The Breach News

Manipulating the Human Mind: Uncovering Weaknesses in the ‘First Line of Cyber Defense’

Human beings are intricate entities characterized by consciousness and emotion, capable of thought-driven actions. In the dynamic field of cybersecurity, humans remain a primary target for malicious actors. Over time, attackers have honed their abilities to exploit various aspects of human psychology, manipulating emotional triggers and biases to influence behaviors…

Read MoreManipulating the Human Mind: Uncovering Weaknesses in the ‘First Line of Cyber Defense’

Forever 21 Confirms Security Breach Exposing Customer Credit Card Information

Data Breach at Forever 21 Affects Customer Credit Card Information In November 2017, Forever 21, the prominent retail clothing chain, reported a significant data breach that has now been confirmed to have compromised customer credit card information across multiple store locations in the United States for several months during the…

Read MoreForever 21 Confirms Security Breach Exposing Customer Credit Card Information

Taking Control: A CISO’s Guide to Career Empowerment

CISO Trainings, Governance & Risk Management, Leadership & Executive Communication Documenting Risks: The Essential Duty for Security Leaders to Combat Retroactive Accountability Brandy Harris • December 17, 2025 Image: Shutterstock A recent post on LinkedIn has sparked conversations within cybersecurity communities, presenting what appears to be a CISO’s resignation letter…

Read MoreTaking Control: A CISO’s Guide to Career Empowerment

New Bluetooth Vulnerability Could Allow Hackers to Control Android, Linux, macOS, and iOS Devices

A significant security vulnerability affecting Bluetooth technology poses risks to Android, Linux, macOS, and iOS devices. Identified as CVE-2023-45866, this flaw allows malicious actors to bypass authentication procedures, enabling unauthorized access to susceptible devices and the capability to execute commands remotely. According to security researcher Marc Newlin, who disclosed these…

Read MoreNew Bluetooth Vulnerability Could Allow Hackers to Control Android, Linux, macOS, and iOS Devices

New USB-C Espionage Tool Steals Data from Air-Gapped Computers

New Malware Threat Targets Air-Gapped Systems in Southeast Asia Recent research from Kaspersky has unveiled that a sophisticated Chinese threat actor, identified as Cycldek, has enhanced its capabilities to attack air-gapped systems with the intent of exfiltrating sensitive information for espionage purposes. Cycldek, also known as Goblin Panda or Conimes,…

Read MoreNew USB-C Espionage Tool Steals Data from Air-Gapped Computers

LeakedSource Founder Arrested for Allegedly Selling 3 Billion Stolen Credentials

Canadian Man Charged in Massive Data Breach Operation Canadian law enforcement has apprehended an individual in Ontario for allegedly running a website that amassed stolen personal identity records from approximately three billion online accounts. The accused, Jordan Evan Bloom, 27, from Thornhill, is connected to LeakedSource.com, a site known for…

Read MoreLeakedSource Founder Arrested for Allegedly Selling 3 Billion Stolen Credentials