The Breach News

Who is Responsible for the Under Armour Data Breach? – Cyber Magazine

In a recent development that has raised alarms in cybersecurity circles, Under Armour has reportedly fallen victim to a significant data breach. This incident has drawn considerable attention due to the potential vulnerability of sensitive customer information, raising critical concerns for both the affected individuals and business owners across the…

Read MoreWho is Responsible for the Under Armour Data Breach? – Cyber Magazine

Uncover the Truth: Exploring the Depths of the Cybercriminal Underground Beyond the Headlines

Each month, Cybersixgill’s threat experts provide insights into the latest tactics, techniques, and procedures employed by cybercriminals. Their reports shed light on emerging threats from the underground, detailing the actors involved and offering guidance on risk mitigation strategies. Regular updates on vulnerabilities, ransomware, and malware trends from the deep and…

Read MoreUncover the Truth: Exploring the Depths of the Cybercriminal Underground Beyond the Headlines

Most LokiBot Variants Found in the Wild are “Hijacked” Versions of the Original Malware

Recent investigations have revealed an intriguing twist in the cybersecurity landscape: even hackers can become victims. Security researchers have identified that a significant proportion of LokiBot malware circulating online are altered copies of the original variant. This discovery raises new concerns regarding the integrity of cybersecurity threats and highlights the…

Read MoreMost LokiBot Variants Found in the Wild are “Hijacked” Versions of the Original Malware

149 Million Usernames and Passwords Leaked from Vulnerable Database

In a significant cybersecurity incident, a database containing 149 million account usernames and passwords has been taken down after a researcher alerted the hosting provider. This extensive dataset included 48 million Gmail accounts, 17 million Facebook accounts, and about 420,000 for the cryptocurrency platform Binance, among others. The discovery was…

Read More149 Million Usernames and Passwords Leaked from Vulnerable Database

DOGE Transfers Social Security Data to the Cloud

Cybercrime, Fraud Management & Cybercrime Recent Developments: CIRO Phishing Breach, Ingram Micro Ransomware, and CVE Increase Pooja Tikekar (@PoojaTikekar) • January 22, 2026 Image: Shutterstock/ISMG ISMG compiles weekly summaries of cybersecurity breaches globally. Recent incidents include sensitive data shared by the U.S. Social Security Administration on an unauthorized Cloudflare server,…

Read MoreDOGE Transfers Social Security Data to the Cloud

January 23: Kazakhstan Takes Steps to Criminalize Large-Scale Data Breaches

Kazakhstan Advances Data Breach Law Reforms, Elevating Risks for Australian Firms Kazakhstan is set to implement significant reforms to its data breach laws, which will introduce criminal charges for mass personal data leaks while increasing the maximum fines to approximately $42,500. This legislative move signals an escalating commitment to stricter…

Read MoreJanuary 23: Kazakhstan Takes Steps to Criminalize Large-Scale Data Breaches

New P2PInfect Worm Affects Redis Servers on Linux and Windows Platforms

Cybersecurity experts have identified a new peer-to-peer (P2P) worm named P2PInfect, which specifically targets vulnerable Redis installations for subsequent exploitation. Unlike many previous threats, P2PInfect can compromise Redis servers operating on both Linux and Windows platforms, making it a particularly formidable threat, as noted by researchers from Palo Alto Networks’…

Read MoreNew P2PInfect Worm Affects Redis Servers on Linux and Windows Platforms

Stolen D-Link Certificate Exploited to Digitally Sign Surveillance Malware

Digitally signed malware has gained traction recently, utilizing legitimate digital certificates to mask malicious activities. Recent investigations have uncovered a malware campaign employing stolen valid digital certificates from Taiwanese technology firms, including D-Link, to authenticate their harmful applications and thereby appear trustworthy to unwitting users. Digital certificates, issued by recognized…

Read MoreStolen D-Link Certificate Exploited to Digitally Sign Surveillance Malware