The Breach News

New Variant of Mirai Botnet ‘V3G4’ Targets Linux and IoT Devices by Exploiting 13 Vulnerabilities

A newly discovered variant of the infamous Mirai botnet has emerged, exploiting multiple security vulnerabilities to spread across Linux and Internet of Things (IoT) devices. Identified in the latter half of 2022, this variant has been labeled V3G4 by researchers at Palo Alto Networks’ Unit 42. Their investigation has revealed…

Read MoreNew Variant of Mirai Botnet ‘V3G4’ Targets Linux and IoT Devices by Exploiting 13 Vulnerabilities

Chinese Hackers Infiltrate Asian Telecom, Undetected for Over Four Years

Telecommunications Giant Targeted by State-Sponsored Hackers A prominent telecommunications company in Asia was reportedly infiltrated for over four years by Chinese state-sponsored hackers, as revealed in a recent report by cybersecurity firm Sygnia. Although the identity of the affected telecom provider remains undisclosed, the incident highlights the vulnerabilities in critical…

Read MoreChinese Hackers Infiltrate Asian Telecom, Undetected for Over Four Years

Czech Alert Exposes China’s User Data Theft – Dark Reading

Czech Authority Issues Alert on Potential Data Theft by China In a significant cybersecurity alert, Czech officials have raised concerns about potential data theft orchestrated by China. This warning has drawn attention from cybersecurity experts and business owners alike, as it highlights the increasing risks associated with foreign involvement in…

Read MoreCzech Alert Exposes China’s User Data Theft – Dark Reading

GCP Cloud Composer Vulnerability Allows Attackers to Elevate Access through Malicious PyPI Packages

Vulnerability in Google Cloud Composer Exposes Privilege Escalation Risk Recent findings by cybersecurity experts have unveiled a significant vulnerability in the Google Cloud Platform (GCP), specifically within the Cloud Composer service, which orchestrates workflows based on Apache Airflow. This flaw, dubbed “ConfusedComposer,” has since been addressed and could have potentially…

Read MoreGCP Cloud Composer Vulnerability Allows Attackers to Elevate Access through Malicious PyPI Packages

⚡ This Week’s Leading Cybersecurity News — Cybersecurity Newsletter

Welcome to this week’s edition of the cybersecurity newsletter. Our goal is to arm you with the latest intelligence on cyber threats that could jeopardize your business operations. In this week’s issue, we examine critical updates regarding vulnerabilities affecting Apple devices, the rising threat of ransomware, unprecedented DDoS attacks, and…

Read More⚡ This Week’s Leading Cybersecurity News — Cybersecurity Newsletter

Attackers Take Advantage of Sitecore Zero-Day Vulnerability

Encryption & Key Management, Security Operations Mandiant Uncovers Significant Vulnerability in Sitecore Products Prajeet Nair (@prajeetspeaks) • September 4, 2025 Image: Shutterstock Cybercriminals have exploited a recently patched zero-day vulnerability within Sitecore, a widely used content management system supporting numerous major enterprises, including HSBC, L’Oréal, Toyota, and United Airlines. Sitecore…

Read MoreAttackers Take Advantage of Sitecore Zero-Day Vulnerability

Hackers Deploy E-Crime Tool Atlantis AIO for Credential Stuffing Across Over 140 Platforms

A recent analysis by Abnormal Security has unveiled the exploitation of a sophisticated e-crime tool known as Atlantis AIO Multi-Checker for conducting credential stuffing attacks. This tool significantly enhances the efficiency of cybercriminals, allowing them to test vast quantities of stolen credentials in quick succession. Credential stuffing attacks occur when…

Read MoreHackers Deploy E-Crime Tool Atlantis AIO for Credential Stuffing Across Over 140 Platforms