The Breach News

Rocket Report: Kuiper Updates; Delays for New Glenn’s Second Flight

Rocket Report Edition 8.12: Increasing Launch Capacity Demand Across Sectors In the latest edition of the Rocket Report, we explore the growing demand for launch capacity among satellite operators, ranging from military organizations to emerging startups. Despite the proliferation of rocket launches globally, with SpaceX on track to exceed 150…

Read MoreRocket Report: Kuiper Updates; Delays for New Glenn’s Second Flight

“Courts Tighten Stance on Data-Breach Lawsuits: No Harm, No Foul” – The Wall Street Journal

‘No Harm, No Foul:’ Courts Take Tougher Stance on Data-Breach Litigation The legal landscape surrounding data breach litigation is evolving, with recent judicial decisions signaling a more stringent approach to evaluating these cases. Courts are increasingly scrutinizing the tangible impact of data breaches on affected parties, leading to a heightened…

Read More“Courts Tighten Stance on Data-Breach Lawsuits: No Harm, No Foul” – The Wall Street Journal

CISO’s Comprehensive Guide to CTEM and Its Significance

As cyber threats become increasingly sophisticated, organizations must ensure their defensive strategies remain cutting-edge. A newly released free guide highlights Continuous Threat Exposure Management (CTEM) as a proactive cybersecurity approach. Access it here. This succinct report provides compelling evidence for why CTEM offers a comprehensive strategy for strengthening cyber defenses…

Read MoreCISO’s Comprehensive Guide to CTEM and Its Significance

North Korean Maui Ransomware Actively Attacking U.S. Healthcare Organizations

Recent cybersecurity advisories from U.S. intelligence and cybersecurity agencies have revealed that North Korean state-sponsored hackers are utilizing Maui ransomware to specifically target the healthcare sector since at least May 2021. The advisory indicates that compromised servers responsible for essential healthcare services—including electronic health records, diagnostic imaging, and internal communication…

Read MoreNorth Korean Maui Ransomware Actively Attacking U.S. Healthcare Organizations

How the EU Data Act Restores User Control

Data Governance, Data Security, Finance & Banking Newly Implemented Rule to Boost Cloud Competition and AI Development Akshaya Asokan (asokan_akshaya) • September 25, 2025 Shaun Hurst, principal regulatory advisor, Smarsh The European Union’s Data Act has entered its second phase of implementation, fundamentally reshaping the data landscape by empowering users…

Read MoreHow the EU Data Act Restores User Control

Cleo File Transfer Vulnerability Exploited – Patch Coming Soon, Immediate Mitigation Recommended

Cleo File Transfer Software Targeted by Widespread Exploitation of Critical Vulnerability Cleo, a leading provider of managed file transfer software, is currently grappling with reports of extensive exploitation of a significant vulnerability, even in fully patched systems. Users are being urged to ensure their installations are secured against potential internet…

Read MoreCleo File Transfer Vulnerability Exploited – Patch Coming Soon, Immediate Mitigation Recommended

Volvo Data Breach: An In-Depth Analysis of Technical and Organizational Shortcomings

Volvo North America Confirms Employee Data Breach Due to Ransomware Attack on Third-Party Provider Volvo North America has publicly acknowledged a significant data breach that has compromised employee records. This breach was triggered by a ransomware attack on Miljödata, a third-party provider that handles HR software for Volvo. Notably, the…

Read MoreVolvo Data Breach: An In-Depth Analysis of Technical and Organizational Shortcomings

Juniper Session Smart Routers Flaw Could Allow Attackers to Bypass Authentication

Juniper Networks has issued urgent security updates in response to a critical vulnerability affecting its Session Smart Router, Session Smart Conductor, and WAN Assurance Router products. This flaw could potentially allow unauthorized access, enabling attackers to seize control of affected devices. The vulnerability, designated as CVE-2025-21589, has been assigned a…

Read MoreJuniper Session Smart Routers Flaw Could Allow Attackers to Bypass Authentication

State-Sponsored Hackers Target Journalists in Extensive Espionage Efforts

In an alarming uptick in cyber warfare, state-sponsored hacking groups linked to China, Iran, North Korea, and Turkey have increasingly targeted journalists for espionage and malware distribution since early 2021. These coordinated efforts focus on infiltrating the communications of media personnel, which presents a unique opportunity for gathering sensitive information.…

Read MoreState-Sponsored Hackers Target Journalists in Extensive Espionage Efforts