The Breach News

Cybercriminals Leverage Eclipse Jarsigner to Distribute XLoader Malware through ZIP Archives

A recent malware campaign has been identified deploying XLoader malware through a DLL side-loading technique, utilizing a legitimate application affiliated with the Eclipse Foundation. This method allows attackers to execute malicious payloads without direct detection, raising significant security concerns. The application exploited in this attack is jarsigner, a tool included…

Read MoreCybercriminals Leverage Eclipse Jarsigner to Distribute XLoader Malware through ZIP Archives

6 Browser-Based Threats Security Teams Must Address Immediately

Rising Threat of Browser-Based Attacks: Understanding the Risks and Targets In recent years, there has been a marked increase in attacks targeting users through their web browsers. This article delves into the concept of browser-based attacks, their mechanics, and the various threats posed to organizations. As employees become more accessible…

Read More6 Browser-Based Threats Security Teams Must Address Immediately

Cuba Ransomware Demands Over $60 Million from More than 100 Victims

The Cuba ransomware group, also referred to as COLDDRAW, has reportedly amassed over $60 million in ransom payments while compromising more than 100 organizations globally, as of August 2022. This surge in activity prompted the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) to…

Read MoreCuba Ransomware Demands Over $60 Million from More than 100 Victims

Coinbase Targeted in GitHub Actions Supply Chain Attack; Secrets Exposed from 218 Repositories’ CI/CD Pipelines

Supply Chain Attack Targets GitHub Action, Compromising Sensitive Data A recent supply chain attack has raised significant cybersecurity concerns, particularly for businesses relying on open-source projects. This incident originated from the GitHub Action “tj-actions/changed-files,” which was initially directed at one of Coinbase’s open-source initiatives but subsequently expanded in scale. According…

Read MoreCoinbase Targeted in GitHub Actions Supply Chain Attack; Secrets Exposed from 218 Repositories’ CI/CD Pipelines

Russian Courts Under Threat from CryWiper Data Wiper Malware Disguised as Ransomware

A new variant of data-wiping malware, identified as CryWiper, has emerged and is specifically targeting Russian government institutions, such as mayoral offices and courthouses. Unlike traditional ransomware that encrypts data, CryWiper masquerades as ransomware but ultimately destroys data without providing any means of recovery. Kaspersky researchers Fedor Sinitsyn and Janis…

Read MoreRussian Courts Under Threat from CryWiper Data Wiper Malware Disguised as Ransomware

Next Phase of Zero Trust: Emphasizing Agility, Identity, and AI Risks

Artificial Intelligence & Machine Learning, Governance & Risk Management, Identity & Access Management Why CISOs Must Rethink Access, Behavioral Analytics and AI Governance at Scale Joe Cozzupoli • September 9, 2025 Image: Shutterstock Zero trust has evolved from a mere buzzword into a fundamental component of contemporary security frameworks. The…

Read MoreNext Phase of Zero Trust: Emphasizing Agility, Identity, and AI Risks