The Breach News

Madman Theory Ignites Wild Scattered Lapsus$ Hunter’s Playbook

Cybercrime, Fraud Management & Cybercrime, Ransomware Chaos Theory Meets Ransomware, Creating Unpredictable Outcomes Mathew J. Schwartz (euroinfosec) • October 17, 2025 Image: Shutterstock Once predominantly a forte of Russian cybercriminals evading law enforcement, a surge in ransomware activity is now attributed to reckless teenagers from the West who operate under…

Read MoreMadman Theory Ignites Wild Scattered Lapsus$ Hunter’s Playbook

Dodo and IPrimus Data Breach: Over 1,600 Accounts Compromised

Cybersecurity Incident: Data Breach at Australian Telecom Providers Dodo and iPrimus A significant data breach has impacted two prominent Australian telecommunications companies, Dodo and iPrimus, resulting in the exposure of over 1,600 customer accounts. This cyberattack, which targeted their email systems, has raised substantial concerns regarding the security of personal…

Read MoreDodo and IPrimus Data Breach: Over 1,600 Accounts Compromised

Transform Vulnerability Management into Exposure Management: Your Starting Point!

Vulnerability Management (VM) has served as a foundational aspect of cybersecurity within organizations. Established nearly alongside the discipline itself, it seeks to help entities identify and rectify potential security weaknesses before they escalate into serious issues. In recent years, however, the shortcomings of traditional VM approaches have become increasingly pronounced.…

Read MoreTransform Vulnerability Management into Exposure Management: Your Starting Point!

Apache Log4j Vulnerability: Log4Shell Actively Under Widespread Attack

Recent cybersecurity developments have revealed that cybercriminals are actively exploiting the newly discovered “Log4Shell” vulnerability in the widely used Log4j library. This vulnerability has enabled attackers to exploit unpatched servers, allowing them to deploy cryptocurrency miners, utilize Cobalt Strike for additional malicious objectives, and integrate compromised devices into expanding botnets.…

Read MoreApache Log4j Vulnerability: Log4Shell Actively Under Widespread Attack

Enigmatic Team Bangladesh Launches DDoS Attacks and Data Breaches Against India

A hacktivist collective named Mysterious Team Bangladesh has been implicated in over 750 distributed denial-of-service (DDoS) attacks, alongside 78 instances of website defacement, since June 2022. According to a report by Group-IB, a cybersecurity firm based in Singapore, this group primarily targets organizations in the logistics, government, and financial sectors…

Read MoreEnigmatic Team Bangladesh Launches DDoS Attacks and Data Breaches Against India

New York Hospitals Are Confronting Stricter Cybersecurity Regulations Beyond HIPAA

Recent cybersecurity regulations in New York state have significantly heightened compliance requirements for certain hospitals, presenting new challenges for data governance. Matthew Bernstein, a consultant with Bernstein Data, highlighted that these regulations operate alongside the federal HIPAA security rule, complicating compliance for healthcare providers. Introduced last year, New York State’s…

Read MoreNew York Hospitals Are Confronting Stricter Cybersecurity Regulations Beyond HIPAA

MoD Investigates Allegations of Russian Hackers Stealing Base Files

The Ministry of Defence (MoD) in the UK is currently investigating allegations that Russian hackers have compromised sensitive military documents, some of which have reportedly surfaced on the dark web. This breach, bringing to light significant vulnerabilities within military operations, underscores the ongoing threat posed by nation-state actors in cybersecurity.…

Read MoreMoD Investigates Allegations of Russian Hackers Stealing Base Files

Critical Flaw in Mitel MiCollab Exposes Systems to Unauthorized File and Admin Access

Cybersecurity experts have unveiled a proof-of-concept exploit linked to a recently patched critical vulnerability in the Mitel MiCollab platform. This exploit combines the flaw—designated CVE-2024-41713—with an existing zero-day vulnerability, enabling attackers to access files from vulnerable systems. The vulnerability in question carries a CVSS score of 9.8, highlighted by insufficient…

Read MoreCritical Flaw in Mitel MiCollab Exposes Systems to Unauthorized File and Admin Access

Microsoft Reveals Key Components of the Widely Active Qakbot Banking Trojan

Recent investigations into the Qakbot malware, often described as a multi-faceted threat, have revealed its infection strategies, segmented into distinct components. Microsoft has characterized these “building blocks” as vital for the proactive detection and neutralization of this threat, aiming to enhance cybersecurity measures significantly. The Microsoft 365 Defender Threat Intelligence…

Read MoreMicrosoft Reveals Key Components of the Widely Active Qakbot Banking Trojan