Home » Data Breaches » Page 2
Custom illustration showing a hacker silhouette controlling cloud-service icons (OneDrive, Yandex Cloud) overlaying an IT supply chain network diagram.

APT31 Targets Russian IT via Yandex Cloud & OneDrive C2

Between 2024 and 2025, China-linked APT31 conducted a stealthy espionage campaign targeting Russian IT contractors and government integrators. The group masked its command-and-control using legitimate cloud services such as Yandex Cloud and OneDrive, deployed loaders like CloudyLoader via DLL side-loading, and maintained long dwell times within compromised networks. This article decodes APT31’s tool-kit, tactics and persistence model, and offers detection and response guidance for defenders.

Read More
AI inference vulnerabilities in Meta, Nvidia, Microsoft and vLLM exposed through ShadowMQ, alongside a Cursor IDE compromise via rogue MCP servers

Serious AI Bugs Expose Meta, Nvidia and Microsoft Inference

Researchers uncovered serious AI bugs across Meta, Nvidia, Microsoft and open-source inference frameworks after tracking a ShadowMQ deserialization pattern built on ZeroMQ and Python pickle. At the same time, new research shows how Cursor’s AI IDE can be hijacked via rogue MCP servers, turning developer workstations into high-value malware delivery platforms if teams ignore AI supply-chain security.

Read More
ChatGPT browsing window with a blurred results pane, a visible MFA prompt, and a warning about “q=” links and allowlisted redirects

ChatGPT Data Leaks: Seven New Prompt Injection Paths and Real

Seven fresh techniques let attackers leak ChatGPT data through everyday workflows: poisoned search, “q=” one-click links, allowlisted ad redirects, conversation injection, markdown hiding, and memory poisoning. Because exposure rides on normal browsing and memory behavior, prevention requires policy plus proof: sanitize URLs, block bing.com/ck/a, disable Saved Memory for high-risk roles, and validate controls continuously with OWASP LLM Top 10 and MITRE ATLAS as your benchmarks.

Read More