The Breach News

Cybercriminals Take Advantage of CrowdStrike Update Error to Spread Remcos RAT Malware

In a troubling development in the cybersecurity landscape, CrowdStrike, a prominent cybersecurity firm, is addressing significant operational disruptions caused by a flawed update to its Falcon platform, which has adversely affected numerous Windows devices globally. This situation has created an opportunity for cybercriminals to exploit the chaos, with reports indicating…

Read MoreCybercriminals Take Advantage of CrowdStrike Update Error to Spread Remcos RAT Malware

Hackers Disguised as Royal Mail Distributing Prince Ransomware

A new ransomware variant, identified as “Prince,” has emerged, targeting users in the United States and the United Kingdom. This sophisticated malware masquerades as legitimate communication from the British postal service, Royal Mail, making it particularly deceptive. According to a report from the cybersecurity firm Proofpoint, while the number of…

Read MoreHackers Disguised as Royal Mail Distributing Prince Ransomware

Fortra Releases Patch to Address Critical FileCatalyst Workflow Security Vulnerability

Fortra has disclosed a significant security vulnerability in FileCatalyst Workflow that could allow remote attackers to obtain administrative access. This flaw, designated as CVE-2024-6633, holds a critical CVSS score of 9.8, primarily due to the software’s reliance on a static password for its HSQL database connection. In their advisory, Fortra…

Read MoreFortra Releases Patch to Address Critical FileCatalyst Workflow Security Vulnerability

Magento Sites Hit by Covert Credit Card Skimmer Using Swap Files

Recent cybersecurity investigations have unveiled a sophisticated approach employed by threat actors, who are utilizing swap files on compromised websites to facilitate the operation of a persistent credit card skimmer designed to capture sensitive payment information. Security firm Sucuri identified this method on the checkout page of a Magento e-commerce…

Read MoreMagento Sites Hit by Covert Credit Card Skimmer Using Swap Files

Effective Cybersecurity Strategies to Safeguard Against Breaches

Cybersecurity Risks Loom Over Streaming Services Amid Recent Breaches Streaming platforms, including industry leaders like Netflix, as well as niche services such as Crunchyroll, are confronting significant cybersecurity threats. In a landscape that has evolved rapidly, these services find themselves increasingly vulnerable to various forms of cyberattacks. Common attacks such…

Read MoreEffective Cybersecurity Strategies to Safeguard Against Breaches

Hackers Exploit Unpatched AVTECH IP Camera Vulnerability for Botnet Attacks

Malicious Actors Exploit AVTECH IP Camera Vulnerability in Botnet Campaign A significant cybersecurity threat has emerged as a long-standing high-severity vulnerability in AVTECH IP cameras has been exploited by cybercriminals. Known as CVE-2024-7029, this flaw, which has a CVSS score of 8.7, is categorized as a command injection vulnerability associated…

Read MoreHackers Exploit Unpatched AVTECH IP Camera Vulnerability for Botnet Attacks

The SSPM Justification Toolkit

SaaS Security: Understanding the Risks and Solutions In the rapidly evolving landscape of business operations, Software as a Service (SaaS) applications have become indispensable. These applications host a vast array of sensitive data critical for various functions, including human resources, finance, marketing, and product development. However, despite the inherent advantages…

Read MoreThe SSPM Justification Toolkit