The Breach News

Iranian Hackers Exploit Fake Job Offers to Target Europe’s Key Industries

A group of Iranian hackers, identified as Nimbus Manticore, is broadening its activities with a new focus on major enterprises across Europe. Recent findings from cybersecurity firm Check Point Research (CPR) indicate that this group is particularly targeting organizations within the defense, telecommunications, and aerospace sectors to obtain sensitive data.…

Read MoreIranian Hackers Exploit Fake Job Offers to Target Europe’s Key Industries

PLAYFULGHOST: Distribution Through Phishing and SEO Poisoning in Compromised VPN Applications

PLAYFULGHOST Malware Discovered Targeting VPN Users with Sophisticated Methods Cybersecurity experts have recently identified a new malware strain named PLAYFULGHOST, which is characterized by its extensive information-gathering capabilities, including keylogging, screen capture, and remote file execution. This malware has been implicated in various cyber attacks, indicating a strategic focus on…

Read MorePLAYFULGHOST: Distribution Through Phishing and SEO Poisoning in Compromised VPN Applications

EV Charging Company Confirms Data Breach Exposing Customer Information

In the ever-evolving landscape of electric vehicle (EV) infrastructure, a recent significant security breach has highlighted vulnerabilities associated with third-party data management. Digital Charging Solutions GmbH (DCS), a major provider of EV charging services, confirmed that unauthorized access by a third-party service provider led to this incident. The compromise involved…

Read MoreEV Charging Company Confirms Data Breach Exposing Customer Information

CISA Alerts on Two Actively Exploited Security Vulnerabilities in Adobe and Oracle Products

Recently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog by adding two critical security flaws affecting Adobe ColdFusion and Oracle Agile Product Lifecycle Management (PLM). This action stems from emerging evidence indicating active exploitation of these vulnerabilities. The newly added vulnerabilities are…

Read MoreCISA Alerts on Two Actively Exploited Security Vulnerabilities in Adobe and Oracle Products

Benefits and Risks for Businesses Using DeepSeek V3.1

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Splx Reports Enhanced Prompts Reduce Hallucinations, Yet Security Flaws Remain Rashmi Ramesh (@rashmiramesh_) • September 23, 2025 Image: Juan Alejandro Bernal/Shutterstock DeepSeek has unveiled its latest model, claiming significant advancements as it enters what it terms the “agent era.” While…

Read MoreBenefits and Risks for Businesses Using DeepSeek V3.1

US Discovers 100,000 SIM Cards That Could Have Disrupted NYC’s Cell Network

The U.S. Secret Service has reported the discovery and seizure of a substantial collection of telecommunications equipment capable of destabilizing the cellular network within New York City. According to a recent announcement, the agency suggests that this cache, linked to a foreign nation-state, was intended for illicit activities. Preliminary findings…

Read MoreUS Discovers 100,000 SIM Cards That Could Have Disrupted NYC’s Cell Network

From $22M Ransom to Over 100M Stolen Records: Key SaaS Threat Actors to Monitor in 2025

Certainly! Here’s a rewritten version of the provided content tailored for a tech-savvy professional audience, focusing on clarity and factual reporting while incorporating relevant cybersecurity frameworks. Cyber Threat Landscape in 2024: Rising Challenges for SaaS Security As we approach the end of 2024, the cybersecurity landscape reveals a troubling surge…

Read MoreFrom $22M Ransom to Over 100M Stolen Records: Key SaaS Threat Actors to Monitor in 2025

Your Browser Is Not Supported

Your browser is not supported | breachspot.com BreachSpot is dedicated to equipping business owners with the latest insights into data breaches and cyber threats. In an evolving digital landscape, our commitment is to provide timely information that enhances your cybersecurity posture. Regrettably, the browser you are using is not compatible…

Read MoreYour Browser Is Not Supported