Harrods, the iconic British luxury department store, has confirmed that it was recently targeted in a cybersecurity incident, becoming the third major UK retailer in just a few days to report a cyber incident. The Harrods cyberattack follows similar breaches at Marks & Spencer and the Co-op. The cyberattack on show more ...
Harrods prompted the department store to take precautionary steps, including limiting online access while assuring customers that its physical stores and online shopping were still operational. The incident, which occurred in late April 2025, saw hackers attempt to gain unauthorized access to Harrods’ systems. The UK retailer restricted internet access at its sites as a precautionary measure but assured customers that its flagship Knightsbridge store, H Beauty branches, and airport outlets remained open. Additionally, online shopping services continued without interruption. Response to the Harrods Cyberattack In a statement provided to The Cyber Express, the company confirmed the incident, stating, "We recently experienced attempts to gain unauthorized access to some of our systems. Our seasoned IT security team immediately took proactive steps to keep systems safe, and as a result, we have restricted internet access at our sites today. Currently, all sites, including our Knightsbridge store, H beauty stores, and airport stores, remain open to welcome customers. Customers can also continue to shop via harrods.com." Harrods has not yet provided additional details on the scale or potential consequences of the breach, including whether customer data was affected. Customers were reassured that no action was needed on their part at this time, with the retailer promising to provide updates as the situation evolves. Rising Concerns in the Retail Sector The Harrods cyberattack comes on the heels of similar incidents that recently disrupted operations at Marks & Spencer and the Co-op. Marks & Spencer, for example, revealed a cyberattack linked to the hacking group "Scattered Spider" that caused widespread disruptions to online ordering systems and stock shortages in some physical stores. The attack, which reportedly involved the deployment of DragonForce ransomware, has cost Marks & Spencer millions in lost sales. Online orders were suspended for several days, and authorities are still investigating the incident. Meanwhile, the Co-op also reported an attempted network breach, prompting it to take precautionary measures such as shutting down parts of its IT systems and requiring staff to verify their identities during remote meetings. These measures were implemented to mitigate the risk of eavesdropping by cybercriminals. The National Cyber Security Centre (NCSC), which oversees the UK’s cybersecurity efforts, has expressed concern over the growing number of attacks targeting the retail sector. Richard Horne, the NCSC’s CEO, emphasized that these incidents should serve as a wake-up call for retailers to bolster their defenses against cyber threats. He confirmed that the NCSC was collaborating closely with all affected companies to fully understand the nature of these attacks and to offer expert advice to the wider retail sector. Conclusion The ongoing investigations into the recent attacks on Harrods, Marks & Spencer, and the Co-op highlight the advancements of cybercriminals targeting high-profile UK retailers. While no direct link between the incidents has been established, experts speculate that shared vulnerabilities or common suppliers may be involved. This is an ongoing story, and The Cyber Express will be closely monitoring the situation. We'll update this post once we have more information on the incident and or any new statement from the retailer.
The Cybersecurity and Infrastructure Security Agency (CISA) recently updated its Known Exploited Vulnerabilities (KEV) Catalog, adding two vulnerabilities, CVE-2024-38475 and CVE-2023-44221, that are currently being actively exploited. These vulnerabilities present substantial cybersecurity risks to organizations, show more ...
