The cyber attack on PricewaterhouseCoopers (PwC) involving MOVEit has escalated, with the Clop ransomware gang now unveiling the publication of the stolen data on a fresh domain with a .com extension.
According to the threat actors, this information, reportedly originating from the PWC data breach, is soon to be disclosed on the website “pwcclientsanddocuments.com.”
Mastercard has completed its acquisition of Recorded Future, an AI-based threat intelligence provider. Mastercard has acquired the company for $2.65...
CISA has released eight advisories on vulnerabilities in Industrial Control Systems (ICS). These vulnerabilities affect essential software and hardware in...
Sophos has fixed three separate security vulnerabilities in Sophos Firewall. The vulnerabilities CVE-2024-12727, CVE-2024-12728, and CVE-2024-12729 present major risks, such...
Kaspersky's Global Emergency Response Team (GERT) found that attackers are exploiting a patched SQL injection vulnerability (CVE-2023-48788) in Fortinet FortiClient...
Cybercriminals have shown remarkable audacity by developing a web-based edition of PwC’s authentic website, pwc.com. This deceitful platform is intended for the publication of all the stolen files from the PwC data breach.
The hacker group announced that a web version of PwC clients will be available on PWC.com for easy access to all files.
PWC data breach and MOVEit vulnerability crisis:
PricewaterhouseCoopers (PwC) recently fell victim to a large-scale cyberattack, which specifically targeted the MOVEit file transfer tool.
By taking advantage of a vulnerability in the tool, this campaign effectively utilized Progress’ MOVEit product, and PwC has confirmed its usage. Consequently, both the company and its clients were impacted significantly.
CRN reported that PwC stressed the “limited” impact of the effects and confirmed the integrity of its own IT network.