The OWASP Foundation disclosed a recent data breach affecting some members due to a misconfiguration on an old Wiki web server. The breach, occurring in late March, exposed resumes of early members, while current membership data remains secure. OWASP, a nonprofit entity focused on enhancing software security, provides tools and resources for secure software development. The breach stemmed from a misconfiguration on OWASP's old Wiki web server, discovered in late February 2024. It primarily affected members from 2006 to 2014, who had submitted resumes during their membership application process. Exposed information included names, email addresses, phone numbers, and physical addresses. OWASP ceased collecting resumes as part of the membership process after 2014. In response to the breach, the Foundation disabled directory browsing, reviewed server configurations, secured exposed resumes, and purged CloudFlare cache. They also requested removal of the data from the Web Archive. The impacted individuals are no longer associated with OWASP, and the data, between ten to 18 years old, mostly contains outdated personal details. The Foundation will contact individuals with current information found during their investigations. For affected individuals, OWASP advised no immediate action if the exposed information is outdated. However, if current details are included, they should exercise caution when responding to unsolicited communications. Overall, OWASP is taking steps to mitigate the impact of the breach and ensure the security of its members' data moving forward.
Remcos, a remote access application created by Breaking-Security and presented as legitimate administration software, remains a growing cyber threat to organizations around the wor...
A sophisticated threat actor executed a nine-day ransomware campaign using compromised Remote Desktop Protocol (RDP) credentials to infiltrate a corporate network, exfiltrate sensi...
A newly identified ransomware strain dubbed Yurei has emerged, targeting organizations around the world. The group uses a traditional ransomware-extortion model: infiltrate network...