particularly those in the federal sector. Both vulnerabilities have been linked to high-profile products, Apache HTTP Server and SonicWall SMA100, which are widely used in various industries. CVE-2024-38475: Apache HTTP Server Improper Escaping of Output One of the newly added vulnerabilities, CVE-2024-38475, affects Apache HTTP Server versions up to 2.4.59. Discovered by security researcher Orange Tsai from DEVCORE, this vulnerability arises due to improper escaping of output in the mod_rewrite module. The flaw allows attackers to manipulate URLs, mapping them to unintended filesystem paths that are typically inaccessible via normal web requests. This could lead to unauthorized code execution or the disclosure of sensitive source code. This issue specifically affects server contexts where substitutions in mod_rewrite, using backreferences or variables in the first segment of the substitution, can be exploited. As a result, attackers can craft malicious URLs that trick the server into executing arbitrary commands or revealing internal files. Apache has recommended the use of a rewrite flag, "UnsafePrefixStat," for users who need to maintain compatibility with broken RewriteRules, provided they ensure the substitution is properly constrained. The vulnerability is classified under CWE-116 (Improper Encoding or Escaping of Output) and affects Apache HTTP Server versions 2.4.0 through 2.4.59. Users are advised to upgrade to the latest patch to mitigate the risks associated with this vulnerability. CVE-2023-44221: SonicWall SMA100 OS Command Injection The second vulnerability added to the catalog, CVE-2023-44221, impacts SonicWall’s SMA100 series SSL-VPN appliances. This vulnerability stems from an issue in the SSL-VPN management interface, where improper neutralization of special elements can lead to OS command injection. Attackers with administrative privileges can exploit this flaw to inject arbitrary commands, potentially leading to the execution of malicious commands on the underlying operating system. This vulnerability has been assigned a CVSS v3 score of 7.2, indicating a high level of severity. It primarily affects SonicWall SMA 200, 210, 400, 410, and 500v models running versions 10.2.1.9-57sv or earlier. SonicWall has released patches to address this issue, urging users to upgrade to version 10.2.1.10-62sv or higher. CVE-2023-44221 is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), making it an important vector for remote attackers to compromise systems. SonicWall has also acknowledged that the vulnerability is being actively exploited in the wild, further heightening its potential threat to affected organizations. Conclusion CISA plays a pivotal role in identifying and cataloging vulnerabilities to protect federal and private sector systems from active exploitation, as evidenced by its addition of CVE-2024-38475 and CVE-2023-44221 to the Known Exploited Vulnerabilities Catalog. Organizations are urged to take immediate action, such as applying patches for affected Apache HTTP Server versions and upgrading SonicWall SMA100 devices to secure firmware versions, to mitigate these threats.
An employee at Elon Musk’s artificial intelligence company xAI leaked a private key on GitHub that for the past two months could have allowed anyone to query private xAI large language models (LLMs) which appear to have been custom made for working with internal data from Musk’s companies, including show more ...
SpaceX, Tesla and Twitter/X, KrebsOnSecurity has learned. Image: Shutterstock, @sdx15. Philippe Caturegli, “chief hacking officer” at the security consultancy Seralys, was the first to publicize the leak of credentials for an x.ai application programming interface (API) exposed in the GitHub code repository of a technical staff member at xAI. Caturegli’s post on LinkedIn caught the attention of researchers at GitGuardian, a company that specializes in detecting and remediating exposed secrets in public and proprietary environments. GitGuardian’s systems constantly scan GitHub and other code repositories for exposed API keys, and fire off automated alerts to affected users. GitGuardian’s Eric Fourrier told KrebsOnSecurity the exposed API key had access to several unreleased models of Grok, the AI chatbot developed by xAI. In total, GitGuardian found the key had access to at least 60 fine-tuned and private LLMs. “The credentials can be used to access the X.ai API with the identity of the user,” GitGuardian wrote in an email explaining their findings to xAI. “The associated account not only has access to public Grok models (grok-2-1212, etc) but also to what appears to be unreleased (grok-2.5V), development (research-grok-2p5v-1018), and private models (tweet-rejector, grok-spacex-2024-11-04).” Fourrier found GitGuardian had alerted the xAI employee about the exposed API key nearly two months ago — on March 2. But as of April 30, when GitGuardian directly alerted xAI’s security team to the exposure, the