The Breach News

DHS Funding Gap Could Ground Federal Cybersecurity Personnel

Government, Industry Specific Acting Chief Informs Lawmakers of Potential Furloughs Amid Funding Uncertainty Chris Riotta (@chrisriotta) • February 11, 2026 In a critical address to Congress, CISA’s acting director, Madhu Gottumukkala, highlighted the severe implications of a funding lapse for the Cybersecurity and Infrastructure Security Agency. If Congress fails to…

Read MoreDHS Funding Gap Could Ground Federal Cybersecurity Personnel

Democratic Party Introduces Bill for No-Fault Data Leak Liability – 조선일보

Democratic Party Unveils No-Fault Data Leak Liability Legislation In a recent legislative move aimed at enhancing data privacy and security, the Democratic Party has introduced a no-fault data leak liability bill. This proposed legislation seeks to shift the responsibilities surrounding data breaches from businesses to their actually compromised systems, mitigating…

Read MoreDemocratic Party Introduces Bill for No-Fault Data Leak Liability – 조선일보

Hackers Targeting Vulnerability in WordPress Elementor Pro: Millions of Sites in Danger!

Recent developments have spotlighted a security vulnerability in the Elementor Pro plugin, a popular tool for building websites on the WordPress platform. Threat actors are currently exploiting a newly-disclosed weakness that was patched in version 3.11.7, which was released on March 22, 2023. The vulnerability, categorized as a case of…

Read MoreHackers Targeting Vulnerability in WordPress Elementor Pro: Millions of Sites in Danger!

TRITON Malware Threatens Critical Infrastructure with Potential for Physical Harm

Recent research has revealed a sophisticated malware strain named Triton, also referred to as Trisis, specifically engineered to compromise industrial control systems (ICS), posing significant threats to human safety and operational integrity. This malware exclusively targets Triconex Safety Instrumented System (SIS) controllers, produced by Schneider Electric, which serve as autonomous…

Read MoreTRITON Malware Threatens Critical Infrastructure with Potential for Physical Harm

The Resurgent Lumma Stealer Returns with Irresistible Lures

Lumma Malware Resurfaces, Targeting Windows Users Amid Renewed Attacks In a significant cybersecurity development, law enforcement agencies worldwide successfully disrupted Lumma, an infostealer responsible for infecting approximately 395,000 Windows computers within two months prior to a coordinated operation last May. However, researchers have announced that Lumma, also known as Lumma…

Read MoreThe Resurgent Lumma Stealer Returns with Irresistible Lures

AI-Generated Malware Takes Advantage of React2Shell for Small Gains

Artificial Intelligence & Machine Learning, Cybercrime, Fraud Management & Cybercrime AI-Driven Malware Targets React2Shell Vulnerability, Compromising 91 Hosts Rashmi Ramesh (rashmiramesh_) • February 11, 2026 Image: Shutterstock Recent research has identified artificial intelligence-generated malware leveraging the React2Shell vulnerability, allowing malicious actors to craft exploits without requiring coding expertise. This operation…

Read MoreAI-Generated Malware Takes Advantage of React2Shell for Small Gains

McLaren Health Reaches $14 Million Settlement Following Two Data Breaches

McLaren Health Care Settles Class Action Lawsuit Following Major Data Breaches McLaren Health Care, headquartered in Grand Blanc, Michigan, has reached a $14 million settlement to address a class action lawsuit arising from two significant data breaches that potentially exposed patient information. The organization operates a network that includes 12…

Read MoreMcLaren Health Reaches $14 Million Settlement Following Two Data Breaches

Active Exploitation of Vulnerabilities in Cacti, Realtek, and IBM Aspera Faspex

Cyber Threat Actors Exploit Critical Vulnerabilities in Cacti, Realtek, and IBM Aspera Faspex Recent cyberattacks have exposed critical security vulnerabilities in multiple systems, notably Cacti, Realtek, and IBM Aspera Faspex, amid ongoing exploitation by various threat actors targeting unpatched installations. This surge in activity highlights the pressing need for organizations…

Read MoreActive Exploitation of Vulnerabilities in Cacti, Realtek, and IBM Aspera Faspex