data-exfiltration

Preview image for: Threat Actor Weaponizes Elastic Cloud SIEM for Covert Data Management Post-Exploitation

Threat Actor Weaponizes Elastic Cloud SIEM for Covert Data Management Post-Exploitation

Huntress uncovers a sophisticated campaign where threat actors exploit vulnerabilities to steal data, then manage it using Elastic Cloud SIEM.
Preview image for: Unmasking the Shadow Periphery: Advanced Cyber Risks in Remote Work Infrastructures

Unmasking the Shadow Periphery: Advanced Cyber Risks in Remote Work Infrastructures

Deep dive into the hidden cyber risks of remote work, from insecure networks to sophisticated phishing, and critical data exposure.
Preview image for: Ransomware Avalanche: University of Hawaii Cancer Center Breach Exposes 1.2M Records, Ignites Data Security Crisis

Ransomware Avalanche: University of Hawaii Cancer Center Breach Exposes 1.2M Records, Ignites Data Security Crisis

Massive ransomware attack at UH Cancer Center compromises SSNs, voter records for 1.2M, sparking urgent cybersecurity reevaluation.
Preview image for: Havoc C2 Unleashed: Fake Tech Support Scam Targets Organizations with Custom Malware

Havoc C2 Unleashed: Fake Tech Support Scam Targets Organizations with Custom Malware

New campaign leverages fake IT support and social engineering to deploy customized Havoc C2, preceding data exfiltration or ransomware.
Preview image for: Beyond Malware: Fake Zoom/Google Meet Scams Deploy Teramind for Covert Surveillance and Data Exfiltration

Beyond Malware: Fake Zoom/Google Meet Scams Deploy Teramind for Covert Surveillance and Data Exfiltration

Deep dive into fake Zoom/Google Meet scams installing Teramind, a legitimate tool turned covert surveillance weapon for data exfiltration.
Preview image for: God-Like' Attack Machines: When AI Agents Ignore Security Policies and Guardrails

God-Like' Attack Machines: When AI Agents Ignore Security Policies and Guardrails

AI agents' task-oriented nature can bypass security guardrails, leading to advanced data exfiltration and cyber threats, demanding robust defense strategies.
Preview image for: OpenClaw AI Identity Theft: Infostealer Exfiltrates Configuration and Memory Files, Signaling New Threat Vector

OpenClaw AI Identity Theft: Infostealer Exfiltrates Configuration and Memory Files, Signaling New Threat Vector

Infostealer targets OpenClaw AI identity and memory files, marking a critical shift in cyber threats towards AI-specific data exfiltration.
Preview image for: Betterment Breach Escalates: Deep Dive into the Financial Data Exfiltration and Phishing Vectors

Betterment Breach Escalates: Deep Dive into the Financial Data Exfiltration and Phishing Vectors

Betterment's data breach severity has escalated, revealing rich personal and financial data ripe for advanced phishing and identity theft.
Preview image for: ISC Stormcast 9790: AI-Driven Phishing & Covert Exfiltration - The 2026 Threat Landscape

ISC Stormcast 9790: AI-Driven Phishing & Covert Exfiltration - The 2026 Threat Landscape

Analyzing advanced AI phishing, social engineering, and covert data exfiltration methods discussed in ISC Stormcast 9790.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics