The Breach News

New U.K. Legislation Prohibits Default Passwords on Smart Devices Beginning April 2024

The U.K. National Cyber Security Centre (NCSC) is urging smart device manufacturers to align with new regulatory measures set to take effect on April 29, 2024. These regulations prohibit the use of default passwords, marking a significant shift toward enhancing cybersecurity for Internet of Things (IoT) devices. The legislation, known…

Read MoreNew U.K. Legislation Prohibits Default Passwords on Smart Devices Beginning April 2024

AI Chatbots Can Decode Invisible Text That Humans Can’t: Here’s How.

In a significant development within the realm of Unicode and character encoding, an overlooked block initially intended for country representation has come to light due to recent findings by cybersecurity researcher Riley Goodside. The plan to repurpose this block for designating country codes—using tags like “us” for the United States…

Read MoreAI Chatbots Can Decode Invisible Text That Humans Can’t: Here’s How.

Councils, Solicitors, NHS, and Police Criticized for Disclosing Personal Information of Domestic Abuse Victims

A coalition of councils, solicitors, an NHS trust, and law enforcement agencies in the UK has faced significant backlash for disclosing sensitive personal information of domestic abuse victims. The UK Information Commissioner’s Office (ICO) has issued stern warnings, indicating that these data breaches severely endanger the lives of victims, with…

Read MoreCouncils, Solicitors, NHS, and Police Criticized for Disclosing Personal Information of Domestic Abuse Victims

Cybercriminals Employ Unicode to Conceal Mongolian Skimmer in Online Retail Sites

New Cyber Threat: Mongolian Skimmer Campaign Revealed Cybersecurity experts have recently uncovered a sophisticated digital skimmer campaign utilizing Unicode obfuscation techniques to deploy a skimmer known as “Mongolian Skimmer.” Researchers from Jscrambler noted that the obfuscated nature of the script raises eyebrows due to the extensive use of accented characters,…

Read MoreCybercriminals Employ Unicode to Conceal Mongolian Skimmer in Online Retail Sites

Government Data Compromised Twice by ‘Rogue Employees’ Within Six Months — Capital Brief

In the first half of this year, Australian government agencies encountered two significant data breaches attributed to “rogue employees or insider threats.” This alarming trend coincides with a broader surge in data breaches across Australia, which have reached a three-and-a-half-year peak. These incidents raise critical concerns about the integrity and…

Read MoreGovernment Data Compromised Twice by ‘Rogue Employees’ Within Six Months — Capital Brief

Vulnerabilities in Telerik Report Server Could Enable Remote Code Execution

Critical Security Flaw in Telerik Report Server Requires Immediate Updates Progress Software has issued a strong recommendation for users to promptly update their Telerik Report Server instances due to a newly discovered critical security vulnerability that poses a significant risk of remote code execution. This flaw, designated as CVE-2024-6327, has…

Read MoreVulnerabilities in Telerik Report Server Could Enable Remote Code Execution

Android Malware Wpeeper Conceals C2 Servers within Compromised WordPress Sites

Emerging Malware Threat Targets Android Devices Using Compromised WordPress Sites Cybersecurity experts have identified a newly discovered malware strain specifically targeting Android devices, exploiting compromised WordPress sites to obscure its command-and-control (C2) communications and evade detection. This malware, referred to as Wpeeper, is characterized as an ELF binary that utilizes…

Read MoreAndroid Malware Wpeeper Conceals C2 Servers within Compromised WordPress Sites

A Shadowy Hacking Collective Unveils Two New Techniques for Extracting Data from Air-Gapped Systems

Newly Discovered Cyber Toolkit Reveals Evolving Threats to Data Security Recent research has unveiled a sophisticated toolkit designed for cyber espionage, characterized by its modular architecture and diverse functionalities developed in multiple programming languages. This toolkit aims to enhance flexibility and resilience against detection by targets, particularly when individual components…

Read MoreA Shadowy Hacking Collective Unveils Two New Techniques for Extracting Data from Air-Gapped Systems