The Breach News

New Clues Arise: Are Experts Questioning the Return of REvil?

REvil Ransomware Gang Resurfaces: Implications for Businesses Recent intelligence indicates the REvil ransomware group, infamous for targeting entities like JBS and Kaseya, has re-emerged just three months after significant arrests of its members in Russia. The group was dismantled when the FSB detained 14 individuals, seizing assets including over 426…

Read MoreNew Clues Arise: Are Experts Questioning the Return of REvil?

Archer Health Data Breach Reveals 23GB of Sensitive Medical Records

A significant breach exposing over 145,000 files of sensitive medical and personal information has occurred at Archer Health Inc., a California-based provider of in-home healthcare and palliative care services. This database was found online without encryption or password protection, leaving the data vulnerable to unauthorized access. Archer Health, also recognized…

Read MoreArcher Health Data Breach Reveals 23GB of Sensitive Medical Records

Rocket Report: Kuiper Updates; Delays for New Glenn’s Second Flight

Rocket Report Edition 8.12: Increasing Launch Capacity Demand Across Sectors In the latest edition of the Rocket Report, we explore the growing demand for launch capacity among satellite operators, ranging from military organizations to emerging startups. Despite the proliferation of rocket launches globally, with SpaceX on track to exceed 150…

Read MoreRocket Report: Kuiper Updates; Delays for New Glenn’s Second Flight

“Courts Tighten Stance on Data-Breach Lawsuits: No Harm, No Foul” – The Wall Street Journal

‘No Harm, No Foul:’ Courts Take Tougher Stance on Data-Breach Litigation The legal landscape surrounding data breach litigation is evolving, with recent judicial decisions signaling a more stringent approach to evaluating these cases. Courts are increasingly scrutinizing the tangible impact of data breaches on affected parties, leading to a heightened…

Read More“Courts Tighten Stance on Data-Breach Lawsuits: No Harm, No Foul” – The Wall Street Journal

CISO’s Comprehensive Guide to CTEM and Its Significance

As cyber threats become increasingly sophisticated, organizations must ensure their defensive strategies remain cutting-edge. A newly released free guide highlights Continuous Threat Exposure Management (CTEM) as a proactive cybersecurity approach. Access it here. This succinct report provides compelling evidence for why CTEM offers a comprehensive strategy for strengthening cyber defenses…

Read MoreCISO’s Comprehensive Guide to CTEM and Its Significance

North Korean Maui Ransomware Actively Attacking U.S. Healthcare Organizations

Recent cybersecurity advisories from U.S. intelligence and cybersecurity agencies have revealed that North Korean state-sponsored hackers are utilizing Maui ransomware to specifically target the healthcare sector since at least May 2021. The advisory indicates that compromised servers responsible for essential healthcare services—including electronic health records, diagnostic imaging, and internal communication…

Read MoreNorth Korean Maui Ransomware Actively Attacking U.S. Healthcare Organizations

How the EU Data Act Restores User Control

Data Governance, Data Security, Finance & Banking Newly Implemented Rule to Boost Cloud Competition and AI Development Akshaya Asokan (asokan_akshaya) • September 25, 2025 Shaun Hurst, principal regulatory advisor, Smarsh The European Union’s Data Act has entered its second phase of implementation, fundamentally reshaping the data landscape by empowering users…

Read MoreHow the EU Data Act Restores User Control

Cleo File Transfer Vulnerability Exploited – Patch Coming Soon, Immediate Mitigation Recommended

Cleo File Transfer Software Targeted by Widespread Exploitation of Critical Vulnerability Cleo, a leading provider of managed file transfer software, is currently grappling with reports of extensive exploitation of a significant vulnerability, even in fully patched systems. Users are being urged to ensure their installations are secured against potential internet…

Read MoreCleo File Transfer Vulnerability Exploited – Patch Coming Soon, Immediate Mitigation Recommended

Volvo Data Breach: An In-Depth Analysis of Technical and Organizational Shortcomings

Volvo North America Confirms Employee Data Breach Due to Ransomware Attack on Third-Party Provider Volvo North America has publicly acknowledged a significant data breach that has compromised employee records. This breach was triggered by a ransomware attack on Miljödata, a third-party provider that handles HR software for Volvo. Notably, the…

Read MoreVolvo Data Breach: An In-Depth Analysis of Technical and Organizational Shortcomings