On July 17, 2023, security incident reports by Der Spiegel and Der Standard brought to light a data exposure incident involving VirusTotal, a well-known malware scanning platform. The incident involved the accidental exposure of a 313KB file containing a database of 5600 names. VirusTotal, which was launched in 2004 and later acquired by Google in 2012, is a widely used service in the cybersecurity community. The exposed data includes names and email addresses of VirusTotal customers. The exposure occurred due to an employee mistakenly uploading the information to the malware scanning platform. Upon being informed about the incident, Google promptly took action and removed the data from VirusTotal within an hour of it being posted. In response to the incident, Google's spokesperson confirmed their awareness of the unintentional data distribution and stated that they are reviewing internal processes and technical controls to enhance their operations and prevent similar incidents in the future. It was found that the exposed accounts included those associated with official U.S. bodies such as Cyber Command, the Department of Justice, the FBI, and NSA. Additionally, accounts from government agencies in Germany, the Netherlands, Taiwan, and the U.K. were also among those affected by the exposure.
A China-linked cyber-espionage campaign has been targeting telecommunications providers across the Asia-Pacific region and parts of the Middle East since at least mid-2022. Researc...
Drupal has released a security update for a vulnerability in Drupal Core that may enable attackers to cause Denial-of-Service (DoS) conditions on vulnerable websites. The issue aff...
Microsoft has disclosed two zero-day vulnerabilities affecting Microsoft Defender that are currently being exploited in real-world attacks. Tracked as CVE-2026-41091 and CVE-2026-4...