The Breach News

Renault Alerts UK Customers About Data Breach Involving Third-Party Supplier

Stolen Data May Fuel Targeted Phishing Campaigns, Experts Caution Renault has informed a number of UK customers that their personal information may have been compromised as a result of a cyberattack on one of its third-party suppliers. The car manufacturer’s notification follows an incident that has raised concerns about the…

Read MoreRenault Alerts UK Customers About Data Breach Involving Third-Party Supplier

Russia Publishes List of IPs and Domains Targeting Its Infrastructure with DDoS Attacks

Russia Releases Extensive List of Alleged Cyberattack Sources Amid Ongoing Conflict As the Russia-Ukraine conflict intensifies, the Russian government has unveiled a significant list of 17,576 IP addresses and 166 domains purportedly linked to a series of distributed denial-of-service (DDoS) attacks targeting its domestic infrastructure. Released on Thursday by the…

Read MoreRussia Publishes List of IPs and Domains Targeting Its Infrastructure with DDoS Attacks

The SEC’s New SaaS Cybersecurity Rules: Challenges for CISOs Explained

The U.S. Securities and Exchange Commission (SEC) is taking a firm stance on the cybersecurity posture of Software as a Service (SaaS) providers and their clients. Publicly traded companies, referred to as ‘registrants’, are now required to disclose cyber incidents and demonstrate their readiness to manage cybersecurity threats, including those…

Read MoreThe SEC’s New SaaS Cybersecurity Rules: Challenges for CISOs Explained

Western Sydney University Declares Emails About ‘Revoked’ Degrees as ‘Fraudulent’

Cybersecurity Incident at Western Sydney University: Fraudulent Emails Impacting Graduates Western Sydney University (WSU) has issued an apology to current and former students following the distribution of fraudulent emails that falsely claimed their degrees had been revoked. In a detailed communication attributed to the Policy Compliance Board of Trustees, the…

Read MoreWestern Sydney University Declares Emails About ‘Revoked’ Degrees as ‘Fraudulent’

Mirai Variant Murdoc Botnet Targets AVTECH IP Cameras and Huawei Routers

Cybersecurity experts have recently identified an extensive campaign designed to exploit vulnerabilities in AVTECH IP cameras and Huawei HG532 routers. This initiative has been largely successful in integrating these devices into a variant of the Mirai botnet known as the Murdoc Botnet. The ongoing operations reflect a significant escalation in…

Read MoreMirai Variant Murdoc Botnet Targets AVTECH IP Cameras and Huawei Routers

Imperva Counteracts 2.5 Million RPS Ransom DDoS Extortion Attacks

Cybersecurity firm Imperva reported on Friday that it successfully mitigated a substantial ransom distributed denial-of-service (DDoS) attack aimed at an undisclosed target, which peaked at a staggering 2.5 million requests per second (RPS). Nelli Klepfish, a security analyst at Imperva, noted the evolving nature of ransom DDoS attacks, stating, “While…

Read MoreImperva Counteracts 2.5 Million RPS Ransom DDoS Extortion Attacks

Discord Vendor Breach Compromises ID Data in Ransom Attempt

Cybercrime, Fraud Management & Cybercrime, Governance & Risk Management Growing Concerns Over Age Verification Systems as New Targets for Hackers Chris Riotta (@chrisriotta) • October 6, 2025 Image: Shutterstock A recent security breach involving a third-party customer service vendor for Discord has raised alarms among cybersecurity experts, as it appears…

Read MoreDiscord Vendor Breach Compromises ID Data in Ransom Attempt

Cloudflare Breach: Nation-State Hackers Compromise Source Code and Internal Documents

Cloudflare Exposes Nation-State Cyberattack Targeting Its Infrastructure Cloudflare has disclosed that it was the target of a sophisticated cyberattack, likely orchestrated by a nation-state actor, who exploited stolen credentials to gain unauthorized access to its Atlassian server. The breach allowed the attacker to access certain documentation and a limited amount…

Read MoreCloudflare Breach: Nation-State Hackers Compromise Source Code and Internal Documents