The Breach News

Weekly Update: Findings from the Salesloft Drift Breach Investigation and Threats from Malicious GitHub Desktop Installers

In the realm of cybersecurity, last week’s developments showcased a significant range of incidents and insights. These events reflect the evolving landscape of cyber threats and the pressing need for vigilance among businesses and professionals. A critical incident involved Salesloft Drift, where attackers gained unauthorized access through the company’s GitHub…

Read MoreWeekly Update: Findings from the Salesloft Drift Breach Investigation and Threats from Malicious GitHub Desktop Installers

⚡ THN Weekly Highlights: GitHub Supply Chain Attack, AI Malware, BYOVD Strategies, and More

Recent advancements in open-source tools have inadvertently contributed to a significant supply chain breach, originating from a focused attack that swiftly expanded, compromising sensitive information across multiple projects. This breach highlights how a manipulated GitHub Action, designed to analyze changed files, evolved from targeting specific projects like Coinbase into a…

Read More⚡ THN Weekly Highlights: GitHub Supply Chain Attack, AI Malware, BYOVD Strategies, and More

Facebook Takes Action Against Spyware Vendors from the U.S., China, Russia, Israel, and India

Meta Platforms recently announced the dismantling of over 200 covert influence operations since 2017, affecting approximately 70 countries and spanning 42 languages. This extensive effort highlights the growing challenges of foreign interference and the active role of spyware vendors targeting diverse groups, including journalists, activists, and political dissenters globally. Among…

Read MoreFacebook Takes Action Against Spyware Vendors from the U.S., China, Russia, Israel, and India

Transforming AI into Business Value: A Webinar for Enterprises.

Brought to you by Red Hat 60 mins Generative AI is revolutionizing how businesses enhance productivity, streamline operations, and elevate customer experiences. However, many organizations face obstacles in translating innovative concepts into tangible results. The multitude of available models, tools, and associated risks can create uncertainty about how to proceed…

Read MoreTransforming AI into Business Value: A Webinar for Enterprises.

PolarEdge Botnet Targets Cisco and Other Vulnerabilities to Compromise ASUS, QNAP, and Synology Devices

A newly uncovered malware campaign has been identified, targeting edge devices from notable manufacturers including Cisco, ASUS, QNAP, and Synology. This campaign, named PolarEdge, has been active since at least late 2023, as reported by French cybersecurity firm Sekoia. The attackers are deploying a backdoor that exploits a critical vulnerability…

Read MorePolarEdge Botnet Targets Cisco and Other Vulnerabilities to Compromise ASUS, QNAP, and Synology Devices

Critical Vulnerability in Ingress NGINX Controller Enables Authentication-Free RCE

Security Vulnerabilities Discovered in Ingress NGINX Controller, Potentially Exposing Over 6,500 Kubernetes Clusters A suite of five significant security vulnerabilities has been identified within the Ingress NGINX Controller for Kubernetes. These weaknesses could lead to unauthorized remote code execution, jeopardizing the security of more than 6,500 clusters that are currently…

Read MoreCritical Vulnerability in Ingress NGINX Controller Enables Authentication-Free RCE

Forecasting Cybercrime and Security Trends for 2023

As cybercriminals continuously evolve with emerging technologies and shifting regulatory landscapes, organizations must proactively strengthen their cybersecurity protocols. This report examines anticipated trends in cybercrime for 2023 and outlines strategies for enhancing security measures. Growing Threat of Digital Supply Chain Attacks The digitization of supply chains introduces significant security vulnerabilities.…

Read MoreForecasting Cybercrime and Security Trends for 2023