A threat actor known as 'emo' has leaked personal information of 442,519 Life360 customers, exploiting a flaw in the login API. Emo revealed that the unsecured API endpoint allowed easy verification of users' email addresses, names, and phone numbers. Specifically, the Android login endpoint returned the first name and phone number in the API response, not visible to the user. Verified phone numbers appeared partially masked. Life360 has since patched the flaw, returning placeholder phone numbers for additional requests. The data breach, first reported by HackManac, occurred in March 2024, with emo denying involvement. On July 15, 2024, emo also leaked over 15 million Trello email addresses, collected through an unsecured API in January. Life360 disclosed an extortion attempt following a breach of the Tile customer support platform, where attackers accessed sensitive information, including names, addresses, email addresses, phone numbers, and device IDs. The threat actor used stolen credentials from a former Tile employee to breach multiple systems, enabling unauthorized actions such as finding users, creating admin accounts, and transferring device ownership. The attacker also scraped customer data, evading detection while sending millions of requests. Life360 CEO Chris Hulls clarified that the exposed data did not include credit card numbers, passwords, login credentials, location data, or government-issued IDs. The company has not disclosed when the breach was detected or the number of impacted customers. Life360, serving over 66 million members globally, acquired Tile for $205 million in December 2021.
A serious security flaw has been discovered in the Cline kanban package that could allow attackers to perform remote code execution, steal sensitive data, and stop active AI sessio...
As reported, OpenAI created the Daybreak platform for cybersecurity-related tasks. It allows businesses to detect, validate and remediate software vulnerabilities through innovativ...
Attackers are actively exploiting a critical flaw (CVE-2024-3721) in TBK DVR devices to deploy a Mirai-based botnet known as Nexcorium. This vulnerability allows remote command exe...