The Breach News

CISO’s Comprehensive Guide to CTEM and Its Significance

As cyber threats become increasingly sophisticated, organizations must ensure their defensive strategies remain cutting-edge. A newly released free guide highlights Continuous Threat Exposure Management (CTEM) as a proactive cybersecurity approach. Access it here. This succinct report provides compelling evidence for why CTEM offers a comprehensive strategy for strengthening cyber defenses…

Read MoreCISO’s Comprehensive Guide to CTEM and Its Significance

North Korean Maui Ransomware Actively Attacking U.S. Healthcare Organizations

Recent cybersecurity advisories from U.S. intelligence and cybersecurity agencies have revealed that North Korean state-sponsored hackers are utilizing Maui ransomware to specifically target the healthcare sector since at least May 2021. The advisory indicates that compromised servers responsible for essential healthcare services—including electronic health records, diagnostic imaging, and internal communication…

Read MoreNorth Korean Maui Ransomware Actively Attacking U.S. Healthcare Organizations

How the EU Data Act Restores User Control

Data Governance, Data Security, Finance & Banking Newly Implemented Rule to Boost Cloud Competition and AI Development Akshaya Asokan (asokan_akshaya) • September 25, 2025 Shaun Hurst, principal regulatory advisor, Smarsh The European Union’s Data Act has entered its second phase of implementation, fundamentally reshaping the data landscape by empowering users…

Read MoreHow the EU Data Act Restores User Control

Cleo File Transfer Vulnerability Exploited – Patch Coming Soon, Immediate Mitigation Recommended

Cleo File Transfer Software Targeted by Widespread Exploitation of Critical Vulnerability Cleo, a leading provider of managed file transfer software, is currently grappling with reports of extensive exploitation of a significant vulnerability, even in fully patched systems. Users are being urged to ensure their installations are secured against potential internet…

Read MoreCleo File Transfer Vulnerability Exploited – Patch Coming Soon, Immediate Mitigation Recommended

Volvo Data Breach: An In-Depth Analysis of Technical and Organizational Shortcomings

Volvo North America Confirms Employee Data Breach Due to Ransomware Attack on Third-Party Provider Volvo North America has publicly acknowledged a significant data breach that has compromised employee records. This breach was triggered by a ransomware attack on Miljödata, a third-party provider that handles HR software for Volvo. Notably, the…

Read MoreVolvo Data Breach: An In-Depth Analysis of Technical and Organizational Shortcomings

Juniper Session Smart Routers Flaw Could Allow Attackers to Bypass Authentication

Juniper Networks has issued urgent security updates in response to a critical vulnerability affecting its Session Smart Router, Session Smart Conductor, and WAN Assurance Router products. This flaw could potentially allow unauthorized access, enabling attackers to seize control of affected devices. The vulnerability, designated as CVE-2025-21589, has been assigned a…

Read MoreJuniper Session Smart Routers Flaw Could Allow Attackers to Bypass Authentication

State-Sponsored Hackers Target Journalists in Extensive Espionage Efforts

In an alarming uptick in cyber warfare, state-sponsored hacking groups linked to China, Iran, North Korea, and Turkey have increasingly targeted journalists for espionage and malware distribution since early 2021. These coordinated efforts focus on infiltrating the communications of media personnel, which presents a unique opportunity for gathering sensitive information.…

Read MoreState-Sponsored Hackers Target Journalists in Extensive Espionage Efforts

Newly Discovered Chinese Espionage Hacking Group Exposed

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime, Network Firewalls, Network Access Control ‘RedNovember’ Engages Organizations Across the US, Asia, and Europe Akshaya Asokan (asokan_akshaya) • September 25, 2025 Image: Shutterstock/ISMG A recently identified hacking group, linked to extensive compromises of edge devices, has been confirmed as state-aligned with China,…

Read MoreNewly Discovered Chinese Espionage Hacking Group Exposed

U.S. Accuses Chinese Hacker of Exploiting Zero-Day Vulnerability in 81,000 Sophos Firewalls

The U.S. government has recently unsealed charges against a Chinese individual, Guan Tianfeng, linked to a significant cybersecurity breach in which thousands of Sophos firewall devices were compromised worldwide in 2020. Guan, who allegedly worked for Sichuan Silence Information Technology Company, Limited, is facing accusations of conspiracy to commit computer…

Read MoreU.S. Accuses Chinese Hacker of Exploiting Zero-Day Vulnerability in 81,000 Sophos Firewalls