The Breach News

South Korea Proposes Enhanced Digital Privacy Laws Following Major Coupang Data Breach | World News

Massive Data Breach at Coupang Sparks Urgent Call for Digital Privacy Reform in South Korea In a significant turn of events, South Korean President Lee Jae Myung has urged immediate reforms to enhance digital privacy standards following a devastating data breach that compromised the information of over 33 million customers…

Read MoreSouth Korea Proposes Enhanced Digital Privacy Laws Following Major Coupang Data Breach | World News

Lazarus Group Exploits Windows Kernel Vulnerability as Zero-Day in Recent Attacks

Recent cybersecurity intelligence has revealed that the infamous Lazarus Group has exploited a newly patched privilege escalation vulnerability in the Windows Kernel as a zero-day attack. This exploit allows the adversaries to gain kernel-level access, enabling them to disable crucial security software on affected systems. The vulnerability, identified as CVE-2024-21338…

Read MoreLazarus Group Exploits Windows Kernel Vulnerability as Zero-Day in Recent Attacks

How the SolarWinds Hackers Managed to Remain Under the Radar for So Long

On Wednesday, Microsoft provided additional insights into the methodologies employed by the attackers behind the SolarWinds breach, one of the most intricate cybersecurity incidents in recent history. This deeper understanding is crucial as cybersecurity firms endeavor to gain a more definitive grasp of the attack’s sophisticated nature. Describing the attackers…

Read MoreHow the SolarWinds Hackers Managed to Remain Under the Radar for So Long

Flock Employs International Gig Workers to Develop Its Surveillance AI

Flock Surveillance Systems Expose Data Handling Practices Flock, a provider of automatic license plate reading and AI-driven camera technologies, has come under scrutiny following revelations about its reliance on overseas workers from Upwork for training its machine learning algorithms. Internal documents, inadvertently disclosed, reveal that these workers review and categorize…

Read MoreFlock Employs International Gig Workers to Develop Its Surveillance AI

Hacker Compromises Data of Over 70% of Bulgarian Citizens via Tax Agency Servers

In a significant cybersecurity incident, Bulgaria has experienced the largest data breach in its history, affecting personal and financial information of approximately 5 million adults. This breach represents a substantial portion of the country’s total population of 7 million. Reports indicate that the breach was executed by an unidentified hacker…

Read MoreHacker Compromises Data of Over 70% of Bulgarian Citizens via Tax Agency Servers

The Challenge of AI Agents in Online Shopping

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development E-Commerce Faces Existential Threat as Autonomous Shoppers Shift Away from Ads Rashmi Ramesh (@rashmiramesh_) • December 1, 2025 Image: Shutterstock The online retail sector has long perfected strategies to drive consumers towards making purchases. However, it now contends with a…

Read MoreThe Challenge of AI Agents in Online Shopping

Minor Breaches, Major Consequences: The Legal Ramifications of Small Cyber Incidents | Constangy, Brooks, Smith & Prophete, LLP

Cyberattacks against high-profile corporations often dominate headlines, casting shadows over more subtle incidents that may not receive as much attention. However, breaches affecting smaller organizations are increasingly drawing legal scrutiny and regulatory attention. Recent trends indicate that no data breach is too insignificant to evade serious legal repercussions, particularly in…

Read MoreMinor Breaches, Major Consequences: The Legal Ramifications of Small Cyber Incidents | Constangy, Brooks, Smith & Prophete, LLP

Discovery of 100+ Malicious AI/ML Models on the Hugging Face Platform

Recent investigations have revealed the presence of up to 100 malicious artificial intelligence and machine learning models hosted on the Hugging Face platform. These models pose significant risks, as they can execute unauthorized code through the loading of specific pickle files, according to software supply chain security firm JFrog. Senior…

Read MoreDiscovery of 100+ Malicious AI/ML Models on the Hugging Face Platform