Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the penci-text-to-speech domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/revifuxl/hacksbyte.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the penci-bookmark-follow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/revifuxl/hacksbyte.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the soledad domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/revifuxl/hacksbyte.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the penci-paywall domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/revifuxl/hacksbyte.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the penci-frontend-submission domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/revifuxl/hacksbyte.com/wp-includes/functions.php on line 6114
VirusTotal data leak exposes details of some registered customers – HacksByte

VirusTotal data leak exposes details of some registered customers

The security breach, which involves a database of 5,600 names in a 313KB file, was first disclosed yesterday by Der Spiegel and Der Standard.

Launched in 2004, VirusTotal is a popular service that uses an antivirus engine and website scanner to analyze suspicious files and URLs to detect types of malware and malicious content. It was acquired by Google in 2012 and became a subsidiary of the Chronicle unit of Google Cloud in 2018.

When contacted for comment, Google confirmed the leak and said it had taken immediate steps to remove the data.

“We are aware of the inadvertent distribution of a small segment of customer group administrator emails and organization names on the VirusTotal platform by one of our employees,” a Google Cloud spokesperson told The Hacker News.

“We removed the listing from the platform within an hour of posting and we are reviewing our internal processes and technical controls to improve our operations in the future.”

The data includes accounts linked to official US bodies such as Cyber Command, the Department of Justice, the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA). Other accounts are in Germany, the Netherlands, Taiwan and the U.K. belongs to government agencies.

Last year, Germany’s Federal Information Security Office (BSI) warned against automatically uploading suspicious email attachments to VirusTotal, noting that doing so could expose sensitive information.

Related posts

Microsoft CEO Satya Nadella dreams of a world where India and every person on the planet is empowered by AI

Chinese hackers exploited FortiGate Flaw to break the Dutch Military Network

Russian Coldriver hackers are moving beyond phishing with custom malware

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More