The Breach News

Conti Group Members Launch Financially Driven Attacks on Ukraine

Recent investigations have uncovered the involvement of former Conti cybercrime group members in multiple campaigns targeting Ukraine from April through August 2022. According to Google’s Threat Analysis Group (TAG), these cyber operations reflect a strategic continuation of prior attacks against the Eastern European nation amidst the ongoing Russo-Ukrainian conflict. The…

Read MoreConti Group Members Launch Financially Driven Attacks on Ukraine

Cybercriminals Compromise SonicWall Firewall Configurations

Network Firewalls, Network Access Control, Security Operations Compromise of Firewall Configuration Files at SonicWall Akshaya Asokan (asokan_akshaya) • September 19, 2025 Image: Michael Vi/Shutterstock SonicWall is advising customers to reset their credentials following a security breach where hackers obtained backup firewall configuration files through its cloud service. This incident has…

Read MoreCybercriminals Compromise SonicWall Firewall Configurations

Cyberattack Disrupts Airport Check-In Operations Throughout Europe

On Friday, travelers navigating some of Europe’s busiest airports encountered significant disruptions due to a cyberattack that compromised check-in technology utilized by key facilities. The incident primarily affected systems supplied by Collins Aerospace, a prominent provider of passenger processing solutions, resulting in a temporary shift to manual operations across multiple…

Read MoreCyberattack Disrupts Airport Check-In Operations Throughout Europe

CISA and FDA Issue Alert on Serious Backdoor Vulnerability in Contec CMS8000 Patient Monitors

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) have issued urgent notifications regarding a serious vulnerability found in Contec CMS8000 and Epsimed MN-120 patient monitors. This critical flaw involves hidden functionalities that could be exploited by unauthorized actors. Designated as CVE-2025-0626, the identified…

Read MoreCISA and FDA Issue Alert on Serious Backdoor Vulnerability in Contec CMS8000 Patient Monitors

ShadowLeak: Zero-Click Vulnerability Exposes Gmail Data Through OpenAI ChatGPT Deep Research Agent

Sep 20, 2025Ravie LakshmananArtificial Intelligence / Cloud Security A zero-click vulnerability has been identified in OpenAI’s ChatGPT Deep Research agent, enabling attackers to potentially access sensitive Gmail inbox data through a single malicious email, without requiring any interaction from the user. This novel exploitation method, termed ShadowLeak by cybersecurity firm…

Read MoreShadowLeak: Zero-Click Vulnerability Exposes Gmail Data Through OpenAI ChatGPT Deep Research Agent

Hacktivist Group GhostSec Breaches 55 Berghof PLCs Throughout Israel

Hacktivist Group GhostSec Breaches Israeli PLCs as Part of “Free Palestine” Campaign In a significant cybersecurity incident, the hacktivist collective GhostSec has taken responsibility for compromising approximately 55 Berghof programmable logic controllers (PLCs) employed by various Israeli organizations. This action is a component of their ongoing “Free Palestine” campaign, which…

Read MoreHacktivist Group GhostSec Breaches 55 Berghof PLCs Throughout Israel

Vega Raises $65M to Expand SecOps and Challenge Traditional SIEM Solutions

Advanced Detection and Response: Vega’s Innovative Approach to Cybersecurity A New York-based startup, Vega, has made headlines by securing $65 million in funding to transform enterprise threat detection and response. Founded by Shay Sandler, the former research lead at Granulate, Vega aims to offer a fresh take on how organizations…

Read MoreVega Raises $65M to Expand SecOps and Challenge Traditional SIEM Solutions

Understanding Attack Surface Management

As digital landscapes evolve, attack surfaces are expanding at a pace that often outstrips the capacity of security teams to manage. To effectively defend against potential breaches, understanding what assets are exposed and identifying vulnerabilities is essential. The surge in cloud adoption has made it easier for organizations to inadvertently…

Read MoreUnderstanding Attack Surface Management