The Breach News

Saudi Arabia Threat Analysis Report

A Year of Increased Cyber Threats: Espionage, Ransomware, and Ideological Attacks Targeting Saudi Arabia Overview of Saudi Arabia’s Cyber Threat Landscape: As Saudi Arabia steps into 2025, it is contending with an exceptionally complex and turbulent cyber threat environment. Various factors contribute to this landscape, including state-sponsored espionage, sophisticated ransomware…

Read MoreSaudi Arabia Threat Analysis Report

Two Chinese APT Groups Intensify Cyber Espionage Efforts Targeting ASEAN Nations

In a recent escalation of cyber espionage efforts, two advanced persistent threat (APT) groups linked to China have intensified their targeting of organizations affiliated with the Association of Southeast Asian Nations (ASEAN) over the past three months. This campaign highlights the region’s growing significance in global geopolitical dynamics. Among the…

Read MoreTwo Chinese APT Groups Intensify Cyber Espionage Efforts Targeting ASEAN Nations

North Korean Hackers Strike Defense Firms Using ThreatNeedle Malware

A well-known North Korean state-sponsored hacking group is reportedly involved in a new, sophisticated espionage campaign aimed at extracting sensitive data from defense-related organizations. Recent insights from Kaspersky highlight that the attacks are confidently attributed to the Lazarus Group, indicating a strategic shift beyond conventional financially-motivated crimes, which have typically…

Read MoreNorth Korean Hackers Strike Defense Firms Using ThreatNeedle Malware

Maya on Money | South Africa’s New Big Data Reveals You Should Be Wary – News24

Cybersecurity Alert: Insights from South Africa’s Recent Big Data Findings In a significant revelation showcased by South African big data analytics, a pressing warning has emerged for businesses globally: heightened vigilance is essential in today’s cybersecurity landscape. Reports indicate that this latest analysis uncovers patterns that may leave organizations vulnerable…

Read MoreMaya on Money | South Africa’s New Big Data Reveals You Should Be Wary – News24

Warning: New Phishing Scheme Disguises Keylogger as Bank Payment Notification

A recently identified phishing campaign is employing a sophisticated new loader malware, which serves to deliver the information-stealer and keylogger known as Agent Tesla. Trustwave SpiderLabs reported that on March 8, 2024, they encountered a phishing email featuring this malware, disguised as a bank payment notification that entices recipients to…

Read MoreWarning: New Phishing Scheme Disguises Keylogger as Bank Payment Notification

Chinese Hackers Attack India’s Power Grid Amid Rising Geopolitical Tensions

Cybersecurity Alert: Chinese-Sponsored Attacks Target India’s Critical Infrastructure Recent revelations by cybersecurity experts have uncovered a series of coordinated cyberattacks aimed at India’s critical infrastructure, notably its power grid. These attacks, attributed to state-sponsored Chinese hacking groups, coincide with escalating border tensions between India and China that intensified in May…

Read MoreChinese Hackers Attack India’s Power Grid Amid Rising Geopolitical Tensions

LifeLabs Paid Ransom to Recover Stolen Medical Data of 15 Million Canadians

LifeLabs Suffers Major Data Breach Affecting 15 Million Canadians LifeLabs, Canada’s largest healthcare laboratory testing service provider, has reported a significant data breach that has compromised sensitive personal and medical information of nearly 15 million customers. The company revealed details of the breach in a press release on its official…

Read MoreLifeLabs Paid Ransom to Recover Stolen Medical Data of 15 Million Canadians

Who’s Responsible for Space Cybersecurity?

Business Continuity Management / Disaster Recovery, Geo Focus: Australia, Geo-Specific Orbital Frontier: An Ungoverned Internet Vulnerable to Attack Maryam Shoraka • November 11, 2025 Image: Freepik The domain of cybersecurity is venturing into uncharted territories as humanity engages in an aggressive pursuit to commercialize outer space. As critical infrastructure expands…

Read MoreWho’s Responsible for Space Cybersecurity?