The Breach News

Caution: Deadbolt Ransomware Attacking ASUSTOR NAS Devices

ASUSTOR NAS Devices Compromised by Deadbolt Ransomware In a troubling development for cybersecurity, ASUSTOR network-attached storage (NAS) devices have become the latest targets of Deadbolt ransomware. This attack comes on the heels of recent incidents that affected QNAP NAS appliances, highlighting a worrying trend in cyber threats targeting storage solutions.…

Read MoreCaution: Deadbolt Ransomware Attacking ASUSTOR NAS Devices

Salesforce Rejects Ransom Demand from ShinyHunters Extortionists

3rd Party Risk Management, Cybercrime, Fraud Management & Cybercrime Criminals Behind Salesloft Breach Continue to Target Salesforce Customers Mathew J. Schwartz (euroinfosec) • October 9, 2025 Image: JHVEPhoto/Shutterstock Salesforce, the leading customer relationship management software provider, recently informed its clients that it will not comply with extortion demands from cybercriminals…

Read MoreSalesforce Rejects Ransom Demand from ShinyHunters Extortionists

Discord Reports Theft of 70,000 ID Photos by Hackers, Rejects Extortion Allegations

Discord, the widely-used voice and text communication platform with over 200 million monthly users, has acknowledged a serious data breach affecting a large subset of individuals who submitted government IDs for age verification. In an official statement on October 3, 2025, the company confirmed the incident, which was detailed by…

Read MoreDiscord Reports Theft of 70,000 ID Photos by Hackers, Rejects Extortion Allegations

SaaS Security Breaches: The Role of Tokens

Token theft continues to be a significant driver behind Software-as-a-Service (SaaS) breaches, raising critical concerns for security teams. It’s important to recognize why OAuth and API tokens are frequently overlooked and explore effective strategies that organizations can implement to enhance their token management practices and fortify their defenses. As SaaS…

Read MoreSaaS Security Breaches: The Role of Tokens

Microsoft Discovers macOS Vulnerability CVE-2024-44243 That Enables Rootkit Installation

Microsoft has disclosed a recently patched security vulnerability within Apple’s macOS. This flaw, which was successfully addressed in a recent update, potentially allowed attackers to exploit a weakness in the operating system’s System Integrity Protection (SIP). If leveraged effectively, an attacker operating with “root” privileges could bypass SIP and inject…

Read MoreMicrosoft Discovers macOS Vulnerability CVE-2024-44243 That Enables Rootkit Installation

Putin Alerts Russian Critical Infrastructure to Prepare for Possible Cyber Attacks

On Thursday, the Russian government issued an alert regarding ongoing cyber attacks aimed at critical infrastructure within the country, coinciding with the intensification of its military actions in Ukraine. This development marks a notable increase in cybersecurity threats that could affect a variety of sectors, prompting deeper concerns among business…

Read MorePutin Alerts Russian Critical Infrastructure to Prepare for Possible Cyber Attacks

Free Healthcare Toolkit: Mapping and Ranking Third-Party Risks

Third-Party Risk Management, Governance & Risk Management, Healthcare New Guide Aims to Help Organizations Focus on Vendor Risks Strategically Marianne Kolbasuk McGee ( HealthInfoSec) • October 8, 2025 The SMART Toolkit from the Health Sector Coordinating Council aims to assist healthcare entities in managing third-party risk effectively. (Image: HSCC) The…

Read MoreFree Healthcare Toolkit: Mapping and Ranking Third-Party Risks