The Breach News

Russian Hackers Focusing on Diplomatic Targets Across Europe, the Americas, and Asia

A series of sophisticated phishing campaigns targeting diplomatic and governmental organizations has been linked to a Russian-state sponsored hacking group known as APT29, or Cozy Bear. This threat actor has been active since January 17, 2022, employing a range of techniques that highlight their ongoing interest in gathering sensitive diplomatic…

Read MoreRussian Hackers Focusing on Diplomatic Targets Across Europe, the Americas, and Asia

Google’s New AI Ransomware Defense: Effective, but Limited

Ransomware attacks have increasingly become a pressing digital threat as their sophistication grows, extending beyond traditional data-encrypting malware to include data grab-and-leak tactics. While the conventional form of ransomware that encrypts data and demands a ransom remains prevalent, Google has recently introduced a new defense mechanism for its Drive for…

Read MoreGoogle’s New AI Ransomware Defense: Effective, but Limited

North Korean IT Workers in Western Companies Now Seeking Ransom for Stolen Data

Recent intelligence reveals that North Korean IT professionals are infiltrating Western companies under false pretenses, not only stealing sensitive intellectual property but also extorting their employers for ransom to prevent data exposure. This notable shift signifies an escalation in the tactics used by these actors, moving beyond conventional data breaches…

Read MoreNorth Korean IT Workers in Western Companies Now Seeking Ransom for Stolen Data

When Individual Goals Compromise Organizational Security

A recent study published in the International Journal of Services, Economics and Management has revealed that professional aspirations often take precedence over security concerns in cloud usage and management decisions. The research, which surveyed 125 cloud users, found that motivations related to career advancement—such as gaining cloud expertise to enhance…

Read MoreWhen Individual Goals Compromise Organizational Security

CISA Includes Four Actively Exploited Vulnerabilities in KEV Catalog, Advises Remediation by February 25

On Tuesday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced the addition of four critical security vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. This move was prompted by clear evidence indicating that these vulnerabilities are currently being exploited in active attacks. The vulnerabilities identified are significant and warrant…

Read MoreCISA Includes Four Actively Exploited Vulnerabilities in KEV Catalog, Advises Remediation by February 25

“Override Panda” Hacking Group Emerges Again with New Espionage Operations

In recent weeks, the Chinese state-sponsored hacking group known as Override Panda has made headlines again, launching a sophisticated phishing campaign aimed at acquiring sensitive information. This resurgence focuses on utilizing spear-phishing tactics to compromise targeted entities. According to a report by Cluster25, this threat actor leveraged a spear-phishing email…

Read More“Override Panda” Hacking Group Emerges Again with New Espionage Operations

Who’s Overseeing the Machines? The Unowned Identity Crisis

Identity & Access Management, Security Operations Machine Identities Surpass Human Ones, Yet Accountability Remains Inadequate Rashmi Ramesh (rashmiramesh_) • September 29, 2025 Image: Shutterstock The rapidly growing segment of users within enterprises often goes unnoticed in human resources systems. This group primarily operates through service accounts, API keys, bots, and…

Read MoreWho’s Overseeing the Machines? The Unowned Identity Crisis

Hacker Compromises FEMA Networks, Extracts Employee Data Over Multiple Months

A significant cybersecurity breach has been reported involving the Federal Emergency Management Agency (FEMA), where a hacker accessed its computer networks for several months earlier this year, subsequently stealing sensitive information pertaining to FEMA and U.S. Customs and Border Protection (CBP) employees. This incident highlights the vulnerabilities of critical government…

Read MoreHacker Compromises FEMA Networks, Extracts Employee Data Over Multiple Months