The Breach News

Deception and Strategy: AI Models Engaged in a Game

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Study by OpenAI and Apollo Research Reveals Hidden Deception in AI Models Rashmi Ramesh (rashmiramesh_) • September 26, 2025 Image: Tang Yan Song/Shutterstock Recent research from OpenAI and Apollo Research reveals that advanced artificial intelligence models are developing the capability…

Read MoreDeception and Strategy: AI Models Engaged in a Game

An App Designed to Dox Critics of Charlie Kirk Ended Up Doxing Its Own Users Instead

Recent findings reveal that the US Department of Homeland Security (DHS) has amassed DNA data from nearly 2,000 American citizens in recent years. This accumulation raises significant concerns regarding legal implications and the level of oversight involved, especially since the collected genetic material has been entered into an FBI crime…

Read MoreAn App Designed to Dox Critics of Charlie Kirk Ended Up Doxing Its Own Users Instead

Critical Vulnerability in ProjectSend Actively Exploited in Public-Facing Servers

A significant security vulnerability in the ProjectSend open-source file-sharing application is reportedly being actively exploited, as indicated by recent research from VulnCheck. This vulnerability affects users who have not updated to the latest patch, raising serious concerns about the potential for unauthorized access and data breaches. The flaw was first…

Read MoreCritical Vulnerability in ProjectSend Actively Exploited in Public-Facing Servers

Apache Airflow Security Flaw Allows Read-Only Users to Access Sensitive Information

A significant security vulnerability has been uncovered in Apache Airflow version 3.0.3, potentially exposing sensitive connection information to users solely with read permissions. The flaw, designated as CVE-2025-54831 and classified with an “important” severity rating, jeopardizes the platform’s ability to safeguard critical data associated with workflow connections. Introduced in the…

Read MoreApache Airflow Security Flaw Allows Read-Only Users to Access Sensitive Information

Researchers Discover New Exploit Circumventing Fixed NVIDIA Container Toolkit Vulnerability

Cybersecurity analysts have identified a critical bypass of a recently patched vulnerability in the NVIDIA Container Toolkit, which can potentially allow malicious actors to escape a container’s isolation and gain unfettered control over the host environment. The vulnerability is designated as CVE-2025-23359, with a CVSS score of 8.3, indicating its…

Read MoreResearchers Discover New Exploit Circumventing Fixed NVIDIA Container Toolkit Vulnerability

Europol Takes Down Phishing Ring Linked to Millions in Financial Losses

Recently, Europol announced the successful dismantling of an organized crime syndicate involved in phishing, fraud, scams, and money laundering. This operation, which was conducted in collaboration with law enforcement agencies in Belgium and the Netherlands, led to the arrest of nine individuals in the Netherlands. The suspects, predominantly men aged…

Read MoreEuropol Takes Down Phishing Ring Linked to Millions in Financial Losses

Senate Bill Aims to Safeguard Privacy for Brain Wave Data

Data Privacy, Data Security, HIPAA/HITECH MIND Act Requests FTC to Investigate Exploitation Risks Associated with Neural Data from Devices Marianne Kolbasuk McGee (HealthInfoSec) • September 26, 2025 Experts assert that brain waves and neural data may pose significant consumer privacy challenges moving forward. (Image: Getty Images) The emergence of brain…

Read MoreSenate Bill Aims to Safeguard Privacy for Brain Wave Data

T-Mobile Uncovers Network Intrusion Attempts from a Wireline Provider

T-Mobile Detects Intrusion Attempts, No Data Breach Confirmed Telecom giant T-Mobile recently announced that it has thwarted attempts by cyber actors to penetrate its networks in the past few weeks. Fortunately, the company confirmed that no sensitive customer data was accessed during these attempts. The intrusion efforts were traced back…

Read MoreT-Mobile Uncovers Network Intrusion Attempts from a Wireline Provider