The Breach News

Webinar Announcement: Discover How ITDR Solutions Mitigate Advanced Identity Threats

Cybersecurity Webinar: Addressing the Growing Threat of Identity Theft In a rapidly evolving digital landscape, identity theft has transcended the traditional image of stolen credit cards. Cybercriminals have now employed sophisticated methods to breach organizations, putting valuable credentials—and entire systems—at severe risk. Recent trends have shown a surge in malicious…

Read MoreWebinar Announcement: Discover How ITDR Solutions Mitigate Advanced Identity Threats

Unveiling the Risks of GenAI: Cybersecurity Challenges for Businesses

The Rise of Generative AI and Associated Cybersecurity Risks The swift proliferation of Generative AI (GenAI) tools in both personal and business contexts has significantly outstripped the development of adequate security protocols. Business practitioners are often under immense pressure to implement GenAI solutions rapidly, leading to security considerations sometimes being…

Read MoreUnveiling the Risks of GenAI: Cybersecurity Challenges for Businesses

Mondelez and BCLP Reach $750K Settlement to Resolve Data Breach Lawsuits

Mondelez Global Workers Pursue $750,000 Settlement Over Data Breach On October 4, 2024, attorneys representing workers from Mondelez Global LLC filed a motion in an Illinois federal court, seeking judicial approval for a $750,000 settlement. This agreement aims to resolve proposed class action lawsuits related to data privacy that have…

Read MoreMondelez and BCLP Reach $750K Settlement to Resolve Data Breach Lawsuits

Serious Vulnerabilities in Traccar GPS System Leave Users Open to Remote Attacks

Traccar GPS System Exposed to Critical Vulnerabilities Leading to Remote Code Execution Recent disclosures have unveiled two significant security vulnerabilities within the open-source Traccar GPS tracking system, potentially allowing unauthenticated attackers to execute remote code under specific circumstances. These vulnerabilities, identified by Horizon3.ai researcher Naveen Sunkavally, are primarily path traversal…

Read MoreSerious Vulnerabilities in Traccar GPS System Leave Users Open to Remote Attacks

New Ransomware-as-a-Service ‘Eldorado’ Aims at Windows and Linux Platforms

A new ransomware-as-a-service (RaaS) operation, known as Eldorado, has emerged with capabilities to lock files on both Windows and Linux platforms. This malware variant first surfaced on March 16, 2024, when its affiliate program was advertised on the infamous RAMP ransomware forum. The cybersecurity firm Group-IB, based in Singapore, has…

Read MoreNew Ransomware-as-a-Service ‘Eldorado’ Aims at Windows and Linux Platforms

White House Official Urges Insurance Companies to Cease Ransomware Payment Funding, Though It Lacks Official Directive – DataBreaches.Net

Insurance Companies Urged to Cease Ransomware Payment Incentives In a recent statement, a senior official from the White House emphasized the urgent need for insurance companies to stop providing policies that encourage extortion payments during ransomware attacks. This call to action aligns with a growing concern among cybersecurity experts regarding…

Read MoreWhite House Official Urges Insurance Companies to Cease Ransomware Payment Funding, Though It Lacks Official Directive – DataBreaches.Net

Researchers Discover More Than 20 Vulnerabilities in Supply Chains of MLOps Platforms

Cybersecurity experts are raising alarm over significant security risks identified within the machine learning (ML) software supply chain. Investigations have uncovered more than 20 vulnerabilities that could be exploited to compromise MLOps (Machine Learning Operations) platforms, potentially exposing businesses to severe operational risks. These vulnerabilities, categorized as inherent and implementation…

Read MoreResearchers Discover More Than 20 Vulnerabilities in Supply Chains of MLOps Platforms

Cybercriminals Target Jenkins Script Console for Cryptocurrency Mining Attacks

Cybersecurity experts have identified a significant vulnerability in Jenkins, a widely-used continuous integration and delivery platform. Attackers can exploit improperly configured Jenkins Script Console instances to facilitate malicious activities, including cryptocurrency mining. Shubham Singh and Sunil Bharti from Trend Micro recently detailed this risk, noting that misconfigurations related to authentication…

Read MoreCybercriminals Target Jenkins Script Console for Cryptocurrency Mining Attacks

Fileless Malware Consuming the Computing Resources of Linux Servers

A significant cybersecurity incident is unfolding, with thousands of Linux servers across the globe falling prey to a sophisticated dropper malware. This concerning development involves the deployment of proxyjacking and cryptomining malware, indicating a dangerous shift in the tactics employed by cybercriminals. The primary targets of this attack include organizations…

Read MoreFileless Malware Consuming the Computing Resources of Linux Servers