The Breach News

Company Discovers Years-Long Breach After Hacker Overfills Server Storage

A critical breach of cybersecurity measures can have devastating implications for organizations, especially when it involves a failure to detect intrusions. InfoTrax Systems, a technology firm based in Utah, serves as a stark example. The company fell victim to multiple breaches—over 20 instances—between May 2014 and March 2016, revealing significant…

Read MoreCompany Discovers Years-Long Breach After Hacker Overfills Server Storage

Sweet Security Secures $75M for Integrated AI and Cloud Protection

Agentic AI, Artificial Intelligence & Machine Learning, Cloud Security Israeli Startup Plans to Enhance AI Agent Security Within Cloud Platforms Michael Novinson (MichaelNovinson) • November 24, 2025 Eyal Fisher, co-founder and chief product officer, Sweet Security (Image: Sweet Security) Sweet Security, an Israeli startup established by former Chief Information Security…

Read MoreSweet Security Secures $75M for Integrated AI and Cloud Protection

Common Breaches Affecting Everyone (And How to Prevent Them)

Recent headlines have been inundated with alarming reports of zero-day vulnerabilities and state-sponsored cyberattacks. However, the stark reality reveals a more mundane threat landscape. Ross Haleliuk from Venture in Security highlights the human tendency to prioritize sensational events while downplaying everyday risks, which often lead to significant damage. For instance,…

Read MoreCommon Breaches Affecting Everyone (And How to Prevent Them)

New “GoFetch” Vulnerability in Apple M-Series Chips Exposes Sensitive Encryption Keys

A significant security vulnerability has been identified in Apple’s M-series chips, enabling potential attackers to extract cryptographic keys integral to secure data operations. Known as GoFetch, this flaw relates to a microarchitectural side-channel attack that exploits the data memory-dependent prefetcher (DMP), specifically targeting constant-time cryptography implementations to covertly access sensitive…

Read MoreNew “GoFetch” Vulnerability in Apple M-Series Chips Exposes Sensitive Encryption Keys

A Comprehensive Guide to the Growing Threat of Ransomware

In today’s rapidly changing cybersecurity landscape, ransomware remains a particularly daunting challenge. It has evolved to become increasingly destructive, persistent, and difficult to combat, showing no indications of abating. Organizations that fall prey to ransomware attacks often experience extensive data loss, operational disruptions, costly recovery processes, potential legal ramifications, and…

Read MoreA Comprehensive Guide to the Growing Threat of Ransomware

T-Mobile Experiences Data Breach Impacting Prepaid Wireless Users

T-Mobile Data Breach Exposes Prepaid Customer Information T-Mobile, the prominent US telecommunications provider, has announced a data breach that has potentially compromised personal information of its prepaid service customers. Those affected are urged to take immediate action by updating or creating their account PINs or passcodes to bolster their security…

Read MoreT-Mobile Experiences Data Breach Impacting Prepaid Wireless Users

US FCC Abandons CALEA Initiative, Heightening Concerns Over Telecom Security

Critical Infrastructure Security, Standards, Regulations & Compliance Lawmakers Warn That Regulatory Reversal Undermines Cybersecurity Standards for Major Telecom Providers Chris Riotta (@chrisriotta) • November 24, 2025 Image: Shutterstock The U.S. Federal Communications Commission’s (FCC) recent decision to rescind its newly interpreted guidelines under the Communications Assistance for Law Enforcement Act…

Read MoreUS FCC Abandons CALEA Initiative, Heightening Concerns Over Telecom Security

AI Assistants: Outpacing Humans in Corporate Data Breaches

In an evolving digital landscape, cybersecurity threats are projected to increase in complexity, particularly as autonomous artificial intelligence (AI) assumes a prominent position within businesses. With the integration of AI, organizations face new risks that could lead to data leaks, increased internal threats, and compliance challenges. Without adequate controls in…

Read MoreAI Assistants: Outpacing Humans in Corporate Data Breaches

CISA Warns of Ongoing Exploitation of Vulnerabilities in Fortinet, Ivanti, and Nice Solutions

On Monday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog with three critical security flaws, highlighting their active exploitation in the wild. The vulnerabilities now included are CVE-2023-48788, CVE-2021-44529, and CVE-2019-7256, which pose significant risks to users of affected systems. Among these, CVE-2023-48788,…

Read MoreCISA Warns of Ongoing Exploitation of Vulnerabilities in Fortinet, Ivanti, and Nice Solutions