The Breach News

Maya on Money | South Africa’s New Big Data Reveals You Should Be Wary – News24

Cybersecurity Alert: Insights from South Africa’s Recent Big Data Findings In a significant revelation showcased by South African big data analytics, a pressing warning has emerged for businesses globally: heightened vigilance is essential in today’s cybersecurity landscape. Reports indicate that this latest analysis uncovers patterns that may leave organizations vulnerable…

Read MoreMaya on Money | South Africa’s New Big Data Reveals You Should Be Wary – News24

Warning: New Phishing Scheme Disguises Keylogger as Bank Payment Notification

A recently identified phishing campaign is employing a sophisticated new loader malware, which serves to deliver the information-stealer and keylogger known as Agent Tesla. Trustwave SpiderLabs reported that on March 8, 2024, they encountered a phishing email featuring this malware, disguised as a bank payment notification that entices recipients to…

Read MoreWarning: New Phishing Scheme Disguises Keylogger as Bank Payment Notification

Chinese Hackers Attack India’s Power Grid Amid Rising Geopolitical Tensions

Cybersecurity Alert: Chinese-Sponsored Attacks Target India’s Critical Infrastructure Recent revelations by cybersecurity experts have uncovered a series of coordinated cyberattacks aimed at India’s critical infrastructure, notably its power grid. These attacks, attributed to state-sponsored Chinese hacking groups, coincide with escalating border tensions between India and China that intensified in May…

Read MoreChinese Hackers Attack India’s Power Grid Amid Rising Geopolitical Tensions

LifeLabs Paid Ransom to Recover Stolen Medical Data of 15 Million Canadians

LifeLabs Suffers Major Data Breach Affecting 15 Million Canadians LifeLabs, Canada’s largest healthcare laboratory testing service provider, has reported a significant data breach that has compromised sensitive personal and medical information of nearly 15 million customers. The company revealed details of the breach in a press release on its official…

Read MoreLifeLabs Paid Ransom to Recover Stolen Medical Data of 15 Million Canadians

Who’s Responsible for Space Cybersecurity?

Business Continuity Management / Disaster Recovery, Geo Focus: Australia, Geo-Specific Orbital Frontier: An Ungoverned Internet Vulnerable to Attack Maryam Shoraka • November 11, 2025 Image: Freepik The domain of cybersecurity is venturing into uncharted territories as humanity engages in an aggressive pursuit to commercialize outer space. As critical infrastructure expands…

Read MoreWho’s Responsible for Space Cybersecurity?

How a $4.3M Crypto Home Invasion Highlights the Risks of a Single Data Leak for Your Safety and Wallet

Significant Cryptocurrency Heist Highlights Security Gaps in Self-Custody In June 2024, a group of three men executed a meticulously planned home invasion in the UK, successfully stealing over $4.3 million in cryptocurrency. Dressed as delivery drivers, the assailants forced their way into a residence at gunpoint, coercing the victim into…

Read MoreHow a $4.3M Crypto Home Invasion Highlights the Risks of a Single Data Leak for Your Safety and Wallet

Gootkit RAT Leverages SEO Tactics for Malware Distribution via Compromised Websites

The Gootkit malware framework, which has been recognized for distributing banking Trojans, has recently undergone significant enhancements that enable it to deliver a broader spectrum of malicious software, including ransomware variants. According to researchers from Sophos, Gabor Szappanos and Andrew Brandt, the Gootkit malware family has been in existence for…

Read MoreGootkit RAT Leverages SEO Tactics for Malware Distribution via Compromised Websites

Overcoming Latency in Your Cybersecurity Career: A Guide

Leadership & Executive Communication, Training & Security Leadership Eliminate Barriers to Your Career Growth and Enhance Your Professional Output Brandy Harris • November 19, 2025 Image: Shutterstock In the realms of IT and cybersecurity, many professionals experience the aggravation of a lagging network—a scenario where pages load hesitantly, commands stall,…

Read MoreOvercoming Latency in Your Cybersecurity Career: A Guide