key was still valid and usable. xAI told GitGuardian to report the matter through its bug bounty program at HackerOne, but just a few hours later the repository containing the API key was removed from GitHub. “It looks like some of these internal LLMs were fine-tuned on SpaceX data, and some were fine-tuned with Tesla data,” Fourrier said. “I definitely don’t think a Grok model that’s fine-tuned on SpaceX data is intended to be exposed publicly.” xAI did not respond to a request for comment. Nor did the 28-year-old xAI technical staff member whose key was exposed. Carole Winqwist, chief marketing officer at GitGuardian, said giving potentially hostile users free access to private LLMs is a recipe for disaster. “If you’re an attacker and you have direct access to the model and the back end interface for things like Grok, it’s definitely something you can use for further attacking,” she said. “An attacker could it use for prompt injection, to tweak the (LLM) model to serve their purposes, or try to implant code into the supply chain.” The inadvertent exposure of internal LLMs for xAI comes as Musk’s so-called Department of Government Efficiency (DOGE) has been feeding sensitive government records into artificial intelligence tools. In February, The Washington Post reported DOGE officials were feeding data from across the Education Department into AI tools to probe the agency’s programs and spending. The Post said DOGE plans to replicate this process across many departments and agencies, accessing the back-end software at different parts of the government and then using AI technology to extract and sift through information about spending on employees and programs. “Feeding sensitive data into AI software puts it into the possession of a system’s operator, increasing the chances it will be leaked or swept up in cyberattacks,” Post reporters wrote. Wired reported in March that DOGE has deployed a proprietary chatbot called GSAi to 1,500 federal workers at the General Services Administration, part of an effort to automate tasks previously done by humans as DOGE continues its purge of the federal workforce. A Reuters report last month said Trump administration officials told some U.S. government employees that DOGE is using AI to surveil at least one federal agency’s communications for hostility to President Trump and his agenda. Reuters wrote that the DOGE team has heavily deployed Musk’s Grok AI chatbot as part of their work slashing the federal government, although Reuters said it could not establish exactly how Grok was being used. Caturegli said while there is no indication that federal government or user data could be accessed through the exposed x.ai API key, these private models are likely trained on proprietary data and may unintentionally expose details related to internal development efforts at xAI, Twitter, or SpaceX. “The fact that this key was publicly exposed for two months and granted access to internal models is concerning,” Caturegli said. “This kind of long-lived credential exposure highlights weak key management and insufficient internal monitoring, raising questions about safeguards around developer access and broader operational security.”
Software teams need to follow security best practices to eliminate the leak of secrets, as threat actors increase their scanning for configuration and repository files.
This year's top cyber challenges include cloud authorization sprawl, ICS cyberattacks and ransomware, a lack of cloud logging, and regulatory constraints keeping defenders from fully utilizing AI's capabilities.
Alexei Bulazel, the senior director for cyber on the National Security Council, said it was important to be able "to respond in kind" if the U.S. is targeted with cyberattacks.
It's been almost a year since the Qilin cybercrime group breached sensitive data from U.K. pathology services company Synnovis, and its patient information page is still short on details about what was exposed and how many people were affected.
London retailer Harrods said it had “recently experienced attempts to gain unauthorised access to some of our systems” but its security team "immediately took proactive steps to keep systems safe.”
The Irish Data Protection Commission (DPC) fined Chinese-owned TikTok €530 million ($600 million) for violating GDPR rules about data transfers outside of Europe.
The uptick began in the fourth quarter of 2024 and continued into 2025, with the increases largely attributed to Clop’s exploitation of a popular file sharing service.
The Treasury Department issued the proposed rulemaking Thursday, stating that Huione Group has helped launder funds from North Korean state-backed cybercrime operations and investment scams originating in Southeast Asia.
The U.S. Attorney's Office for the Central District of California announced charges against Rami Khaled Ahmed for allegedly helping to develop and deploy Black Kingdom, which infected “approximately 1,500 computer systems."
