The hackers claim the theft of 27 gigabytes of data, including contracts, employee information, and financial documents.
The post Ransomware Group Claims Attack on Beer Giant Asahi appeared first on SecurityWeek.
Category Added in a WPeMatico Campaign
The hackers claim the theft of 27 gigabytes of data, including contracts, employee information, and financial documents.
The post Ransomware Group Claims Attack on Beer Giant Asahi appeared first on SecurityWeek.
Hackers accessed user accounts and compromised names, addresses, phone numbers, email addresses, and other information.
The post DraftKings Warns Users of Credential Stuffing Attacks appeared first on SecurityWeek.
Hundreds of internet-exposed Oracle E-Business Suite instances may still be vulnerable to attacks.
The post Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching appeared first on SecurityWeek.
BK Technologies has informed the SEC that it discovered an IT intrusion on September 20.
The post Hackers Stole Data From Public Safety Comms Firm BK Technologies appeared first on SecurityWeek.
Significant cybersecurity M&A deals announced by Check Point, CrowdStrike, F5, Mitsubishi Electric, and SentinelOne.
The post Cybersecurity M&A Roundup: 40 Deals Announced in September 2025 appeared first on SecurityWeek.
The company plans to expand to new markets, fuel the development of a new module for its platform, and accelerate AI integration.
The post Filigran Raises $58 Million in Series C Funding appeared first on SecurityWeek.
BIETA and its subsidiary CIII research develop and sell technologies supporting China’s intelligence, counterintelligence, and military operations.
The post Security Firm Exposes Role of Beijing Research Institute in China’s Cyber Operations appeared first on SecurityWeek.
The Medusa ransomware operators exploited the GoAnywhere MFT vulnerability one week before patches were released.
The post Fortra GoAnywhere MFT Zero-Day Exploited in Ransomware Attacks appeared first on SecurityWeek.
The Year 2036/2038 problem is a bug that will be triggered in more than a decade, but hackers could exploit it today against ICS and consumer devices.
The post The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn appeared first on SecurityWeek.
Authenticated attackers can exploit the security flaw to trigger a use-after-free and potentially execute arbitrary code.
The post Critical Vulnerability Puts 60,000 Redis Servers at Risk of Exploitation appeared first on SecurityWeek.
