The Breach News

Aussie University Faces Major Expenses Due to Cyber Attacks

Western Sydney University Faces Escalating Cybersecurity Costs Following Data Breaches Western Sydney University (WSU) has incurred substantial expenses in response to a series of cyber attacks that plagued the institution throughout 2024. Vice Chancellor Professor George Williams disclosed at a recent Senate inquiry examining governance in higher education that the…

Read MoreAussie University Faces Major Expenses Due to Cyber Attacks

NVIDIA Toolkit’s Incomplete Patch Exposes CVE-2024-0132 to Container Escape Vulnerabilities

Recent cybersecurity research has uncovered an incomplete patch associated with a previously identified vulnerability in the NVIDIA Container Toolkit. This oversight poses significant risks, potentially exposing sensitive data to exploitation if targeted by malicious actors. Initially reported as CVE-2024-0132, this critical vulnerability, which has a CVSS score of 9.0, is…

Read MoreNVIDIA Toolkit’s Incomplete Patch Exposes CVE-2024-0132 to Container Escape Vulnerabilities

Prilex PoS Malware Adapts to Intercept Contactless Payments and Steal NFC Card Data

A new variant of the advanced point-of-sale (PoS) malware known as Prilex has emerged from Brazilian cybercriminals, introducing capabilities to disrupt contactless payment transactions. This follows the trend of malware evolution, as Prilex has shifted focus from ATM targeting to sophisticated PoS infiltration since its inception in 2014. According to…

Read MorePrilex PoS Malware Adapts to Intercept Contactless Payments and Steal NFC Card Data

Integrating Cybersecurity and Biosecurity through Threat Modeling

Endpoint Security, Geo Focus: Australia, Geo-Specific A Structured Approach to Address Vulnerabilities in Synthetic Biology Laboratories Maryam Shoraka • September 3, 2025 The rapid development of synthetic biology offers significant societal benefits, from bacteria engineered to degrade environmental pollutants to synthetic microbes that can create vital medicines. However, these advancements…

Read MoreIntegrating Cybersecurity and Biosecurity through Threat Modeling

Blind Eagle Exploits NTLM Vulnerability in Colombian Institutions with RATs and GitHub-Centric Tactics

Since November 2024, threat actor Blind Eagle has executed a series of sophisticated campaigns primarily aimed at Colombian institutions and government bodies. These operations have demonstrated a high rate of infection, targeting critical infrastructure and private organizations alike. According to Check Point’s recent analysis, the campaigns resulted in more than…

Read MoreBlind Eagle Exploits NTLM Vulnerability in Colombian Institutions with RATs and GitHub-Centric Tactics

Commvault Introduces New Hyperscale Solutions to Strengthen On-Site Cyber Resilience

Commvault, a prominent player in cyber resilience and data protection solutions for hybrid cloud environments, has recently expanded its HyperScale portfolio with the introduction of HyperScale Edge and HyperScale Flex. These solutions aim to address the growing data security concerns of modern enterprises operating in remote offices and edge environments—locations…

Read MoreCommvault Introduces New Hyperscale Solutions to Strengthen On-Site Cyber Resilience

OttoKit WordPress Plugin Admin Creation Vulnerability Actively Being Exploited

A newly uncovered, high-severity vulnerability affects the OttoKit plugin for WordPress, formerly known as SureTriggers. This flaw has reportedly been exploited within mere hours of its public disclosure, posing a significant risk to website security. Identified as CVE-2025-3102, this vulnerability carries a CVSS score of 8.1 due to an authorization…

Read MoreOttoKit WordPress Plugin Admin Creation Vulnerability Actively Being Exploited

GuLoader Malware Targets E-Commerce Sector Using Harmful NSIS Executables

Cybersecurity firm Trellix recently reported a sustained malware campaign targeting e-commerce sectors in South Korea and the United States, attributed to a new wave of GuLoader attacks. This malware campaign signifies a shift in tactics from the previously used malware-laden Microsoft Word documents to NSIS executable files for malware deployment.…

Read MoreGuLoader Malware Targets E-Commerce Sector Using Harmful NSIS Executables

When Giving Up Isn’t an Option

Critical Infrastructure Security, Governance & Risk Management, Operational Technology (OT) Enhancing OT Cybersecurity Skills Through Education and Collaboration Brandy Harris • September 3, 2025 Image: Shutterstock As the cybersecurity landscape evolves, many professionals entering the field find their training predominantly focused on IT systems, safeguarding data centers, and managing corporate…

Read MoreWhen Giving Up Isn’t an Option