The Breach News

Zscaler Acquires SquareX to Enhance Browser Security Without Agents

Data Loss Prevention (DLP), Data Security, Endpoint Security CEO Jay Chaudhry: SquareX Acquisition Aims at Unmanaged Devices and Third-Party Access Michael Novinson (@MichaelNovinson) • February 6, 2026 Jay Chaudhry, founder and CEO of Zscaler (Image: Zscaler) In a strategic move to bolster security for web browsers, Zscaler has acquired SquareX,…

Read MoreZscaler Acquires SquareX to Enhance Browser Security Without Agents

Firefox Introduces AI Kill Switch for Enhanced User Privacy

Certainly! Here’s a rewritten version of the content, tailored for a US-based audience concerned with cybersecurity: — As artificial intelligence increasingly integrates into the online experience, user sentiments vary widely. While some embrace the convenience of digital assistants, others express unease regarding data privacy and the burden of frequent notifications.…

Read MoreFirefox Introduces AI Kill Switch for Enhanced User Privacy

Researchers Discover New Vulnerabilities in Widely Used BGP Internet Routing Protocol Software

Cybersecurity researchers have identified significant vulnerabilities within the Border Gateway Protocol (BGP) software, specifically in version 8.4 of FRRouting, an open-source internet routing protocol suite utilized across various Linux and Unix platforms. The flaws expose vulnerable BGP peers to denial-of-service (DoS) attacks, potentially incapacitating BGP sessions and routing tables. The…

Read MoreResearchers Discover New Vulnerabilities in Widely Used BGP Internet Routing Protocol Software

Hackers Can Now Access Data From Air-Gapped Computers Inside Faraday Cages

Recent research from the Cybersecurity Research Center at Ben Gurion University, led by Mordechai Guri, has revealed alarming advancements in methods for extracting data from highly secure environments, specifically air-gapped PCs and systems located within Faraday cages. These devices are typically deemed secure due to their isolation from external networks,…

Read MoreHackers Can Now Access Data From Air-Gapped Computers Inside Faraday Cages

Moltbook: The AI Agent Social Network That Compromised Real Human Data

This week, an investigation by WIRED revealed critical insights into the face recognition app Mobile Fortify, utilized by ICE (Immigration and Customs Enforcement) and CBP (Customs and Border Protection) in efforts to identify individuals across the United States. However, it appears that the application’s design does not facilitate effective verification…

Read MoreMoltbook: The AI Agent Social Network That Compromised Real Human Data

Spotify Breach: Android Users Advised to Update App and Change Passwords

In a recent statement, Spotify, a widely used music streaming platform, reported a data breach that has forced the company to alert its Android app users. This breach has raised concerns regarding potential unauthorized access to user accounts, prompting Spotify to recommend immediate upgrades to their app for enhanced security…

Read MoreSpotify Breach: Android Users Advised to Update App and Change Passwords

Docker AI Vulnerability Allows Image Metadata to Initiate Attacks

Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development AI Assistant Executes Malicious Commands via Docker Image Metadata Rashmi Ramesh (rashmiramesh_) • February 6, 2026 Image: Poetra.RH/Shutterstock Security researchers have uncovered a significant vulnerability in Docker’s Ask Gordon AI assistant, enabling attackers to execute nefarious commands embedded within…

Read MoreDocker AI Vulnerability Allows Image Metadata to Initiate Attacks

2025 Sees Surge in Data Breaches as Financial Institutions Bear the Brunt of Advanced Cyber Attacks

In 2025, the financial services sector emerged as the principal target of cyberattacks, reflecting a troubling trend of increasingly sophisticated and rapid cyber intrusions. The data breaches reported throughout the year reached unprecedented levels, highlighting a critical disparity between advancing digital threats and traditional security measures. Criminals now primarily target…

Read More2025 Sees Surge in Data Breaches as Financial Institutions Bear the Brunt of Advanced Cyber Attacks