The Breach News

EU Privacy Regulators Criticize Digital Omnibus

Artificial Intelligence & Machine Learning, Data Privacy, Data Security Proposed Regulation Changes Face Backlash for Potential Erosion of Privacy Rights David Meyer • February 12, 2026 Image: mixmagic/Shutterstock The European Commission’s recent proposal to amend tech regulations, framed as a measure to enhance competitiveness across the continent, has sparked significant…

Read MoreEU Privacy Regulators Criticize Digital Omnibus

Despite 2026 Advances, Hospitals Fail to Stop Snooping into Celebrity Medical Records – DataBreaches.Net

In a troubling incident highlighting ongoing privacy issues in healthcare, social media influencer Josh Clarke of “Josh and Jase” fame has revealed that he was a victim of unauthorized access to his medical records at a Michigan hospital. Clarke’s disturbing experience raises pressing questions about the effectiveness of existing privacy…

Read MoreDespite 2026 Advances, Hospitals Fail to Stop Snooping into Celebrity Medical Records – DataBreaches.Net

Critical WooCommerce Payments Vulnerability Fixed for Over 500,000 WordPress Sites

Critical Vulnerability Discovered in WooCommerce Payments Plugin A severe security vulnerability has been identified in the WooCommerce Payments plugin utilized by over 500,000 WordPress websites. This flaw poses a significant risk, enabling unauthorized actors to gain admin access to affected online stores, as noted in a security advisory issued on…

Read MoreCritical WooCommerce Payments Vulnerability Fixed for Over 500,000 WordPress Sites

Major Crypto-Mining Exchange Breached; $70 Million in Bitcoin Stolen

Major Cryptocurrency Platform NiceHash Hit by Significant Data Breach In a dramatic escalation of the ongoing cybersecurity landscape, NiceHash, a prominent cryptocurrency mining marketplace, has fallen victim to a substantial hacking incident. This breach has resulted in the theft of more than 4,700 Bitcoins, valued at over $57 million at…

Read MoreMajor Crypto-Mining Exchange Breached; $70 Million in Bitcoin Stolen

How CIOs Are Steering Through the AI-Fueled Software Market Downturn

Application Security, Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development AI Revolutionizes Economics Amid Persistent Challenges in Enterprise IT Architecture Jennifer Lawinski, Sandhya Michu • February 11, 2026 Anthropic’s recent upgrade of its Claude platform has stirred significant turmoil in the software market. (Image: Shutterstock) This month saw…

Read MoreHow CIOs Are Steering Through the AI-Fueled Software Market Downturn

Healthcare Tops Target List for Ransomware Groups with 49% Year-Over-Year Attack Increase – The HIPAA Journal

Healthcare Sector Faces a Surge in Ransomware Attacks: 49% Increase Year-Over-Year Recent data reveals a troubling trend in cybersecurity as the healthcare sector continues to be the most targeted industry for ransomware attacks, with incidents surging by 49% over the past year. This alarming increase underscores the evolving threat landscape,…

Read MoreHealthcare Tops Target List for Ransomware Groups with 49% Year-Over-Year Attack Increase – The HIPAA Journal

Microsoft Sounds Alarm on Hidden Outlook Vulnerability Targeted by Russian Hackers

Microsoft recently released important guidance for its users following the discovery of a significant vulnerability in Outlook, designated as CVE-2023-23397, which carries a high CVSS score of 9.8. This critical flaw primarily involves privilege escalation, enabling attackers to exploit it for the theft of NT LAN Manager (NTLM) hashes, potentially…

Read MoreMicrosoft Sounds Alarm on Hidden Outlook Vulnerability Targeted by Russian Hackers

Android Vulnerability Allows Hackers to Inject Malware into Apps Without Modifying Signatures

A newly uncovered vulnerability dubbed “Janus” poses a significant threat to millions of Android devices, allowing attackers to overwrite legitimate applications with harmful malware without altering their signature verification. This critical flaw enables malicious updates to be distributed that maintain the appearance and functionality of the original applications. The vulnerability,…

Read MoreAndroid Vulnerability Allows Hackers to Inject Malware into Apps Without Modifying Signatures