The Breach News

Cuba Ransomware Demands Over $60 Million from More than 100 Victims

The Cuba ransomware group, also referred to as COLDDRAW, has reportedly amassed over $60 million in ransom payments while compromising more than 100 organizations globally, as of August 2022. This surge in activity prompted the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) to…

Read MoreCuba Ransomware Demands Over $60 Million from More than 100 Victims

Coinbase Targeted in GitHub Actions Supply Chain Attack; Secrets Exposed from 218 Repositories’ CI/CD Pipelines

Supply Chain Attack Targets GitHub Action, Compromising Sensitive Data A recent supply chain attack has raised significant cybersecurity concerns, particularly for businesses relying on open-source projects. This incident originated from the GitHub Action “tj-actions/changed-files,” which was initially directed at one of Coinbase’s open-source initiatives but subsequently expanded in scale. According…

Read MoreCoinbase Targeted in GitHub Actions Supply Chain Attack; Secrets Exposed from 218 Repositories’ CI/CD Pipelines

Russian Courts Under Threat from CryWiper Data Wiper Malware Disguised as Ransomware

A new variant of data-wiping malware, identified as CryWiper, has emerged and is specifically targeting Russian government institutions, such as mayoral offices and courthouses. Unlike traditional ransomware that encrypts data, CryWiper masquerades as ransomware but ultimately destroys data without providing any means of recovery. Kaspersky researchers Fedor Sinitsyn and Janis…

Read MoreRussian Courts Under Threat from CryWiper Data Wiper Malware Disguised as Ransomware

Next Phase of Zero Trust: Emphasizing Agility, Identity, and AI Risks

Artificial Intelligence & Machine Learning, Governance & Risk Management, Identity & Access Management Why CISOs Must Rethink Access, Behavioral Analytics and AI Governance at Scale Joe Cozzupoli • September 9, 2025 Image: Shutterstock Zero trust has evolved from a mere buzzword into a fundamental component of contemporary security frameworks. The…

Read MoreNext Phase of Zero Trust: Emphasizing Agility, Identity, and AI Risks

New Malware Campaign Leverages Cracked Software to Distribute Lumma and ACR Stealer

Cybersecurity experts are sounding alarms about a recent campaign utilizing cracked software versions to spread information-stealing malware, including notable variants such as Lumma and ACR Stealer. The AhnLab Security Intelligence Center (ASEC) has reported a significant increase in ACR Stealer distributions since January 2025. This malware employs a technique known…

Read MoreNew Malware Campaign Leverages Cracked Software to Distribute Lumma and ACR Stealer

Risks in Data Center Financing: Development Delays and SLA Violations – Data Center Dynamics

Risks in Data Center Lending: Development Delays and SLA Breaches Recent reports highlight increasing concerns surrounding data center lending, revealing significant risks associated with development delays and breaches of Service Level Agreements (SLAs). These challenges are gaining attention as they threaten not only the financial integrity of data center operations…

Read MoreRisks in Data Center Financing: Development Delays and SLA Violations – Data Center Dynamics