The Breach News

Lazarus Group Leverages Log4j Vulnerabilities for Remote Access Trojan Deployment

The Lazarus Group, a North Korean cybercriminal entity, has launched a significant global campaign leveraging vulnerabilities in Log4j to facilitate the deployment of previously unknown remote access trojans (RATs). This operation, termed “Operation Blacksmith” by Cisco Talos, employs a range of malware families written in DLang, notably including a RAT…

Read MoreLazarus Group Leverages Log4j Vulnerabilities for Remote Access Trojan Deployment

Hackers Impersonate HR Professionals to Target Military and Aerospace Personnel with Fake Job Offers

Targeted Cyber-Espionage Campaign Hits Aerospace and Military Sectors Cybersecurity researchers have unveiled a sophisticated cyber-espionage campaign that specifically targets aerospace and military organizations across Europe and the Middle East. This initiative, termed “Operation In(ter)ception,” reportedly aimed to infiltrate and monitor key personnel within these firms while also attempting to extract…

Read MoreHackers Impersonate HR Professionals to Target Military and Aerospace Personnel with Fake Job Offers

The Platform Myth: Breaking Free from the “Stitched-Together” Security Stack Webinar.

Presented by SentinelOne 60 mins Many identity governance platforms were designed in a time when access was contained within isolated systems and governance consisted mainly of periodic reviews. However, the landscape has significantly evolved; today, access encompasses a range of applications, including ERP, HCM, and various SaaS products. As a…

Read MoreThe Platform Myth: Breaking Free from the “Stitched-Together” Security Stack Webinar.

Consumer Agency Directs SK Telecom to Compensate Users 100,000 Won Each for Data Breach

SEOUL, Dec. 21 (Yonhap) — In a significant development, South Korea’s state-run consumer agency has mandated SK Telecom Co. to compensate each affected user following a major data breach earlier this year. The authority has ordered the telecommunications giant to provide 100,000 won (approximately US$67) to every user impacted by…

Read MoreConsumer Agency Directs SK Telecom to Compensate Users 100,000 Won Each for Data Breach

New Critical RCE Vulnerability Identified in Apache Struts 2 – Update Immediately

Apache Software Foundation has issued a security advisory regarding a critical vulnerability within the Struts 2 open-source web application framework, posing a significant risk for remote code execution (RCE). This vulnerability, designated as CVE-2023-50164, stems from inadequate “file upload logic” that permits unauthorized path traversal. If exploited, attackers can upload…

Read MoreNew Critical RCE Vulnerability Identified in Apache Struts 2 – Update Immediately

WikiLeaks Founder Accused of Collaborating with LulzSec and Anonymous Hackers

The U.S. government has filed a superseding indictment against Julian Assange, the founder of WikiLeaks, alleging his involvement with hacking groups such as LulzSec and Anonymous. This updated indictment expands on the previous 18-count charges, initially levied in May 2019, though it does not introduce new allegations. The Department of…

Read MoreWikiLeaks Founder Accused of Collaborating with LulzSec and Anonymous Hackers

Facebook Harvested Your Android Call History and SMS Data for Years

A recent incident has underscored the extent of data collection by Facebook, particularly concerning its Messenger application installed on Android devices. Reports indicate that until late last year, Facebook was collecting users’ contact lists, SMS, and call history data without explicit user consent, raising serious privacy concerns. The situation gained…

Read MoreFacebook Harvested Your Android Call History and SMS Data for Years

Can We Trust AI Agents in Healthcare? Exploring Identity in the Age of AI Webinar.

Scott MacDonald: Leader in Cybersecurity and Risk Management at PwC Principal, Cyber, Risk and Regulatory Scott MacDonald serves as a Principal in PwC’s Cybersecurity practice, boasting two decades of expertise in large-scale Identity and Access Management (IAM) initiatives, particularly within the healthcare sector. His career has been marked by the…

Read MoreCan We Trust AI Agents in Healthcare? Exploring Identity in the Age of AI Webinar.