The Breach News

Overcoming Shiny Object Syndrome: A Path to Focus and Clarity

Next-Generation Technologies & Secure Development, Professional Certifications & Continuous Training, Training & Security Leadership Evaluating Tools Saves Money but Demands Technical, Compliance, and Business Acumen Brandy Harris • October 1, 2025 Image: Shutterstock The cybersecurity landscape is increasingly populated by vendors promoting enticing tools, complete with flashy demonstrations and bold…

Read MoreOvercoming Shiny Object Syndrome: A Path to Focus and Clarity

NSWRA Faces Data Breach Affecting Resilient Homes Program Applicants

The NSW Reconstruction Authority (RA), an agency of the government, has recently faced scrutiny following a significant data breach that exposed personal information of individuals associated with the Northern Rivers Resilient Homes Program (RHP). This incident adds to a series of controversies the RA has encountered since its inception, particularly…

Read MoreNSWRA Faces Data Breach Affecting Resilient Homes Program Applicants

Palo Alto Firewalls Vulnerable to Secure Boot Bypass and Firmware Exploits

A recent investigation into three firewall models produced by Palo Alto Networks has revealed notable security vulnerabilities. These flaws are related to both the firmware of the devices and improperly configured security settings. According to a report from security vendor Eclypsium shared with The Hacker News, these vulnerabilities are not…

Read MorePalo Alto Firewalls Vulnerable to Secure Boot Bypass and Firmware Exploits

Google Discovers ‘Initial Access Broker’ Collaborating with Conti Ransomware Group

Google’s Threat Analysis Group (TAG) has identified a new initial access broker known as “Exotic Lily,” linked to a notorious Russian cybercrime group famed for its participation in Conti and Diavol ransomware operations. The emergence of this threat actor raises serious concerns regarding cybersecurity practices across multiple sectors. Exotic Lily…

Read MoreGoogle Discovers ‘Initial Access Broker’ Collaborating with Conti Ransomware Group

The Browser as Your Office: Understanding Potential Risks for Your Organization

The Browser Is Now the Workplace: Potential Cybersecurity Exposures for Organizations In today’s digital landscape, many businesses have transitioned to remote and hybrid work models, with the browser serving as a primary interface for daily operations. However, this reliance on web-based applications has unveiled significant vulnerabilities that cyber adversaries are…

Read MoreThe Browser as Your Office: Understanding Potential Risks for Your Organization

U.S. State Government Network Compromised Through Ex-Employee Account

Cybersecurity Alert: Network Breach at U.S. State Government Organization The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed a significant cybersecurity breach affecting an unnamed state government organization’s network. The breach was executed through the exploitation of an administrator account linked to a former employee, highlighting the vulnerabilities associated…

Read MoreU.S. State Government Network Compromised Through Ex-Employee Account

60% of UK Secondary Schools Targeted by Cyber Attacks or Breaches in the Last Year | Cybercrime

Data Breach Targets UK Nurseries: Education Sector Under Cyber Threat Last month, a significant cyber incident targeted UK nurseries, culminating in the exposure of children’s data online by a hacking group known as Radiant. This breach has sparked widespread condemnation, with critics labeling it as a new low in cybersecurity…

Read More60% of UK Secondary Schools Targeted by Cyber Attacks or Breaches in the Last Year | Cybercrime

CISA Includes Five-Year-Old jQuery XSS Vulnerability in List of Exploited Flaws

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added a critical vulnerability in the widely used jQuery JavaScript library to its Known Exploited Vulnerabilities (KEV) catalog due to ongoing exploitation concerns. This security flaw, identified as CVE-2020-11023, poses medium-level severity, scored between 6.1 and 6.9 on the Common Vulnerability…

Read MoreCISA Includes Five-Year-Old jQuery XSS Vulnerability in List of Exploited Flaws