The Breach News

New Malware Discovered Utilizing Google Drive as Its Command-and-Control Server

Recent developments in the cybersecurity landscape have revealed a concerning trend wherein malicious actors leverage the infrastructure of legitimate online services to disguise their activities. According to experts, the latest campaign attributed to the DarkHydrus APT group has now employed Google Drive as its command-and-control (C2) server, a notable shift…

Read MoreNew Malware Discovered Utilizing Google Drive as Its Command-and-Control Server

Key Concerns in Privacy, Security, and Governance

Artificial Intelligence & Machine Learning, Healthcare, Industry Specific OpenAI Introduces ChatGPT Health: A Secure Link to Medical Records—But What Are the Implications? Marianne Kolbasuk McGee (HealthInfoSec) • January 8, 2026 OpenAI’s new ChatGPT Health aims to securely integrate user health information with AI capabilities, although potential risks remain. (Image: OpenAI)…

Read MoreKey Concerns in Privacy, Security, and Governance

Prosura Attackers Put Insurer Customer Data on Sale – Cybernews

Data Compromise: Prosura Attackers Target Insurer’s Customer Information In a significant cybersecurity incident, the company Prosura has reportedly fallen victim to a data breach that has compromised sensitive customer data. The breach has drawn attention in the cybersecurity community, as attackers are now allegedly offering this stolen information for sale.…

Read MoreProsura Attackers Put Insurer Customer Data on Sale – Cybernews

New Apple Zero-Day Vulnerabilities Exploited to Target Egyptian Former MP Using Predator Spyware

Apple has recently addressed three significant zero-day vulnerabilities, reported on September 21, 2023. These flaws were exploited to form part of an attack chain targeting former Egyptian parliament member Ahmed Eltantawy. Between May and September 2023, this attack aimed to deliver a spyware variant known as Predator, raising serious concerns…

Read MoreNew Apple Zero-Day Vulnerabilities Exploited to Target Egyptian Former MP Using Predator Spyware

DHS Directs Federal Agencies to Conduct DNS Security Audits for Their Domains

On October 10, the U.S. Department of Homeland Security (DHS) issued an urgent directive mandating that all federal agencies conduct thorough audits of their Domain Name System (DNS) records within the next ten business days. This emergency measure follows a series of concerning DNS hijacking incidents, which security experts, with…

Read MoreDHS Directs Federal Agencies to Conduct DNS Security Audits for Their Domains

Michigan Man Discovers the Hard Way That “Catch a Cheater” Spyware Apps Are Illegal

In a troubling development within the realm of cybersecurity, Paul Fleming, the creator of pcTattletale, a controversial surveillance application, recently faced legal repercussions after allegations surfaced regarding the misuse of his software for unauthorized spying. Despite being made aware that individuals were employing his product to invade others’ privacy, Fleming…

Read MoreMichigan Man Discovers the Hard Way That “Catch a Cheater” Spyware Apps Are Illegal