The Breach News

Thousands of MikroTik Routers Compromised for Network Traffic Eavesdropping

Widespread Compromise of MikroTik Routers Exposes Vulnerabilities Recent reports have unveiled an alarming situation involving a significant number of MikroTik routers that have fallen victim to cyber exploitation. Last month, we noted a major crypto-mining malware operation responsible for the hijacking of over 200,000 MikroTik devices, utilizing a vulnerability linked…

Read MoreThousands of MikroTik Routers Compromised for Network Traffic Eavesdropping

Hacker Arrested for Revealing Vulnerabilities in Election Website

Hacker Arrested After Exposing Vulnerabilities in Florida Elections Website A security researcher found himself in handcuffs after identifying significant security flaws in the online systems of a Florida county elections office. David Michael Levin, a 31-year-old resident of Estero, Florida, was charged with multiple counts of unauthorized computer access, culminating…

Read MoreHacker Arrested for Revealing Vulnerabilities in Election Website

19-Year-Old Hacker Taken into Custody for False Bomb Threats at Schools and Airplanes

Teen Arrested for Bomb Threats Linked to Cybercrime Group British authorities have taken a significant step in addressing cybercrime with the arrest of a 19-year-old individual associated with the notorious Apophis Squad. This group has been implicated in a series of hoax bomb threats directed at numerous educational institutions and…

Read More19-Year-Old Hacker Taken into Custody for False Bomb Threats at Schools and Airplanes

Mandiant Unveils Rainbow Table Capable of Breaking Weak Admin Passwords in Just 12 Hours

Microsoft’s NTLMv1 protocol, introduced in the 1980s alongside OS/2, has long been known for its vulnerabilities. Significant research, notably by cryptanalyst Bruce Schneier and Mudge in 1999, highlighted critical weaknesses in NTLMv1’s security architecture. This became alarmingly clear during the 2012 Defcon 20 conference, where researchers unveiled a toolkit that…

Read MoreMandiant Unveils Rainbow Table Capable of Breaking Weak Admin Passwords in Just 12 Hours