The Breach News

CaddyWiper: A New Data-Wiping Malware Aiming at Ukrainian Networks

In a troubling escalation of cyber threats, a new strain of destructive malware named CaddyWiper has been identified amidst ongoing military tensions in Ukraine. This recent attack, discovered by Slovak cybersecurity firm ESET, adds to the alarm surrounding persistent cyber assaults as the conflict endures. Diving into the specifics, CaddyWiper…

Read MoreCaddyWiper: A New Data-Wiping Malware Aiming at Ukrainian Networks

Overcoming Shiny Object Syndrome: A Path to Focus and Clarity

Next-Generation Technologies & Secure Development, Professional Certifications & Continuous Training, Training & Security Leadership Evaluating Tools Saves Money but Demands Technical, Compliance, and Business Acumen Brandy Harris • October 1, 2025 Image: Shutterstock The cybersecurity landscape is increasingly populated by vendors promoting enticing tools, complete with flashy demonstrations and bold…

Read MoreOvercoming Shiny Object Syndrome: A Path to Focus and Clarity

NSWRA Faces Data Breach Affecting Resilient Homes Program Applicants

The NSW Reconstruction Authority (RA), an agency of the government, has recently faced scrutiny following a significant data breach that exposed personal information of individuals associated with the Northern Rivers Resilient Homes Program (RHP). This incident adds to a series of controversies the RA has encountered since its inception, particularly…

Read MoreNSWRA Faces Data Breach Affecting Resilient Homes Program Applicants

Palo Alto Firewalls Vulnerable to Secure Boot Bypass and Firmware Exploits

A recent investigation into three firewall models produced by Palo Alto Networks has revealed notable security vulnerabilities. These flaws are related to both the firmware of the devices and improperly configured security settings. According to a report from security vendor Eclypsium shared with The Hacker News, these vulnerabilities are not…

Read MorePalo Alto Firewalls Vulnerable to Secure Boot Bypass and Firmware Exploits

Google Discovers ‘Initial Access Broker’ Collaborating with Conti Ransomware Group

Google’s Threat Analysis Group (TAG) has identified a new initial access broker known as “Exotic Lily,” linked to a notorious Russian cybercrime group famed for its participation in Conti and Diavol ransomware operations. The emergence of this threat actor raises serious concerns regarding cybersecurity practices across multiple sectors. Exotic Lily…

Read MoreGoogle Discovers ‘Initial Access Broker’ Collaborating with Conti Ransomware Group

The Browser as Your Office: Understanding Potential Risks for Your Organization

The Browser Is Now the Workplace: Potential Cybersecurity Exposures for Organizations In today’s digital landscape, many businesses have transitioned to remote and hybrid work models, with the browser serving as a primary interface for daily operations. However, this reliance on web-based applications has unveiled significant vulnerabilities that cyber adversaries are…

Read MoreThe Browser as Your Office: Understanding Potential Risks for Your Organization

U.S. State Government Network Compromised Through Ex-Employee Account

Cybersecurity Alert: Network Breach at U.S. State Government Organization The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed a significant cybersecurity breach affecting an unnamed state government organization’s network. The breach was executed through the exploitation of an administrator account linked to a former employee, highlighting the vulnerabilities associated…

Read MoreU.S. State Government Network Compromised Through Ex-Employee Account

60% of UK Secondary Schools Targeted by Cyber Attacks or Breaches in the Last Year | Cybercrime

Data Breach Targets UK Nurseries: Education Sector Under Cyber Threat Last month, a significant cyber incident targeted UK nurseries, culminating in the exposure of children’s data online by a hacking group known as Radiant. This breach has sparked widespread condemnation, with critics labeling it as a new low in cybersecurity…

Read More60% of UK Secondary Schools Targeted by Cyber Attacks or Breaches in the Last Year | Cybercrime