The Breach News

Bithumb Accidentally Deposits 620,000 Bitcoin ($40 Billion) into Customer Accounts

On February 6, 2026, South Korean cryptocurrency exchange Bithumb experienced a critical operational mishap during a promotional event designed to reward its users. Due to a system configuration error, a number of users found their accounts unexpectedly credited with significant amounts of Bitcoin, rather than the intended modest rewards. During…

Read MoreBithumb Accidentally Deposits 620,000 Bitcoin ($40 Billion) into Customer Accounts

Warning: Ongoing Exploitation of Vulnerabilities in TP-Link, Apache, and Oracle Identified

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified and added three security vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, highlighting concerns over active exploitation. These vulnerabilities pose significant risks to various systems and require immediate attention from cybersecurity professionals. The first vulnerability, CVE-2023-1389, carries a CVSS score…

Read MoreWarning: Ongoing Exploitation of Vulnerabilities in TP-Link, Apache, and Oracle Identified

Cyber Espionage Group Launches Bitcoin Mining Malware Attacks on Asian Nations

Recent investigations by security experts at Bitdefender have unearthed a sophisticated malware campaign, dubbed Operation PZChao, which has been operational for several months, primarily targeting organizations in the government, technology, education, and telecommunications sectors across Asia and the United States. This custom malware is capable of executing several malicious activities,…

Read MoreCyber Espionage Group Launches Bitcoin Mining Malware Attacks on Asian Nations

Zscaler Acquires SquareX to Enhance Browser Security Without Agents

Data Loss Prevention (DLP), Data Security, Endpoint Security CEO Jay Chaudhry: SquareX Acquisition Aims at Unmanaged Devices and Third-Party Access Michael Novinson (@MichaelNovinson) • February 6, 2026 Jay Chaudhry, founder and CEO of Zscaler (Image: Zscaler) In a strategic move to bolster security for web browsers, Zscaler has acquired SquareX,…

Read MoreZscaler Acquires SquareX to Enhance Browser Security Without Agents

Firefox Introduces AI Kill Switch for Enhanced User Privacy

Certainly! Here’s a rewritten version of the content, tailored for a US-based audience concerned with cybersecurity: — As artificial intelligence increasingly integrates into the online experience, user sentiments vary widely. While some embrace the convenience of digital assistants, others express unease regarding data privacy and the burden of frequent notifications.…

Read MoreFirefox Introduces AI Kill Switch for Enhanced User Privacy

Researchers Discover New Vulnerabilities in Widely Used BGP Internet Routing Protocol Software

Cybersecurity researchers have identified significant vulnerabilities within the Border Gateway Protocol (BGP) software, specifically in version 8.4 of FRRouting, an open-source internet routing protocol suite utilized across various Linux and Unix platforms. The flaws expose vulnerable BGP peers to denial-of-service (DoS) attacks, potentially incapacitating BGP sessions and routing tables. The…

Read MoreResearchers Discover New Vulnerabilities in Widely Used BGP Internet Routing Protocol Software

Hackers Can Now Access Data From Air-Gapped Computers Inside Faraday Cages

Recent research from the Cybersecurity Research Center at Ben Gurion University, led by Mordechai Guri, has revealed alarming advancements in methods for extracting data from highly secure environments, specifically air-gapped PCs and systems located within Faraday cages. These devices are typically deemed secure due to their isolation from external networks,…

Read MoreHackers Can Now Access Data From Air-Gapped Computers Inside Faraday Cages

Moltbook: The AI Agent Social Network That Compromised Real Human Data

This week, an investigation by WIRED revealed critical insights into the face recognition app Mobile Fortify, utilized by ICE (Immigration and Customs Enforcement) and CBP (Customs and Border Protection) in efforts to identify individuals across the United States. However, it appears that the application’s design does not facilitate effective verification…

Read MoreMoltbook: The AI Agent Social Network That Compromised Real Human Data