The Breach News

Emerging HijackLoader Modular Malware Gains Traction in the Cybercrime Landscape

A new malware loader known as HijackLoader is increasingly being adopted by cybercriminals to deploy various payloads, including information-stealing software such as DanaBot, SystemBC, and RedLine Stealer. First identified in July 2023, HijackLoader distinguishes itself with a modular architecture that allows for adaptable code injection and execution. This characteristic is…

Read MoreEmerging HijackLoader Modular Malware Gains Traction in the Cybercrime Landscape

Nokia Launches Investigation into Alleged Source Code Data Breach

Nokia Investigates Cyberattack Linked to Hacking Group IntelBroker Nokia has launched an extensive inquiry into a cyberattack reportedly executed by a hacking group identified as IntelBroker. This group has been disseminating sensitive corporate information across the internet for the last three days, prompting significant concerns both within Nokia and the…

Read MoreNokia Launches Investigation into Alleged Source Code Data Breach

New Android Trojan ‘SoumniBot’ Outwits Detection with Smart Techniques

A new Android Trojan, named SoumniBot, has been uncovered, specifically targeting users in South Korea by exploiting vulnerabilities in the Android manifest extraction and parsing procedures. This malware is distinctive for its unconventional methods of evasion, particularly through the obfuscation of the Android manifest, as revealed by Kaspersky researcher Dmitry…

Read MoreNew Android Trojan ‘SoumniBot’ Outwits Detection with Smart Techniques

Majority of Cybersecurity Breaches Originate from Third-Party Vendors – Medical Buyer

In a recent address at the HIMSS Healthcare Cybersecurity Forum, cybersecurity experts John Riggi and Richard Staynings emphasized the significant cybersecurity threats that arise from third-party vendors and associated organizations. Riggi, a former FBI special agent and a national advisor for Cybersecurity and Risk at the American Hospital Association, highlighted…

Read MoreMajority of Cybersecurity Breaches Originate from Third-Party Vendors – Medical Buyer

Google Addresses Another Actively Exploited Chrome Zero-Day Vulnerability

Google Addresses Critical Security Flaws in Chrome Browser In a proactive response to ongoing security concerns, Google has deployed patches to rectify nine significant vulnerabilities in its Chrome web browser, one of which is a serious zero-day flaw that has reportedly been exploited in the wild. This vulnerability, designated as…

Read MoreGoogle Addresses Another Actively Exploited Chrome Zero-Day Vulnerability

Cybercriminals Leverage Phishing and EV Certificates to Distribute Ransomware

The cyber threat landscape continues to evolve as researchers from Trend Micro report that the perpetrators behind the RedLine and Vidar information stealers are shifting their tactics to include ransomware attacks. This alarming trend has been facilitated through phishing campaigns that distribute malware utilizing Extended Validation (EV) code signing certificates,…

Read MoreCybercriminals Leverage Phishing and EV Certificates to Distribute Ransomware

Three UK Local Council Websites Targeted by DDoS Cyber Attacks

DDoS Attack Disrupts Three UK Councils: NoSensitive Data Compromised In a recent cybersecurity incident, three councils in the United Kingdom—Salford, Portsmouth, and Middlesbrough—experienced significant disruptions due to a Distributed Denial of Service (DDoS) attack. These attacks led to temporary outages, rendering the councils’ websites inaccessible to users and hampering public…

Read MoreThree UK Local Council Websites Targeted by DDoS Cyber Attacks