The Breach News

Mastang Panda Exploits Venezuela News to Distribute LOTUSLITE Malware

Researchers at the Acronis Threat Research Unit (TRU) have uncovered a troubling trend where hackers are exploiting current news headlines to target U.S. government entities. Eschewing complex exploits, these cybercriminals utilize a more straightforward method: leveraging public curiosity about current events. In a report by Ilia Dafchev and Subhajeet Singha,…

Read MoreMastang Panda Exploits Venezuela News to Distribute LOTUSLITE Malware

Will CIOs Face Accountability?

3rd Party Risk Management, Artificial Intelligence & Machine Learning, Governance & Risk Management Rising Trend of Third-Party Breaches Affects AI Suppliers Rahul Neel Mani (@rneelmani) • January 13, 2026 Image: Pixabay The recent breach affecting Korean Air, which compromised sensitive data belonging to thousands of employees, was initially dismissed as…

Read MoreWill CIOs Face Accountability?

Hundreds of Citrix NetScaler ADC and Gateway Servers Compromised in Major Cyber Attack

Recent reports indicate that numerous Citrix NetScaler ADC and Gateway servers have suffered breaches orchestrated by cybercriminals deploying web shells. This information comes from the Shadowserver Foundation, which highlights a worrying trend in cybersecurity threats. The attacks exploit CVE-2023-3519, a severe code injection vulnerability that can facilitate unauthenticated remote code…

Read MoreHundreds of Citrix NetScaler ADC and Gateway Servers Compromised in Major Cyber Attack

Ex-Microsoft Engineer Sentenced to Prison for Involvement in Reveton Ransomware Scheme

A former Microsoft network engineer, Raymond Odigie Uadiale, recently received an 18-month prison sentence for his role in a money laundering operation tied to the Reveton ransomware. Uadiale had pleaded guilty earlier this year, highlighting the ongoing issue of cybersecurity threats and the criminal exploitation of digital platforms. Reveton, a…

Read MoreEx-Microsoft Engineer Sentenced to Prison for Involvement in Reveton Ransomware Scheme

Caution: Linux Mint Website Compromised; ISOs Substituted with Backdoored OS

Cybersecurity Incident: Linux Mint Users Exposed to Malicious ISO Download On February 20, a significant cybersecurity incident occurred involving the popular Linux Mint operating system, specifically its 17.3 Cinnamon edition. An unknown hacker or group of individuals successfully infiltrated the Linux Mint website, compromising the integrity of the download links…

Read MoreCaution: Linux Mint Website Compromised; ISOs Substituted with Backdoored OS

The Distinction Between Accountability and Taking Ownership

Navigating Influence Without Authority in Cybersecurity In the realm of cybersecurity, a frequent tension exists between those who possess technical expertise and those who wield authority within organizations. More often than not, the most influential figures in making cybersecurity decisions are business owners rather than the technical experts directly involved…

Read MoreThe Distinction Between Accountability and Taking Ownership

Cyberattacks Target European Space Agency, Resulting in Theft of Hundreds of Gigabytes of Data – Ada Derana

The European Space Agency (ESA) recently suffered a significant data breach, with reports indicating that hackers pilfered hundreds of gigabytes of sensitive information. This incident underscores the ongoing threat that cybercriminals pose to high-profile organizations, particularly those within the aerospace sector. The scale of the breach, which has yet to…

Read MoreCyberattacks Target European Space Agency, Resulting in Theft of Hundreds of Gigabytes of Data – Ada Derana