The Breach News

Iranian Cyber Proxies Engaged, Yet Not Linked to Nation-State Hackers

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Nation-State Hackers Sheltering from Bombardment or Offline Due to Internet Disruptions David Perera (@daveperera), Mathew J. Schwartz (euroinfosec) • March 2, 2026 A U.S. Navy F/A-18E/F Super Hornet launches from an aircraft carrier on Feb. 28, 2026, during Operation Epic Fury, the…

Read MoreIranian Cyber Proxies Engaged, Yet Not Linked to Nation-State Hackers

Researchers Claim Microsoft Office 365 Employs Flawed Email Encryption for Message Security

A recent investigation has uncovered a significant security vulnerability within Microsoft 365. This flaw may allow malicious actors to deduce the contents of encrypted messages, stemming from the implementation of a compromised cryptographic algorithm. According to a report from Finnish cybersecurity firm WithSecure, the encryption mechanism of Office 365 Message…

Read MoreResearchers Claim Microsoft Office 365 Employs Flawed Email Encryption for Message Security

Why Claude Code Security is Disrupting the Cybersecurity Market

Application Security, Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development How Claude’s New AI Code Scanning Tool Will Challenge Application Security Leaders Michael Novinson (MichaelNovinson) • February 23, 2026 The launch of Claude Code Security has positioned Anthropic in direct competition with leading cybersecurity firms, drawing significant attention…

Read MoreWhy Claude Code Security is Disrupting the Cybersecurity Market

Severe RCE Vulnerability Found in Widely Used Cobalt Strike Hacking Tool

HelpSystems has announced a critical out-of-band security update for its Cobalt Strike platform, addressing a remote code execution vulnerability that poses significant risks to system integrity. This vulnerability allows attackers to potentially take control of targeted systems, underscoring the ongoing challenges cybersecurity professionals face in protecting their networks. Cobalt Strike…

Read MoreSevere RCE Vulnerability Found in Widely Used Cobalt Strike Hacking Tool

WikiLeaks Uncovers CIA’s Grasshopper Hacking Framework for Windows

In a significant disclosure from WikiLeaks, a trove of 27 documents purportedly from the US Central Intelligence Agency (CIA) has been released as part of the Vault 7 series. This latest batch introduces the Grasshopper framework, a command-line interface-based tool that facilitates the creation of tailored malware specifically designed to…

Read MoreWikiLeaks Uncovers CIA’s Grasshopper Hacking Framework for Windows

Active Exploitation of React2Shell Vulnerability for Linux Backdoor Deployment

A significant security vulnerability known as React2Shell is currently being exploited by cybercriminals to deploy various malware strains, including KSwapDoor and ZnDoor, as reported by Palo Alto Networks’ Unit 42 and NTT Security. The exploitation of this vulnerability poses urgent risks to organizations, particularly those leveraging React and Next.js frameworks.…

Read MoreActive Exploitation of React2Shell Vulnerability for Linux Backdoor Deployment

The Risks of Cyber Conflicts Between IT, OT, and Medical Devices

Healthcare organizations face significant challenges in device security, often exacerbated by what can be characterized as turf wars between various teams, including healthcare technology management, operational technology staff, IT departments, and security units. This fragmentation stems from unclear ownership and accountability mechanisms around device security, posing a potential risk to…

Read MoreThe Risks of Cyber Conflicts Between IT, OT, and Medical Devices