The Breach News

Major Cryptocurrency Exchange Breached! Over $1 Million in Bitcoin and Ether Stolen

In a significant cybersecurity breach, Bithumb, a major player in the cryptocurrency exchange market, suffered a hack that has resulted in the theft of over $1 million in digital assets. Bithumb, South Korea’s largest exchange, is responsible for a substantial portion of global trading in Bitcoin and Ethereum, handling approximately…

Read MoreMajor Cryptocurrency Exchange Breached! Over $1 Million in Bitcoin and Ether Stolen

Former UCM Students Accused of Hacking and Data Theft

Two former students of the University of Central Missouri have been indicted for hacking into university databases, unlawfully accessing confidential information, and attempting to monetize the data. The individuals, identified as Joseph Camp and Daniel Fowler, are facing significant legal repercussions following actions that allegedly compromised the personal information of…

Read MoreFormer UCM Students Accused of Hacking and Data Theft

2026 Health Tech Risks: Chatbots, IT Outages, and Device Vulnerabilities

AI Chatbots Recognized as Leading Health Technology Hazard for 2026 In a comprehensive analysis by the ECRI Institute, a prominent patient safety research organization, artificial intelligence (AI) chatbots have been identified as the foremost health technology hazard for 2026. Researchers Rob Schluth and Scott Luney highlighted that these AI tools,…

Read More2026 Health Tech Risks: Chatbots, IT Outages, and Device Vulnerabilities

Threat of Cyber Attacks Due to Data Leaks or Breaches of Social Security Numbers

The exposure of Social Security Numbers (SSNs) remains among the most critical cybersecurity challenges today. Incidents involving SSN breaches have far-reaching implications, affecting both individuals and organizations. When sensitive data like SSNs is breached, the repercussions can be swift and devastating, leading to long-term financial and identity-related consequences. The Importance…

Read MoreThreat of Cyber Attacks Due to Data Leaks or Breaches of Social Security Numbers

Google Alerts Users to Zero-Day Vulnerability in Internet Explorer Exploited by ScarCruft Hackers

A zero-day vulnerability in Internet Explorer has been exploited by a North Korean threat actor, specifically targeting South Korean users. The attack exploits the heightened public sensitivity surrounding the recent Itaewon Halloween crowd crush incident, leveraging social engineering tactics to entice victims into downloading malware. This discovery was detailed by…

Read MoreGoogle Alerts Users to Zero-Day Vulnerability in Internet Explorer Exploited by ScarCruft Hackers

[Video] Ukrainian Authorities Capture Servers from Software Company Tied to NotPetya Cyberattack

Ukrainian Police Conduct Raids Linked to NotPetya Ransomware Incident The Ukrainian National Police recently enacted a significant operation targeting the company behind the M.E.Doc accounting software, which has been implicated in the widespread NotPetya ransomware outbreak that has affected numerous major corporations worldwide. A video released by the police depicts…

Read More[Video] Ukrainian Authorities Capture Servers from Software Company Tied to NotPetya Cyberattack

Genesco Inc. Confirms Data Breach Involving Payment Card Information at U.S. Stores

Genesco Inc. Reports Payment Card Data Breach in Network Intrusion On Friday, retail company Genesco Inc. disclosed a significant breach in its computer network, specifically targeting the segment responsible for processing payment card transactions. The Nashville, Tennessee-based retailer has acknowledged that certain card details may have been compromised, though it…

Read MoreGenesco Inc. Confirms Data Breach Involving Payment Card Information at U.S. Stores

Confidently Scaling Third-Party Risk Management: A Webinar

3rd Party Risk Management, Fraud Management & Cybercrime, Fraud Risk Management Presented by ProcessUnity   60 mins In the evolving landscape of third-party risk management, companies face unprecedented challenges in scaling their operations. The complications arise as vendor ecosystems diversify and risk signals become scattered across various tools and stakeholders,…

Read MoreConfidently Scaling Third-Party Risk Management: A Webinar

AI-Powered Hacking Campaign Compromises Over 600 Fortinet Devices

Cybersecurity Update: AI-Powered Attack on Fortinet Firewalls and Other Breaches In a recent development in the cybersecurity landscape, a financially motivated threat actor, reportedly Russian-speaking, has leveraged commercial AI toolkits to compromise over 600 Fortinet firewalls. This operation was first identified by the AWS security team, indicating that the activity…

Read MoreAI-Powered Hacking Campaign Compromises Over 600 Fortinet Devices