The Breach News

5 Ongoing Malware Campaigns in Q1 2025

The cybersecurity landscape has experienced notable turbulence in the first quarter of 2025, marked by intensifying attacks from cybercriminals employing innovative methods to breach defenses. This report highlights significant malware families and their corresponding analyses within controlled environments. One of the prominent threats this quarter is the NetSupport Remote Access…

Read More5 Ongoing Malware Campaigns in Q1 2025

Tenable, Qualys, and Workday: Overview of Data Breaches and Security Enhancements

This week, cybersecurity concerns took center stage as several prominent companies revealed serious data breaches linked to vulnerabilities in third-party service providers. The incidents, notably affecting Tenable, Qualys, and Workday, underscore the significant risks inherent in today’s digital supply chain. Tenable and Qualys, well-known leaders in vulnerability management, disclosed that…

Read MoreTenable, Qualys, and Workday: Overview of Data Breaches and Security Enhancements

Serious Next.js Vulnerability Enables Attackers to Bypass Middleware Authorization Controls

A significant security exploit has been identified within the Next.js React framework, revealing a potential pathway for attackers to bypass authorization checks under specific circumstances. The vulnerability is identified as CVE-2025-29927 and has been assigned a CVSS score of 9.1, indicating its high severity. According to an advisory from Next.js,…

Read MoreSerious Next.js Vulnerability Enables Attackers to Bypass Middleware Authorization Controls

FBI Charges Six Individuals, Seizes 48 Domains Associated with DDoS-for-Hire Services

On Wednesday, the U.S. Department of Justice (DoJ) announced the seizure of 48 domains linked to the facilitation of distributed denial-of-service (DDoS) attacks. These domains provided a platform for malicious actors to launch attacks, thereby diminishing the barriers to entry for cybercriminal activities. In connection with this crackdown, six individuals…

Read MoreFBI Charges Six Individuals, Seizes 48 Domains Associated with DDoS-for-Hire Services

Webinar | Leading AI Threats and How ITDR Can Mitigate Them

Webinar Announcement: Understanding Top AI-Driven Cyber Attacks and the Role of ITDR in Mitigation In a rapidly evolving cyber threat landscape, the integration of artificial intelligence (AI) is becoming a double-edged sword. While AI technologies offer significant advancements in efficiency and decision-making, they are increasingly being exploited by cybercriminals to…

Read MoreWebinar | Leading AI Threats and How ITDR Can Mitigate Them

Three Password Cracking Methods and How to Protect Yourself from Them

The significance of robust passwords often gains prominence only after a security breach. Many users remain unaware of just how susceptible their passwords are to common password-cracking techniques. An understanding of these methods, including their mechanics and defensive strategies, is essential for enhancing cybersecurity strength. Understanding Brute Force Attacks Brute…

Read MoreThree Password Cracking Methods and How to Protect Yourself from Them

Weekly Update: Findings from the Salesloft Drift Breach Investigation and Threats from Malicious GitHub Desktop Installers

In the realm of cybersecurity, last week’s developments showcased a significant range of incidents and insights. These events reflect the evolving landscape of cyber threats and the pressing need for vigilance among businesses and professionals. A critical incident involved Salesloft Drift, where attackers gained unauthorized access through the company’s GitHub…

Read MoreWeekly Update: Findings from the Salesloft Drift Breach Investigation and Threats from Malicious GitHub Desktop Installers

⚡ THN Weekly Highlights: GitHub Supply Chain Attack, AI Malware, BYOVD Strategies, and More

Recent advancements in open-source tools have inadvertently contributed to a significant supply chain breach, originating from a focused attack that swiftly expanded, compromising sensitive information across multiple projects. This breach highlights how a manipulated GitHub Action, designed to analyze changed files, evolved from targeting specific projects like Coinbase into a…

Read More⚡ THN Weekly Highlights: GitHub Supply Chain Attack, AI Malware, BYOVD Strategies, and More

Facebook Takes Action Against Spyware Vendors from the U.S., China, Russia, Israel, and India

Meta Platforms recently announced the dismantling of over 200 covert influence operations since 2017, affecting approximately 70 countries and spanning 42 languages. This extensive effort highlights the growing challenges of foreign interference and the active role of spyware vendors targeting diverse groups, including journalists, activists, and political dissenters globally. Among…

Read MoreFacebook Takes Action Against Spyware Vendors from the U.S., China, Russia, Israel, and India