The Breach News

T-Mobile Uncovers Network Intrusion Attempts from a Wireline Provider

T-Mobile Detects Intrusion Attempts, No Data Breach Confirmed Telecom giant T-Mobile recently announced that it has thwarted attempts by cyber actors to penetrate its networks in the past few weeks. Fortunately, the company confirmed that no sensitive customer data was accessed during these attempts. The intrusion efforts were traced back…

Read MoreT-Mobile Uncovers Network Intrusion Attempts from a Wireline Provider

Palo Alto Networks Addresses Authentication Bypass Vulnerability in PAN-OS Software

Palo Alto Networks Addresses Severe Vulnerability in PAN-OS Palo Alto Networks has announced a critical update regarding a significant security vulnerability in its PAN-OS software, identified as CVE-2025-0108. This flaw poses a risk of authentication bypass, granting unauthorized network attackers the ability to leverage the management web interface without proper…

Read MorePalo Alto Networks Addresses Authentication Bypass Vulnerability in PAN-OS Software

Serious PHP Flaw Leaves QNAP NAS Devices Vulnerable to Remote Exploits

QNAP, a prominent Taiwanese manufacturer renowned for its network-attached storage (NAS) solutions, has disclosed efforts to rectify a significant PHP vulnerability that has persisted for three years. This flaw poses a risk of remote code execution, a critical concern for businesses employing these devices. According to a security advisory issued…

Read MoreSerious PHP Flaw Leaves QNAP NAS Devices Vulnerable to Remote Exploits

North Korean Fake Job Recruiters Intensify Their Covert Strategies

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime, Social Engineering Eset Reports: Lazarus Group’s Backdoor Now in Hands of New North Korean Threat Actor Pooja Tikekar (@PoojaTikekar) • September 26, 2025 Statues of North Korean leaders Kim Il-Sung and Kim Chong-Il in Pyongyang. (Image: Shutterstock/ISMG) Recent cybersecurity findings reveal that…

Read MoreNorth Korean Fake Job Recruiters Intensify Their Covert Strategies

XML-RPC npm Library Compromised: Data Theft and Crypto Mining Deployments Confirmed

Cybersecurity experts have identified a prolonged software supply chain breach affecting the npm package registry, with the attack persisting for over a year. What initially appeared to be a benign library evolved into a tool embedding malicious code designed to siphon sensitive data and mine cryptocurrency from compromised systems. The…

Read MoreXML-RPC npm Library Compromised: Data Theft and Crypto Mining Deployments Confirmed

Access Granted – Restricted Entry

Access Denied Access to the following article has been restricted. The content discusses a significant data breach incident that has emerged, specifically involving Harrods, a prestigious retailer known worldwide. Details regarding customer data being compromised have raised serious concerns within the cybersecurity community. The reference identifier for this incident is…

Read MoreAccess Granted – Restricted Entry

PostgreSQL Vulnerability Exploited in Targeted Attacks with BeyondTrust Zero-Day

Cybersecurity researchers from Rapid7 have uncovered a concerning link between threat actors who exploited a zero-day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 and a previously unreported SQL injection flaw in PostgreSQL. This newly identified vulnerability, designated as CVE-2025-1094, has been assigned…

Read MorePostgreSQL Vulnerability Exploited in Targeted Attacks with BeyondTrust Zero-Day

APT Hackers Exploit Industrial Control Systems Using ShadowPad Backdoor

Recent reports have surfaced detailing a targeted cyberattack campaign aimed at unpatched Microsoft Exchange Servers, utilizing these vulnerabilities as a foothold to deploy the sophisticated ShadowPad malware. Key targets include entities in Afghanistan, Malaysia, and Pakistan, particularly focusing on organizations within the telecommunications, manufacturing, and transportation sectors. The activity was…

Read MoreAPT Hackers Exploit Industrial Control Systems Using ShadowPad Backdoor