The Breach News

Microsoft and OpenAI Caution Against Nation-State Hackers Exploiting AI for Cyber Attacks

Nation-State Actors Leverage AI for Cyber Attacks Recent investigations reveal that nation-state actors from Russia, North Korea, Iran, and China are increasingly incorporating artificial intelligence (AI) and large language models (LLMs) into their cyber offensive strategies. This alarming trend indicates a significant evolution in the tactics employed by these actors…

Read MoreMicrosoft and OpenAI Caution Against Nation-State Hackers Exploiting AI for Cyber Attacks

North Korean IT Scammers Transition to Extortion Techniques

North Korean Cybercriminals Shift Tactics Toward Extortion via Job FraudRecent findings from Secureworks’ counter-threat unit highlight a concerning trend in which North Korean cyber actors, masquerading as remote IT workers, are increasingly engaging in extortion against Western companies. This development represents a notable shift in tactics for these groups, leveraging…

Read MoreNorth Korean IT Scammers Transition to Extortion Techniques

Uber Penalized for ‘Major Breach’ That Exposed Data of 2.7 Million Customers to Hackers

Uber has been fined £385,000 due to severe data security lapses that permitted hackers to access and extract personal information from 2.7 million customers. The breach, which occurred in late 2016, resulted in the theft of full names, email addresses, and phone numbers. This incident represents a significant violation of…

Read MoreUber Penalized for ‘Major Breach’ That Exposed Data of 2.7 Million Customers to Hackers

Rocinante Trojan Impersonates Banking Apps to Harvest Sensitive Data from Brazilian Android Users

Mobile users in Brazil are currently facing a significant cybersecurity threat from a new malware campaign that has introduced an Android banking trojan known as Rocinante. This malware has been identified by Dutch security firm ThreatFabric, which highlights its capabilities, including keylogging via the Accessibility Service and the theft of…

Read MoreRocinante Trojan Impersonates Banking Apps to Harvest Sensitive Data from Brazilian Android Users

Tech Companies Face Scrutiny Over Privacy and Data Sharing Violations

In the wake of an Apple policy violation case earlier this August, WhatsApp has found itself under the scrutiny of the Competition Commission of India (CCI). The CCI is investigating allegations that WhatsApp’s recent update may have contravened established competition laws, marking yet another chapter in the increasing regulatory focus…

Read MoreTech Companies Face Scrutiny Over Privacy and Data Sharing Violations

Serious Unpatched Vulnerabilities Revealed in Widely Used Gogs Open-Source Git Service

Critical Security Flaws Found in Gogs Open-Source Git Service Recent research has identified four unaddressed security vulnerabilities in Gogs, a popular self-hosted, open-source Git service. Among these, three are classified as critical, potentially allowing authenticated attackers to breach vulnerable installations, access, alter, or delete source code, and introduce malicious backdoors.…

Read MoreSerious Unpatched Vulnerabilities Revealed in Widely Used Gogs Open-Source Git Service

Iran and Hezbollah Hackers Initiate Attacks to Shape Israel-Hamas Narrative

Cyber Attacks Linked to Iran and Hezbollah Targeting Israel Amid Ongoing Conflict In the wake of heightened tensions resulting from the Israel-Hamas war, hackers associated with Iran and Hezbollah have orchestrated a range of cyber attacks aimed at undermining public support for Israel. These cyber offensives emerged prominently after October…

Read MoreIran and Hezbollah Hackers Initiate Attacks to Shape Israel-Hamas Narrative

Two Unseen Tools from the Same Group Compromise Air-Gapped Devices

GoldenJackal’s Evolving Cyber Threat: A Deep Dive into Recent Developments Recent insights into the GoldenJackal cyber threat framework reveal a significant evolution in the sophistication of its attack methods since 2019. Initially known for its robust suite of capabilities, the group had developed tools that posed serious risks to organizations,…

Read MoreTwo Unseen Tools from the Same Group Compromise Air-Gapped Devices