The Breach News

Chinese Silk Typhoon Group Focuses on IT Tools for Network Intrusions

Cybersecurity Update: Silk Typhoon Shifts Tactics in Espionage Operations Recent observations by Microsoft Threat Intelligence reveal a significant change in the operational strategies of the espionage group known as Silk Typhoon, also referred to as HAFNIUM. This Chinese-backed organization, recognized for its advanced technical capabilities, is increasingly leveraging commonly utilized…

Read MoreChinese Silk Typhoon Group Focuses on IT Tools for Network Intrusions

U.S. Takes Action Against Chinese Hacker Network and Unveils Indictments

Prosecutors Charge Yin Kecheng in 2024 Treasury Department Hack In a significant development concerning cybercrime, U.S. federal authorities have moved to seize digital infrastructure linked to two Shanghai-based hackers alleged to operate on behalf of the Chinese government, specifically under the guise of a group known as "Silk Typhoon." This…

Read MoreU.S. Takes Action Against Chinese Hacker Network and Unveils Indictments

1 Million Third-Party Android Devices Expose Hidden Backdoor for Scammers

Research teams from various cybersecurity firms have uncovered that a recent campaign appears to originate from a loosely organized network of fraud groups instead of a single perpetrator. Each participating group operates its own variations of the Badbox 2.0 backdoor and associated malware modules, distributing these threats through diverse methods.…

Read More1 Million Third-Party Android Devices Expose Hidden Backdoor for Scammers

North Korea Manipulates GitHub through Deceptive Profiles and Insider Threats

North Korea continues to be a formidable force in the realm of cybercrime, particularly targeting financial institutions and cryptocurrency platforms to sustain its military efforts, including nuclear and missile development programs. Recent analysis by security specialists from Nisos has uncovered a new tactic employed by North Korean hackers: using social…

Read MoreNorth Korea Manipulates GitHub through Deceptive Profiles and Insider Threats

Broadcom Addresses Actively Exploited Zero-Day Vulnerabilities in VMware ESXi

Cloud Security, Next-Generation Technologies & Secure Development, Security Operations Vulnerabilities Facilitate Potential Hypervisor Escapes Mathew J. Schwartz (euroinfosec) • March 5, 2025 Active attacks are exploiting multiple VMware zero-day vulnerabilities that could allow cybercriminals to escape hypervisors, threatening all virtual machines in the ecosystem. (Image: Shutterstock) Broadcom has issued urgent…

Read MoreBroadcom Addresses Actively Exploited Zero-Day Vulnerabilities in VMware ESXi

Bangkok Post – Notorious Cybercriminal Responsible for Global Data Breaches Captured

International Cooperation Leads to Arrest of Notorious Hacker Behind Major Cyber Breaches In a significant breakthrough in the realm of cybersecurity, law enforcement authorities have apprehended a hacker believed to be responsible for over 90 data breaches and the theft of approximately 13 terabytes of sensitive information. The 39-year-old individual,…

Read MoreBangkok Post – Notorious Cybercriminal Responsible for Global Data Breaches Captured

DDoS Assault Targeting Beeline Russia

Beeline, one of Russia’s foremost telecommunications companies, has recently reported a severe cyberattack, suspected to be a Distributed Denial of Service (DDoS) attack. The primary aim of the attack was to overwhelm Beeline’s IT systems, although core services that customers utilize were largely unaffected. However, the incident rendered account management…

Read MoreDDoS Assault Targeting Beeline Russia