Grafana Labs Confirms Code Theft but Refuses to Pay Ransom, No Customer Data Compromised

📰 Original title: Open source tool maker Grafana Labs says hackers stole its code, refuses to pay ransom

🤖 IA: It's not clickbait ✅
👥 Users: It's not clickbait ✅

View full AI summary: https://en.killbait.com/grafana-labs-confirms-code-theft-but-refuses-to-pay-ransom-no-customer-data-compromised.html?utm_source=mastodon_world&utm_medium=social&utm_campaign=killbait.mastodon_world

#technology #cybers...

Grafana Labs Confirms Code Theft but Refuses to Pay Ransom, No Customer Data Compromised

Grafana Labs, the company behind the widely used open-source web visualization software, reported a security breach in which hackers accessed its GitLab environment using a stolen token credential. While the token allowed the attackers to obtain repositories containing the company's source code, no customer records or financial data were accessed. Grafana has since invalidated the token and implemented stronger security measures to prevent similar incidents. The hackers attempted to extort the company by demanding a ransom to prevent the release of its codebase. Despite this, Grafana chose not to pay, citing FBI guidance against cooperating with cybercriminals, noting that paying does not guarantee the return of stolen data and may encourage future attacks. The incident differs from a recent breach at education technology company Instructure, which paid hackers after a series of network compromises. Grafana emphasized that its code is open-source and publicly available, making the impact of the theft less severe, though the investigation into the full extent of the breach continues. The company plans to share its findings once the probe concludes, highlighting the ongoing importance of cybersecurity vigilance in tech companies.

KillBait

Neue Studie zeigt: Grok 4.1 und Gemini 3 Pro neigen unter Stress zu riskanten Äußerungen, während GPT-5.2 und Claude robust bleiben. Das operative Risiko betrifft jeden Betreiber jenseits der Banken. Identifizieren Sie alle eingesetzten KI-Modelle und deren Versionen in Ihrer Infrastruktur. Ergreifen Sie bei Schwachstellen geeignete Gegenmaßnahmen im Risikomanagement. #ITSicherheit #Cybers

https://www.ctsd.de/insights/2026-04-ki-ki-studie-grok-und-gemini-als-risikofaktor-bei-depressiven-p.html

Security Tip: Visibility is the foundation of software supply chain security. 🛡️ Generating a Software Bill of Materials (SBOM) allows your team to maintain a comprehensive inventory of all components. This is critical for rapid response when a new zero-day is disclosed. Don't wait for a breach to map your dependencies. Use tools like CycloneDX or SPDX to automate the process. Stay informed on the latest threats: https://cvedatabase.com #SBOM #SupplyChain #InfoSec #CyberS...
CVEDatabase.com - Search & Analyze CVE Vulnerabilities

Search and analyze CVE vulnerabilities with instant access to CVSS scores, affected products, and AI-powered remediation guidance.

CVEDatabase.com

📰 Barracuda Warns of Rapid Qilin Ransomware and Spike in Brute-Force Attacks from Middle East

Barracuda SOC reports a massive spike in brute-force attacks from the Middle East targeting FortiGate & SonicWall. ⚠️ Also warns of the lightning speed of Qilin ransomware, which can encrypt networks in minutes. MFA is essential! #Ransomware #CyberS...

🔗 https://cyber.netsecops.io/articles/barracuda-report-qilin-ransomware-speed-and-middle-east-brute-force-spike/?utm_source=m…

Barracuda Warns of Rapid Qilin Ransomware and Spike in Brute-Force Attacks from Middle East

Barracuda's April 2026 threat report highlights a surge in brute-force attacks from the Middle East and warns of the rapid attack speed of the Qilin ransomware group.

CyberNetSec.io

**AI agent bị tấn công: Tấn công dữ liệu, lạm dụng công cụ, và bảo mật mã nguồn!** 🚨 74K lần tương tác cho thấy 37.8% chứa hành vi tấn công, trong đó 19.2% là **trích xuất dữ liệu bí mật**, 8.1% **lạm dụng API**, 10% **độc tôn RAG**. Cảnh báo mới: **Hàng loạt mã AI sinh ra có lỗi OWASP Top 10** (45%) và **tin tặc lan truyền lây lan giữa các agent**! 🔒 Bảo vệ hệ thống, xử lý sạch dữ liệu đầu vào. Báo cáo chi tiết & code miễn phí: raxe.ai & GitHub.

#AnToanAI #BaoMatHeThong #AIsecurity #CyberS

📰 INC Ransomware OPSEC Fail: Reused Infrastructure Leads to Data Recovery for 12 U.S. Victims

A major OPSEC fail by INC Ransomware allowed security firm Cyber Centaurs to recover data for 12 US victims. The gang reused cloud backup infrastructure with hardcoded credentials, leaving a trail for investigators. ✅ #Ransomware #INC #OPSEC #CyberS...

🔗 https://cyber.netsecops.io/articles/inc-ransomware-opsec-fail-allows-data-recovery-for-12-us-firms/?utm_source=mastodon&utm…

INC Ransomware OPSEC Fail: Reused Infrastructure Leads to Data Recovery for 12 U.S. Victims

An operational security (OPSEC) failure by the INC ransomware group, involving reused cloud infrastructure and hardcoded credentials, allowed Cyber Centaurs to recover stolen data for 12 U.S. companies.

CyberNetSec.io
Check this out 🎉 Miguel Geronilla, GCash's own CISO and tech genius, just scooped the "Digital Leader of the Year" award at PhilSec 2025! This is huge – #GCash keeps leveling up as the top pick for digital trust and cybersecurity excellence. 🤖🔒 #CyberS

Hot Wheels celebrates 2024 with Polestar Design and Legends Tour winners
Mattel’s diecast model car brand was involved in two high-profile efforts—the Polestar Design Contest with Swedish performance EV partner Polestar and its own Hot Wheels Legends Tour—that just culminated in its latest global search for the next “hot wheels.”
#automotivedesign #automotivedesigncontest #CyberS

https://futurride.com/2024/12/16/hot-wheels-celebrates-2024-with-polestar-design-and-legends-tour-winners/

Hot Wheels celebrates 2024 with Polestar Design and Legends Tour winners

Mattel’s diecast model car brand was involved in two high-profile efforts—the Polestar Design Contest with Swedish performance EV partner Polestar and its own Hot Wheels Legends Tour—that just culminated in its latest global search for the next “hot wheels.”

Futurride
New note by cybersecurity
https://poliverso.org/display/0477a01e-1466-94bd-068b-7b4617683099
h1]Cosa sappiamo dell’attacco informatico ad AT&T https://www.startmag.it/cybersecurity/at-t-attacco-informatico/[/h1]La società di telecomunicazioni americana AT&T ha subìto un attacco informatico che coinvolge tutti gli utenti della rete mobile. I fatti e i commenti degli esperti.L'articolo viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁) e proviene dalla sezione #Cybers
Cybersecurity & cyberwarfare

h1]Cosa sappiamo dell’attacco informatico ad AT&T[/h1] La società di telecomunicazioni americana AT&T ha subìto un attacco informatico che coinvolge tut...

RT @ChrisAghroum
Food4mind] La #France précise sa vision du droit international dans les opérations #cybers et pose la question de la #souveraineté nationale au sein d'attaques aux dimensions mondiales. http://lignesdedefense.blogs.ouest-france.fr/archive/2019/09/09/le-droit-international-dans-les-operations-cyber-20440.html
La France précise sa vision du droit international dans les opérations cyber

Le ministère des Armées a diffusé, hier, un rapport d'une vingtaine de pages qui précise la position française sur l’application du droit...