The Breach News

White House Transfers Cyber Risk Responsibilities to State and Local Agencies

Cybersecurity Spending, Government, Industry Specific Executive Order Transfers Cybersecurity Responsibilities to States, Raising Security Concerns Chris Riotta (@chrisriotta) • March 20, 2025 Experts indicate that states are increasingly vulnerable to cyber threats as federal support diminishes. (Image: Shutterstock) In a significant policy shift, the White House has announced a transition…

Read MoreWhite House Transfers Cyber Risk Responsibilities to State and Local Agencies

Insights from a Security Researcher on the HIPAA Security Rule – DataBreaches.net

New Insights on HIPAA Security Rule from Security Researcher In a recent development concerning healthcare cybersecurity, a security researcher has provided critical insights into compliance with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. This exploration into HIPAA’s implications highlights ongoing vulnerabilities within the healthcare sector and raises…

Read MoreInsights from a Security Researcher on the HIPAA Security Rule – DataBreaches.net

Navigating Compliance Risks and Unseen Liabilities for CISOs

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development, Standards, Regulations & Compliance Expert Insights from Jonathan Armstrong on AI Security and Legal Challenges Surrounding the EU AI Act Anna Delaney (annamadeline) • March 20, 2025 Jonathan Armstrong, Partner, Punter Southall Law The landscape of artificial intelligence regulation is…

Read MoreNavigating Compliance Risks and Unseen Liabilities for CISOs

Affordable Drone Accessories from China Enable Anyone with a Credit Card to Transform Toys into Weapons of War

In December, reports emerged highlighting the innovative capabilities of the Ukrainian military, particularly regarding the deployment of long-range tethered drones for operational use. According to the Kyiv Post, approximately 40 percent of these drones’ components are sourced domestically within Ukraine, though the remainder is imported due to the constraints of…

Read MoreAffordable Drone Accessories from China Enable Anyone with a Credit Card to Transform Toys into Weapons of War

Akira Ransomware Encryption Compromised via Cloud Computing

Ransomware has emerged as one of the most dreaded threats in the realm of cybersecurity. Cybercriminals are increasingly employing advanced technologies, including artificial intelligence, to carry out attacks that are both highly effective and remarkably sophisticated. As a result of these escalating threat levels, many victims find themselves faced with…

Read MoreAkira Ransomware Encryption Compromised via Cloud Computing

Hackers Take Advantage of Unresolved ChatGPT Vulnerability

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Over 10,000 Exploit Attempts Documented Within a Week from One Malicious IP Rashmi Ramesh (rashmiramesh_) • March 19, 2025 Image: Shutterstock Recent security research has unveiled that hackers are leveraging a vulnerability in ChatGPT’s infrastructure, leading to the redirection of…

Read MoreHackers Take Advantage of Unresolved ChatGPT Vulnerability

SpyX Data Breach Compromises Personal Information of Nearly 2 Million Users

Spyware Developer SpyX Faces Major Data Breach SpyX, a prominent developer of spyware, has suffered a significant data breach affecting personal information belonging to nearly 2 million users. The incident, which transpired on June 24, 2024, has raised serious concerns regarding privacy and cybersecurity, revealing a trove of sensitive user…

Read MoreSpyX Data Breach Compromises Personal Information of Nearly 2 Million Users

Beware: Browser Searches Can Lead to Ransomware Risks

The landscape of cybersecurity is witnessing a concerning evolution as recent reports indicate a surge in ransomware attacks. Traditionally, these attacks have been directed at individuals, corporations, and governmental bodies. However, cybersecurity specialists are now drawing attention to an alarming new tactic: the distribution of ransomware through online search queries.…

Read MoreBeware: Browser Searches Can Lead to Ransomware Risks