The Breach News

Does the ACL Data Breach Penalty Signal a Change in Privacy Law Enforcement?

On October 8, the Federal Court of Australia ruled that Australian Clinical Labs (ACL) must pay a substantial penalty for a data breach linked to its Medlab Pathology business, which occurred in February 2022. This ruling marks a significant moment in the enforcement of data protection laws, highlighting the increasing…

Read MoreDoes the ACL Data Breach Penalty Signal a Change in Privacy Law Enforcement?

FBI, NSA, and CISA Alert on Russian Hackers Targeting Critical Infrastructure

US Intelligence Agencies Warn of Increased Cyber Threats from Russian Actors In light of escalating tensions between the U.S. and Russia related to Ukraine and Kazakhstan, American cybersecurity and intelligence agencies have issued a joint advisory detailing strategies for detecting, responding to, and mitigating cyberattacks perpetrated by Russian state-sponsored entities.…

Read MoreFBI, NSA, and CISA Alert on Russian Hackers Targeting Critical Infrastructure

Why the F5 Hack Posed an ‘Imminent Threat’ to Thousands of Networks

Numerous digital infrastructures—primarily managed by the US government and major Fortune 500 companies—are currently under an “imminent threat” of breaches from nation-state hacking groups, following an alarming breach of a leading software provider, as warned by federal authorities on Wednesday. F5 Networks, a Seattle-based provider of networking solutions, publicly acknowledged…

Read MoreWhy the F5 Hack Posed an ‘Imminent Threat’ to Thousands of Networks

Alarmingly Low Confidence in File Upload Security: What’s Behind It?

The trend towards adopting cloud-based and containerized web applications is rapidly gaining traction across various sectors, including technology, finance, healthcare, and government. While the advantages of this transition are significant, it also introduces a range of new security risks that organizations must confront. According to OPSWAT’s 2023 Web Application Security…

Read MoreAlarmingly Low Confidence in File Upload Security: What’s Behind It?

Fraudsters Infiltrate as ‘Ideal Borrowers,’ Leading to Significant Losses

Fraud Losses Reach Alarming Levels as Synthetic Identities Exploit Lending Systems Suparna Goswami (gsuparna) • October 16, 2025 Image: Shutterstock Auto lenders generally assess risk based on credit scores, positing that higher scores indicate lower potential for fraud. However, a recent report from TransUnion reveals a concerning trend: Superprime borrowers—those…

Read MoreFraudsters Infiltrate as ‘Ideal Borrowers,’ Leading to Significant Losses

CISA and FBI Issue Warnings on Exploited Vulnerabilities and Growing HiatusRAT Campaign

Recent Cybersecurity Alerts: CISA Highlights New Vulnerabilities; FBI Warns on IoT Threats The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced on Monday the addition of two significant vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, underscoring the active exploitation of these security flaws across various platforms. This proactive measure…

Read MoreCISA and FBI Issue Warnings on Exploited Vulnerabilities and Growing HiatusRAT Campaign

US Cyber Command Associates ‘MuddyWater’ Hacking Group with Iranian Intelligence

U.S. Cyber Command Links MuddyWater Group to Iranian Intelligence Activities On Wednesday, U.S. Cyber Command (USCYBERCOM) officially identified the MuddyWater cyber group as linked to Iran’s intelligence framework, shedding light on their sophisticated tactics and tools employed to infiltrate target networks. This announcement comes amid growing concerns over the escalating…

Read MoreUS Cyber Command Associates ‘MuddyWater’ Hacking Group with Iranian Intelligence

NK’s Notorious Chollima Exploits BeaverTail and OtterCookie Malware in Employment Scam

A recent report from Cisco Talos reveals that the North Korea-linked hacking group Famous Chollima is leveraging the job market to conduct cyberattacks. The group is utilizing fraudulent job postings to ensnare victims into downloading malicious software that enables the theft of cryptocurrency and user credentials. Merging Malware Threats Two…

Read MoreNK’s Notorious Chollima Exploits BeaverTail and OtterCookie Malware in Employment Scam