise in model extraction or “distillation” attacks aimed at stealing AI intellectual property, which Google has detected and blocked.

https://securityaffairs.com/187958/ai/google-state-backed-hackers-exploit-gemini-ai-for-cyber-recon-and-attacks.html

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Critical BeyondTrust RCE flaw now exploited in attacks, patch now

A critical pre-authentication remote code execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access appliances is now being exploited in attacks after a PoC was published online.

Tracked as CVE-2026-1731 and assigned a near-maximum CVSS score of 9.9, the flaw affects BeyondTrust Remote Support versions 25.3.1 and earlier and Privileged Remote Access versions 24.3.4 and earlier.

https://www.bleepingcomputer.com/news/security/critical-beyondtrust-rce-flaw-now-exploited-in-attacks-patch-now/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Hacker linked to Epstein removed from Black Hat cyber conference website

Vincenzo Iozzo, a renowned hacker linked to convicted sex offender Jeffrey Epstein, is no longer listed on the website of Black Hat, one of the largest cybersecurity conferences in the world, nor on the Japanese security conference Code Blue.

https://techcrunch.com/2026/02/12/hacker-linked-to-epstein-removed-from-black-hat-cyber-conference-website/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

iOS 26.3 Update for iPhone Released: What's new?

Apple has released iOS 26.3 for supported iPhone models (iPhone 11 and later), featuring a significant focus on easier data migration from iPhone to Android, along with improved security and privacy controls.

The release serves as a refinement-focused update ahead of the much-anticipated Siri overhaul expected in iOS 26.4 later this spring.

https://www.ghacks.net/2026/02/12/ios-26-3-update-released

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Alleged Data Breach Involves Webster Bank and Capital One Account Records

A forum post claims that customer account data linked to Webster Bank and Capital One, two US based financial institutions, is being offered for sale. The listing alleges that the information was obtained from a previously compromised contact center and is described as recent and exclusive.

https://databreach.io/breaches/alleged-data-breach-involves-webster-bank-and-capital-one-account-records/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

Peabody, MA warns 48,000+ people of data breach that leaked SSNs, finances

The city of Peabody, Massachusetts this week confirmed it notified 48,004 state residents of a June 2025 data breach that compromised Social Security numbers, financial account info, and driver’s licenses.

https://www.comparitech.com/news/peabody-ma-warns-48000-people-of-data-breach-that-leaked-ssns-finances/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

OpenClaw Scanner: Open-source tool detects autonomous AI agents

A new free, open source tool is available to help organizations detect where autonomous AI agents are operating across corporate environments. The OpenClaw Scanner identifies instances of OpenClaw, an autonomous AI assistant also known as MoltBot, that can execute tasks, access local files, and authenticate to internal systems without centralized oversight.

https://pypi.org/project/astrix-openclaw-scanner/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…

cRyPtHoN™ INFOSEC (EN)

🇧🇷 Brazil – Repediu

Repediu, a Brazilian platform appearing to service the restaurant and food delivery management sector, has allegedly been compromised.

APGO Taiwan Data Breach: 12,000 Customer Records Leaked

APGO Taiwan, a retailer specializing in automotive coating and detailing products, has allegedly been compromised. A threat actor has claimed...

CryptoXScanner Data Breach – 14,000 User Records Leaked

CryptoXScanner, a cryptocurrency market scanning and analysis platform, has allegedly been compromised, resulting in the exposure of its user database....

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

Читать полностью…
Subscribe to a channel