The Breach News

Coinbase Targeted in GitHub Actions Supply Chain Attack; Secrets Exposed from 218 Repositories’ CI/CD Pipelines

Supply Chain Attack Targets GitHub Action, Compromising Sensitive Data A recent supply chain attack has raised significant cybersecurity concerns, particularly for businesses relying on open-source projects. This incident originated from the GitHub Action “tj-actions/changed-files,” which was initially directed at one of Coinbase’s open-source initiatives but subsequently expanded in scale. According…

Read MoreCoinbase Targeted in GitHub Actions Supply Chain Attack; Secrets Exposed from 218 Repositories’ CI/CD Pipelines

Russian Courts Under Threat from CryWiper Data Wiper Malware Disguised as Ransomware

A new variant of data-wiping malware, identified as CryWiper, has emerged and is specifically targeting Russian government institutions, such as mayoral offices and courthouses. Unlike traditional ransomware that encrypts data, CryWiper masquerades as ransomware but ultimately destroys data without providing any means of recovery. Kaspersky researchers Fedor Sinitsyn and Janis…

Read MoreRussian Courts Under Threat from CryWiper Data Wiper Malware Disguised as Ransomware

Next Phase of Zero Trust: Emphasizing Agility, Identity, and AI Risks

Artificial Intelligence & Machine Learning, Governance & Risk Management, Identity & Access Management Why CISOs Must Rethink Access, Behavioral Analytics and AI Governance at Scale Joe Cozzupoli • September 9, 2025 Image: Shutterstock Zero trust has evolved from a mere buzzword into a fundamental component of contemporary security frameworks. The…

Read MoreNext Phase of Zero Trust: Emphasizing Agility, Identity, and AI Risks

New Malware Campaign Leverages Cracked Software to Distribute Lumma and ACR Stealer

Cybersecurity experts are sounding alarms about a recent campaign utilizing cracked software versions to spread information-stealing malware, including notable variants such as Lumma and ACR Stealer. The AhnLab Security Intelligence Center (ASEC) has reported a significant increase in ACR Stealer distributions since January 2025. This malware employs a technique known…

Read MoreNew Malware Campaign Leverages Cracked Software to Distribute Lumma and ACR Stealer

Risks in Data Center Financing: Development Delays and SLA Violations – Data Center Dynamics

Risks in Data Center Lending: Development Delays and SLA Breaches Recent reports highlight increasing concerns surrounding data center lending, revealing significant risks associated with development delays and breaches of Service Level Agreements (SLAs). These challenges are gaining attention as they threaten not only the financial integrity of data center operations…

Read MoreRisks in Data Center Financing: Development Delays and SLA Violations – Data Center Dynamics

Telecom and BPO Firms Targeted by SIM Swapping Hackers

A targeted cyber intrusion campaign has been actively engaging telecommunications and business process outsourcing (BPO) companies since at least June 2022. This ongoing assault aims to infiltrate mobile carrier networks and is characterized by SIM swapping techniques, as highlighted in recent investigations by CrowdStrike. Researcher Tim Parisi detailed these findings…

Read MoreTelecom and BPO Firms Targeted by SIM Swapping Hackers

Can You Find the Incorrect One?

Professional Certifications & Continuous Training, Training & Security Leadership The Power of Tech Tools: Understanding Fundamentals is Essential Brandy Harris • September 10, 2025 Image: Shutterstock The initial encounter with advanced tools often feels transformative; much like the experience of using a scientific calculator for the first time, users may…

Read MoreCan You Find the Incorrect One?