The Breach News

Groups Oppose HHS’s Proposed Rollbacks on Health IT

Healthcare, Industry Specific, Standards, Regulations & Compliance Healthcare Groups Warn of Risks from HHS’ Proposed IT Certification Changes Marianne Kolbasuk McGee ( HealthInfoSec) • March 3, 2026 Proposed reductions in health IT certification requirements by HHS are facing resistance from industry groups concerned about privacy and security implications. (Image: Getty…

Read MoreGroups Oppose HHS’s Proposed Rollbacks on Health IT

State-Sponsored Hackers Likely Targeted MS Exchange 0-Days at Approximately 10 Organizations

On Friday, Microsoft reported a significant security incident involving the exploitation of two zero-day vulnerabilities in Microsoft Exchange servers by a single threat actor group as far back as August 2022. This group successfully gained initial access through coordinated attacks targeting fewer than ten organizations worldwide. The compromises facilitated the…

Read MoreState-Sponsored Hackers Likely Targeted MS Exchange 0-Days at Approximately 10 Organizations

StoneDrill Disk Wiping Malware Discovered Targeting European Industries

A newly identified disk-wiping malware known as StoneDrill has emerged, targeting a petroleum company in Europe. This malware bears similarities to the infamous Shamoon, which notoriously deleted data from 35,000 computers at Saudi Arabia’s national oil company back in 2012. Disk-wiping malware like StoneDrill can inflict severe damage on organizations…

Read MoreStoneDrill Disk Wiping Malware Discovered Targeting European Industries

🔍 Weekly Overview: Fortinet Vulnerability, Chrome Zero-Day, BadIIS Malware, Record DDoS Attack, SaaS Security Incident & More

Cybersecurity Weekly Update: New Vulnerabilities and Persistent Threats This week, the cybersecurity landscape revealed alarming developments as multiple organizations fell victim to sophisticated attacks, highlighting the evolving tactics employed by cybercriminals. Notably, Fortinet disclosed a serious vulnerability affecting its FortiWeb application firewall, categorized as CVE-2025-58034. This flaw, assigned a medium…

Read More🔍 Weekly Overview: Fortinet Vulnerability, Chrome Zero-Day, BadIIS Malware, Record DDoS Attack, SaaS Security Incident & More

JetStream Secures $34M Seed Funding to Advance AI Governance

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Ex-CrowdStrike Product Leader Unveils Blueprint Model to Tackle MCP Server Issues and Cost Management Michael Novinson (MichaelNovinson) • March 3, 2026 Raj Rajamani, co-founder and CEO of JetStream (Image: JetStream) JetStream, a startup focusing on artificial intelligence governance, has successfully…

Read MoreJetStream Secures $34M Seed Funding to Advance AI Governance

Research Identifies Supply Chain Vulnerabilities in Packagist PHP Repository

Researchers have uncovered a critical security vulnerability in Packagist, the widely used PHP software package repository, which has since been patched. This flaw had the potential to facilitate malicious software supply chain attacks, posing significant risks to developers who rely on Packagist for managing project dependencies through Composer, the PHP…

Read MoreResearch Identifies Supply Chain Vulnerabilities in Packagist PHP Repository

Proposed Legislation Would Permit Cyber Crime Victims to Engage in Hacking Back

The debate surrounding the legality and morality of counter-hacking actions, known colloquially as “hacking back,” has resurfaced as a significant concern among cybersecurity professionals and lawmakers. As cybersecurity incidents continue to escalate, victims are often left questioning whether they can retaliate against their attackers. While hacking back is considered illegal…

Read MoreProposed Legislation Would Permit Cyber Crime Victims to Engage in Hacking Back

Qilin Ransomware Transforms South Korean MSP Breach into ‘Korean Leaks’ Data Heist Affecting 28 Victims

Recent developments in South Korea’s financial sector have revealed a complex and well-coordinated cyber assault, characterized as a sophisticated supply chain attack leading to the deployment of Qilin ransomware. This incident underscores a growing concern for organizations in the region as they contend with more advanced cyber threats. Bitdefender reports…

Read MoreQilin Ransomware Transforms South Korean MSP Breach into ‘Korean Leaks’ Data Heist Affecting 28 Victims

Critical Takeover Vulnerability Discovered in Juniper PTX Routers

Network Firewalls, Network Access Control, Security Operations Juniper Issues Urgent Advisory to Customers on Firewall Vulnerability Greg Sirico • March 3, 2026 Image: Mats Wiklund/Shutterstock Juniper Networks has alerted its customers to a critical vulnerability affecting the PTX Series routers, which could grant unauthorized actors root-level privileges, enabling them to…

Read MoreCritical Takeover Vulnerability Discovered in Juniper PTX Routers