The Breach News

Researchers Reveal Significant Vulnerabilities in Wago and Schneider Electric OT Products

Security Flaws Discovered in Wago and Schneider Electric Operational Technology Products Recent findings have revealed three significant security vulnerabilities affecting operational technology (OT) products developed by Wago and Schneider Electric. According to reports from Forescout, these vulnerabilities are part of a more extensive collection of issues known collectively as OT:ICEFALL,…

Read MoreResearchers Reveal Significant Vulnerabilities in Wago and Schneider Electric OT Products

Understanding How eFail Attacks Exploit PGP and S/MIME Encrypted Emails

Security researchers have urgently disclosed a set of vulnerabilities affecting email clients that utilize two prominent email encryption standards, PGP and S This disclosure follows the inadvertent leak of their forthcoming research paper, which was initially scheduled for release tomorrow. PGP and S/MIME serve as widely adopted end-to-end encryption protocols,…

Read MoreUnderstanding How eFail Attacks Exploit PGP and S/MIME Encrypted Emails

Ashley Madison 2.0: Hackers Release 20GB Data Leak, Featuring CEO Emails

Major Data Exposure: Ashley Madison Suffers Extensive Breach In a significant cybersecurity incident, the hacking collective known as the Impact Team has struck again, releasing a vast cache of sensitive information linked to Ashley Madison, a well-known dating service for those seeking extramarital affairs. This latest breach includes nearly 20GB…

Read MoreAshley Madison 2.0: Hackers Release 20GB Data Leak, Featuring CEO Emails

Social Engineering Attackers Target Okta’s Single Sign-On System

Fraud Management & Cybercrime, Identity & Access Management, Security Operations ShinyHunters Campaign Utilizes Voice Phishing to Circumvent MFA and Compromise Corporate Data Mathew J. Schwartz (euroinfosec) • January 28, 2026 Image: Oleksandr Yashchuk/Shutterstock Security experts are advising customers of identity provider Okta utilizing its single-sign-on (SSO) services to remain vigilant…

Read MoreSocial Engineering Attackers Target Okta’s Single Sign-On System

⚠️ Warning! Hackers Targeting Severe Vulnerability in VMware Aria Operations Networks

VMware has announced that a critical command injection vulnerability, designated as CVE-2023-20887, in Aria Operations for Networks (formerly known as vRealize Network Insight), is currently being exploited in the wild. This breach allows attackers with network access to perform command injection attacks, potentially leading to remote code execution. The vulnerability…

Read More⚠️ Warning! Hackers Targeting Severe Vulnerability in VMware Aria Operations Networks

Nethammer: Leveraging the DRAM Rowhammer Vulnerability via Network Requests

Recent advancements in cyber-attack methodologies have seen the emergence of a novel network-based variant of the notorious Rowhammer attack, referred to as “Nethammer.” This approach exploits vulnerabilities in dynamic random access memory (DRAM) through network cards, and it capitalizes on remote direct memory access (RDMA) channels to manipulate memory states…

Read MoreNethammer: Leveraging the DRAM Rowhammer Vulnerability via Network Requests