The Breach News

PLAYFULGHOST: Distribution Through Phishing and SEO Poisoning in Compromised VPN Applications

PLAYFULGHOST Malware Discovered Targeting VPN Users with Sophisticated Methods Cybersecurity experts have recently identified a new malware strain named PLAYFULGHOST, which is characterized by its extensive information-gathering capabilities, including keylogging, screen capture, and remote file execution. This malware has been implicated in various cyber attacks, indicating a strategic focus on…

Read MorePLAYFULGHOST: Distribution Through Phishing and SEO Poisoning in Compromised VPN Applications

EV Charging Company Confirms Data Breach Exposing Customer Information

In the ever-evolving landscape of electric vehicle (EV) infrastructure, a recent significant security breach has highlighted vulnerabilities associated with third-party data management. Digital Charging Solutions GmbH (DCS), a major provider of EV charging services, confirmed that unauthorized access by a third-party service provider led to this incident. The compromise involved…

Read MoreEV Charging Company Confirms Data Breach Exposing Customer Information

CISA Alerts on Two Actively Exploited Security Vulnerabilities in Adobe and Oracle Products

Recently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog by adding two critical security flaws affecting Adobe ColdFusion and Oracle Agile Product Lifecycle Management (PLM). This action stems from emerging evidence indicating active exploitation of these vulnerabilities. The newly added vulnerabilities are…

Read MoreCISA Alerts on Two Actively Exploited Security Vulnerabilities in Adobe and Oracle Products

Benefits and Risks for Businesses Using DeepSeek V3.1

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Splx Reports Enhanced Prompts Reduce Hallucinations, Yet Security Flaws Remain Rashmi Ramesh (@rashmiramesh_) • September 23, 2025 Image: Juan Alejandro Bernal/Shutterstock DeepSeek has unveiled its latest model, claiming significant advancements as it enters what it terms the “agent era.” While…

Read MoreBenefits and Risks for Businesses Using DeepSeek V3.1

US Discovers 100,000 SIM Cards That Could Have Disrupted NYC’s Cell Network

The U.S. Secret Service has reported the discovery and seizure of a substantial collection of telecommunications equipment capable of destabilizing the cellular network within New York City. According to a recent announcement, the agency suggests that this cache, linked to a foreign nation-state, was intended for illicit activities. Preliminary findings…

Read MoreUS Discovers 100,000 SIM Cards That Could Have Disrupted NYC’s Cell Network

From $22M Ransom to Over 100M Stolen Records: Key SaaS Threat Actors to Monitor in 2025

Certainly! Here’s a rewritten version of the provided content tailored for a tech-savvy professional audience, focusing on clarity and factual reporting while incorporating relevant cybersecurity frameworks. Cyber Threat Landscape in 2024: Rising Challenges for SaaS Security As we approach the end of 2024, the cybersecurity landscape reveals a troubling surge…

Read MoreFrom $22M Ransom to Over 100M Stolen Records: Key SaaS Threat Actors to Monitor in 2025

Your Browser Is Not Supported

Your browser is not supported | breachspot.com BreachSpot is dedicated to equipping business owners with the latest insights into data breaches and cyber threats. In an evolving digital landscape, our commitment is to provide timely information that enhances your cybersecurity posture. Regrettably, the browser you are using is not compatible…

Read MoreYour Browser Is Not Supported

2,500+ Variants of Truesight.sys Driver Exploited for EDR Bypass and HiddenGh0st RAT Deployment

A significant malware campaign has been uncovered that exploits a vulnerable driver from Adlice’s software suite to circumvent security measures and deploy the Gh0st RAT malware. This revelation underscores the persistent risks that come from legacy systems and their components. The cybersecurity firm Check Point detailed a strategic approach taken…

Read More2,500+ Variants of Truesight.sys Driver Exploited for EDR Bypass and HiddenGh0st RAT Deployment