Thursday , November 21 2024
man

TrackMan exposes nearly 32 Million Records

Nearly 32 million records and about 110 TB of data from Trackman users were left exposed online. This database included user names, email addresses, device information, IP addresses, and security tokens. Security researcher Jeremiah Fowler discovered the vulnerability and reported it to Website Planet, noting that the database lacked password protection for an unknown period. Trackman is a company that provides swing and shot analysis technology for golfers worldwide.

Fowler highlighted several risks associated with exposed data, including sensitive user information that could be exploited in cyberattacks. TrackMan’s technology, used in golf simulators and launch monitors, employs radar and imaging to collect accurate data on ball flight and player movement.

CVE-2024-51503
Trend Micro released updates for Deep Security Agent RCE

Trend Micro released a security update for Deep Security 20 Agent Manual Scan Command Injection RCE Vulnerability (CVE-2024-51503) that resolves...
Read More
CVE-2024-51503  Trend Micro released updates for Deep Security Agent RCE

Apple Releases Patch for two Actively Exploited Zero-Day

Apple released critical updates for its various products including for iOS, iPadOS, macOS, visionOS, and Safari to fix two zero-day...
Read More
Apple Releases Patch for two Actively Exploited Zero-Day

Maxar Space Data Leak, Company admit, Investigation ongoing!

Maxar Space Systems has verified a major data breach that exposed particular information of current and former workers. The breach...
Read More
Maxar Space Data Leak, Company admit, Investigation ongoing!

GitHub CLI Vulnerability Could Allow RCE

A security vulnerability (CVE-2024-52308) in the GitHub Command Line Interface (CLI) could allow remote code execution on users' devices. With...
Read More
GitHub CLI Vulnerability Could Allow RCE

“Sarcoma” ransomware group
Hacker to disclose “Popular Life Insurance” 36 GB of stolen data

“Sarcoma” ransomware group attacked a well known Bangladeshi insurance company named "Popular life insurance company ltd". The threat actor keeps...
Read More
“Sarcoma” ransomware group  Hacker to disclose “Popular Life Insurance” 36 GB of stolen data

BugHunt 2024: A Milestone Cyber security Competition held at Dhaka

Bug Hunt 2024, one of the largest cyber security competitions and conferences in Bangladesh, was successfully held at the ICT...
Read More
BugHunt 2024: A Milestone Cyber security Competition held at Dhaka

TP-Link DHCP Vulnerability Allow Attackers Takeover Routers Remotely

A serious security flaw has been found in some TP-Link routers, potentially enabling hackers to remotely access the affected devices.The...
Read More
TP-Link DHCP Vulnerability Allow Attackers Takeover Routers Remotely

WSJ reports
T-Mobile hacked in massive breach of telecom networks

The Wall Street Journal reported on Friday citing people familiar with the matter that T-Mobile’s network was among the systems...
Read More
WSJ reports  T-Mobile hacked in massive breach of telecom networks

Palo Alto Networks Confirms critical RCE zero-day actively exploited

"Palo Alto Networks has observed threat activity exploiting an unauthenticated remote command execution vulnerability against a limited number of firewall...
Read More
Palo Alto Networks Confirms critical RCE zero-day actively exploited

CISA, FBI Warns
Hacker compromised multiple teleco network at US

US authorities have revealed a major cyberespionage campaign by hackers, targeting information from Americans in government and politics. The FBI...
Read More
CISA, FBI Warns  Hacker compromised multiple teleco network at US

The exposed records contained “session” reports with analytics from TrackMan Performance Studio, a popular performance analysis tool. Major networks like the Golf Channel, BBC, and CNN World rely on TrackMan’s technology to provide real-time data and improved viewing experiences for sports fans.

The exposure of personal data like names and email addresses raises concerns about phishing and social engineering threats, specially for TrackMan’s high-profile athlete clients. Though there’s no indication of actual misuse, the risks remain. The exposed data also included GUIDS and Wi-Fi details. While GUIDs are less sensitive, they can help identify device vulnerabilities. additionally, Wi-Fi and hardware information may be exploited for attacks targeting specific devices, increasing the risk of unauthorized access.

Fowler emphasized the need for sports technology companies like TrackMan to adopt strong security measures for large user data. Essential practices include encryption, multi-factor authentication, regular software updates, and restricted access to sensitive information. He recommends regular security audits to identify vulnerabilities and protect data from unauthorized access.

Although TrackMan did not respond to his notice before publication, Fowler noted that the database was secured shortly after his report. He stated that his investigation aims to raise awareness about data security and does not imply any wrongdoing by TrackMan. He urged companies to proactively protect their data, as public access could pose significant risks to both the company and its users.

(The views shared in this post are solely those of the indivisual contributors and do not necesarily represent the opinions of Infosecbulletin)

Check Also

interbank

Hacker claim data breach: bank confirms blaming third party

Interbank, a major financial institution in Peru, has confirmed a data breach after a hacker …

Leave a Reply

Your email address will not be published. Required fields are marked *