The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver. "MintsLoader operates through a multi-stage infection chain involving obfuscated JavaScript and PowerShell scripts," Recorded Future's Insikt Group said in a report shared with The Hacker News. "The malware employs sandbox and virtual machine evasion techniques, a domain
A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big change that pushes individuals signing up for new accounts to use the phishing-resistant authentication method by default. "Brand new Microsoft accounts will now be 'passwordless by default,'" show more ...
Microsoft's Joy Chik and Vasu Jakkal said. "New users will have several passwordless options for
Ireland's Data Protection Commission (DPC) on Tuesday fined popular video-sharing platform TikTok €530 million ($601 million) for infringing data protection regulations in the region by transferring European users' data to China. "TikTok infringed the GDPR regarding its transfers of EEA [European Economic Area] User Data to China and its transparency requirements," the DPC said in a statement. "
Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared by security practitioners from across the community - all free to import and deploy through the platform’s Community Edition. A recent standout is a workflow that automates monitoring for security advisories from CISA and other vendors, enriches advisories with CrowdStrike
Source: socprime.com – Author: Daryna Olyniychuk Zero-day vulnerabilities are no longer rare anomalies—they’re now a core weapon in the modern attacker’s arsenal, with exploitation activity escalating year over year. According to Google’s Threat Intelligence Group (GTIG), in 2024 alone, 75 zero-day show more ...
vulnerabilities were exploited in the wild—a stark indicator of the growing threat to business-critical […] La entrada CVE-2025-31324 Detection: SAP NetWeaver Zero-Day Under Active Exploitation Exposes Critical Systems to Remote Code Execution – Source: socprime.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: socprime.com – Author: Steven Edwards Loading legitimate system drivers from illegitimate or suspicious directories is a known tactic for persistence, evasion, or execution by adversaries. One high-value target in this category is clfs.sys — a legitimate Windows driver tied to the Common Log File show more ...
System. To detect this activity, Microsoft Defender for Endpoint supports […] La entrada Visualizing clfs.sys Threat Activity in Microsoft Defender with Uncoder AI’s Decision Tree – Source: socprime.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: socprime.com – Author: Steven Edwards Potentially Unwanted Applications (PUAs) like NimScan are increasingly used by adversaries during the reconnaissance phase to map open ports or identify network assets. Detecting their execution early is key—but doing so with hash-based or path-based rules in show more ...
Cortex XQL can result in logic that’s functional, but hard to interpret […] La entrada Detecting NimScan Execution with Uncoder AI’s Decision Tree for Cortex XQL – Source: socprime.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: socprime.com – Author: Steven Edwards When malware like the Kalambur backdoor leverages native tools like curl.exe to route traffic through TOR, defenders need visibility at the process and command-line level. But in tools like Microsoft Sentinel, queries for such activity—written in Kusto Query show more ...
Language (KQL)—can quickly grow difficult to interpret. That’s where Uncoder AI’s […] La entrada Detecting Covert TOR Access in Microsoft Sentinel with Uncoder AI’s Decision Tree – Source: socprime.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: socprime.com – Author: Steven Edwards One of the more advanced tactics in attacker playbooks is tampering with event log configurations to erase traces of compromise. Detecting such attempts via Windows Registry modifications is complex—often involving detailed Splunk queries that filter by registry show more ...
keys and permissions. To quickly make sense of these queries, analysts are […] La entrada Exposing Event Log Tampering with Uncoder AI’s AI Decision Tree for Splunk Queries – Source: socprime.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: socprime.com – Author: Steven Edwards CrushFTP is a popular file transfer application, but in the wrong hands, it can become a stealthy foothold for lateral movement. A process like crushftpservice.exe spawning common Windows binaries such as cmd.exe , powershell.exe , or wscript.exe often signals that show more ...
something deeper is at play. This is exactly the […] La entrada CrowdStrike Child Process Detection Enhanced by Uncoder AI’s Short Summary – Source: socprime.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: socprime.com – Author: Steven Edwards File transfer services like CrushFTP are critical for business operations—but they can also be leveraged as stealthy launchpads for post-exploitation activity. When a server process such as crushftpservice.exe spawns command-line interpreters like powershell.exe , show more ...
