The Breach News

ExtraHop Report Uncovers Data Breach Costs Surpassing Industry Estimates – Intelligent CISO

ExtraHop Report Highlights Financial Repercussions of Data Breaches on Public Companies ExtraHop has unveiled a comprehensive report examining the short- and long-term financial effects that prominent data breaches inflict on publicly traded companies. The report reveals that, on average, a data breach costs organizations approximately $677 million— a figure significantly…

Read MoreExtraHop Report Uncovers Data Breach Costs Surpassing Industry Estimates – Intelligent CISO

Zyxel Issues Firmware Patch for Vulnerabilities in End-of-Life NAS Devices

Zyxel has issued critical security updates to address significant vulnerabilities affecting two of its end-of-life network-attached storage (NAS) devices. These flaws could allow unauthenticated attackers to execute operating system commands and arbitrary code on compromised systems. The affected models include the NAS326, which is running versions V5.21(AAZF.16)C0 and earlier, and…

Read MoreZyxel Issues Firmware Patch for Vulnerabilities in End-of-Life NAS Devices

MuddyC2Go: Iranian Hackers Deploy New C2 Framework Targeting Israel

Recent cybersecurity investigations reveal that Iranian state-sponsored actors have employed a novel command-and-control (C2) framework identified as MuddyC2Go. This development is part of ongoing cyber assaults directed at Israel, heightening concerns regarding the threat landscape in the region. Security researcher Simon Kenin from Deep Instinct outlined in a report released…

Read MoreMuddyC2Go: Iranian Hackers Deploy New C2 Framework Targeting Israel

Steps to Take if You Encounter Ransomware

Ransomware Attacks: A Critical Response Guide for Business Owners As ransomware attacks continue to escalate, the consequences of falling victim can be severe and unsettling. Business owners navigating this challenging landscape must act swiftly and decisively to mitigate potential damage. This guide provides a structured response to a ransomware incident,…

Read MoreSteps to Take if You Encounter Ransomware

Escalating Threats Surround Elections as US Voters Turn Out in Droves

Election Security, Fraud Management & Cybercrime Foreign Influence Campaigns Intensify as Experts Tout Election Security Upgrades Chris Riotta (@chrisriotta) • October 29, 2024 The latest early voting tracking data indicates over 50 million ballots have been cast in the presidential race. (Image: Shutterstock) Foreign influence efforts are gaining momentum as…

Read MoreEscalating Threats Surround Elections as US Voters Turn Out in Droves

China-Linked Hackers Capitalize on Fortinet Vulnerability, Compromising 20,000 Systems Worldwide

Recent reports reveal that state-sponsored hackers, associated with China, successfully compromised 20,000 Fortinet FortiGate systems globally by exploiting a critical vulnerability between 2022 and 2023. This breach appears to have far-reaching implications that were previously underestimated. The Dutch National Cyber Security Centre (NCSC) disclosed that the attackers had prior knowledge…

Read MoreChina-Linked Hackers Capitalize on Fortinet Vulnerability, Compromising 20,000 Systems Worldwide

6 Essential Components for Developing a Healthcare Cybersecurity Response Plan

Cybersecurity Risks Remain High in Healthcare Sector Recent findings by Software Advice highlight the ongoing vulnerability of medical practices to cyberattacks, with more than a third of respondents lacking a cybersecurity incident response plan. This deficiency poses significant risks, such as patient data breaches and potential HIPAA violations, as the…

Read More6 Essential Components for Developing a Healthcare Cybersecurity Response Plan

Rebranded Knight Ransomware Sets Its Sights on Global Healthcare and Businesses

A recent analysis has uncovered a new ransomware variant known as RansomHub, which is believed to be a rebranded and updated version of Knight ransomware, itself a successor to the Cyclops strain. This evolution in ransomware is indicative of the persistent threat landscape that cybersecurity professionals face today. Knight ransomware,…

Read MoreRebranded Knight Ransomware Sets Its Sights on Global Healthcare and Businesses

Covert Kamran Spyware Aiming at Urdu-Speaking Individuals in Gilgit-Baltistan

Emerging Android Spyware Targets Urdu-Speaking Audience in Gilgit-Baltistan Recent investigations have revealed a targeted espionage campaign aimed at Urdu-speaking individuals visiting regional news websites focused on the Gilgit-Baltistan area. This attack utilizes a previously undocumented Android spyware, identified as Kamran, designed to harvest sensitive information from compromised devices. ESET, the…

Read MoreCovert Kamran Spyware Aiming at Urdu-Speaking Individuals in Gilgit-Baltistan