DoorDash Confirms Data Breach After Social Engineering Scam

Food delivery service DoorDash has confirmed that it suffered a data breach in October 2025, where some customers’ personal information was accessed. The company detailed that the incident was the result of a social engineering scam targeting one of its employees. Details of the Data Breach DoorDash informed customers via email about the incident, providing details about the compromised information: Data affected: Names, phone numbers, physical addresses and email details. Data NOT affected: The company highlighted that confidential information, such as social security numbers, driver’s licenses or bank card and payment information, was not accessed. So far, DoorDash has stated that there is no indication that the data has been misused for fraud or identity theft. ...

November 18, 2025 · Comfidentia

The rise of AI in new account fraud

Artificial intelligence (AI) technology is increasingly being adopted by fraudsters to commit new account fraud (NAF) and bypass even biometric checks. This is revealed by a new report from Entrust, which analyzed data from more than one billion identity verifications in 30 sectors and 195 countries between September 2024 and September 2025. The report details how Generative AI (GenAI) has democratized the creation of counterfeit ID documents and deepfakes, allowing fraudsters to generate hyper-realistic replicas of documents and impersonate identities to open new fraudulent accounts. ...

November 18, 2025 · Comfidentia

🚨 RondoDox exploits unpatched XWiki servers to expand its botnet

The RondoDox botnet malware is actively exploiting unpatched XWiki servers via the critical vulnerability CVE-2025-24893 (CVSS 9.8), allowing arbitrary remote code execution. 🔍 CVE-2025-24893 Evaluation injection bug that allows any guest user to execute remote code via the /bin/get/Main/SolrSearch endpoint. Affected versions: All before XWiki 15.10.11, 16.4.1 or 16.5.0RC1 Patch available from: February 2025 🤖 RondoDox: Expanding Botnet RondoDox incorporates vulnerable devices to: DDoS attacks (HTTP, UDP, TCP) Cryptocurrency mining Persistent access (reverse shells, backdoors) Chronology: March 2025 (first evidence) → Nov 3 (first RondoDox exploitation) → Nov 7 (maximum peak) → Nov 11 (new wave) ...

November 15, 2025 · Comfidentia
Cybersecurity in healthcare organizations

🔎 Cybersecurity at Risk: Audit reveals critical gaps in healthcare organization

A recent cybersecurity audit, conducted by our expert team at Comfidentia, revealed critical vulnerabilities in the technological infrastructure of a recognized healthcare organization. This audit, requested following a minor data leak incident, identified failures in network segmentation, deficiencies in internal access control, and the absence of updated backup protocols. The audit included penetration testing, access policy review, and regulatory compliance analysis, revealing results that exposed unnecessary exposure to threats such as ransomware and internal attacks. ...

August 7, 2025 · Comfidentia
Reducing digital attack surface

How to Reduce Your Digital Attack Surface: Key Recommendations for Comfidentia

In an increasingly digitalized world, organizations constantly face new cyber threats. Reducing the digital attack surface is essential to protect information assets and maintain operational continuity. What is the attack surface? The attack surface refers to all entry points and vulnerabilities that an attacker can exploit to access an organization’s systems. This includes: Exposed web applications and APIs Network services accessible from the internet Weak or compromised credentials Systems without security patches Insecure configurations Key Recommendations 1. Asset Inventory Maintain an up-to-date inventory of all your technological assets: servers, applications, IoT devices, and cloud services. ...

May 8, 2025 · Comfidentia
Español English