cmd.exe , or bash.exe , it may signal that an attacker is executing commands or […] La entrada Exposing Suspicious Scripting via CrushFTP with Uncoder AI in Microsoft Defender – Source: socprime.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: socprime.com – Author: Steven Edwards In modern cyberattacks, attackers rely not only on payloads but also on clever evasion techniques. One of the most subtle methods? Whitespace padding in command-line arguments—a tactic often used to obscure malicious behavior and throw off static detection. A show more ...
recent VMware Carbon Black Cloud Query leverages this concept to […] La entrada Detecting Suspicious LNK Whitespace Obfuscation in Carbon Black with Uncoder AI – Source: socprime.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.infosecurity-magazine.com – Author: More than a third (36%) of people have had at least one online account compromised due to weak or stolen passwords in the past year, according to new research by the FIDO Alliance. The survey by the open industry association also found a growing awareness and show more ...
takeup of passkeys – an […] La entrada Third of Online Users Hit by Account Hacks Due to Weak Passwords – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.infosecurity-magazine.com – Author: UK retailers face mounting cyber threats, as Harrods is the latest to confirm a cyber incident, following earlier cyber-attacks involving the Co-operative Group (Co-op) and Marks and Spencer (M&S). Luxury retailer Harrods confirmed on May 1 that it show more ...
experienced attempts to gain unauthorized access to some of its systems, leading it […] La entrada Harrods Latest UK Retailer to Fall Victim to Cyber-Attack in Recent Days – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Senior program manager Mariel Cisneros overcame doubt, imposter syndrome, and Calculus II to build the future of aerospace. Source Views: 0 La entrada How Mariel Cisneros Turned Her Childhood Dreams Into an Engineering Career se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Diverse Podcast: Engineering as a Pathway to Community Leadership with Debra Coleman In this special SWE Diverse Episode for Black History Month, Louvere-Walker Hannon, co-leader of the African American Affinity Group for the Society of Women Engineers sits down with Debra Coleman, co-lead of the SWE African-American show more ...
Affinity Group and the collegiate development lead for… […] La entrada Women’s History Month: Community se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Each month throughout the year, we’ll be spotlighting a different SWE Affinity Group (AG). For the month of March, we are excited to highlight SWE’s Late Career & Retiree (LCR) Affinity Group! Source Views: 0 La entrada SWE Community Spotlight: Late Career & Retiree Affinity Group se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Celebrate Women’s History Month with SWE! Source Views: 0 La entrada Women’s History Month: Outreach se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Do you struggle with imposter syndrome? Read the tips below to use when dealing with imposter syndrome. Source Views: 0 La entrada Imposter Syndrome se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Judith is a consultant for J.L. Bolis LLC. Learn more about her work as a Mining Engineer and how you can #BeThatEngineer! Source Views: 0 La entrada Day in the Life of an Engineer: Judith L. Bolis se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Meet Mary Nimey, a Junior at Colorado School of Mines majoring in Mining Engineering. Source Views: 0 La entrada Mining Engineering Student of the Month: Mary Nimey se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Learn about mining engineering through this sweet activity! Source Views: 0 La entrada Hands on Engineering Activity: Mining Engineering – Chocolate Chip Mining se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . Ireland’s Data Protection Commission (DPC) on Friday fined popular video-sharing platform TikTok €530 million ($601 million) for infringing data protection regulations in the region by transferring European users’ data to China. “TikTok infringed the show more ...
GDPR regarding its transfers of EEA [European Economic Area] User Data to China and its transparency […] La entrada TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared by security practitioners from across the community – all free to import and deploy through the platform’s Community Edition. A recent standout is show more ...
a workflow that automates monitoring for security advisories from […] La entrada How to Automate CVE and Vulnerability Advisory Response with Tines – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.