Data analyst found guilty in $2.5M extortion scheme targeting tech firm
Cameron Curry exploited his role as a data analyst contractor to access sensitive payroll and corporate data.
3 min read
Cybersecurity Help is a global vulnerability intelligence provider. We monitor vulnerabilities in software from 60,000+ vendors and help customers prevent potential data breaches by addressing them proactively.
Request DemoCameron Curry exploited his role as a data analyst contractor to access sensitive payroll and corporate data.
3 min readResearchers determined that the attackers gained access through previously stolen credentials from an earlier March breach.
3 min readThe sites were part of a large-scale scam that advertised fake CSAM “packages,” as well as other cybercrime services.
3 min readThe attacks do not break end-to-end encryption but instead rely on account hijacking techniques.
3 min readIn brief: Threat actors are exploiting Zimbra, MS SharePoint and WingFTP flaws, police disrupt the Aisuru, KimWolf, JackSkid and Mossad botnets, and more.
15 min read