The Breach News

Stay Vigilant: The Top 3 MS Office Exploits Hackers Will Use in 2025

Cybercriminals continue to exploit Microsoft Word and Excel documents as conduits for malware delivery as we advance through 2025. These methods remain effective, leveraging phishing tactics and zero-click exploits to infiltrate targets with relative ease, particularly in corporate settings where Office documents are routinely shared. This year, there are three…

Read MoreStay Vigilant: The Top 3 MS Office Exploits Hackers Will Use in 2025

Debunking the Myth: Why SMBs Are Not “Too Small to Be a Target” for Cyber Attacks

The topics include Artificial Intelligence & Machine Learning, Fraud Management & Cybercrime, and Governance & Risk Management. Also: AI Pilot Project Purgatory, Agentic AI Commerce Fraud Concerns Anna Delaney (annamadeline) • September 12, 2025 Clockwise, from top left: Anna Delaney, Tom Field, Rashmi Ramesh, and Suparna Goswami In the latest…

Read MoreDebunking the Myth: Why SMBs Are Not “Too Small to Be a Target” for Cyber Attacks

22-Year-Old Utah Man Identified as Suspect in Shooting Involving Charlie Kirk

Manhunt Concludes with Arrest in Shooting Incident at Utah Valley University Authorities have successfully apprehended a suspect in the fatal shooting of conservative activist Charlie Kirk, bringing an end to a two-day manhunt. The incident, which occurred on Wednesday during a campus event at Utah Valley University, left the 31-year-old…

Read More22-Year-Old Utah Man Identified as Suspect in Shooting Involving Charlie Kirk

Hackers Leverage AWS Misconfigurations to Execute Phishing Attacks Using SES and WorkMail

Amazon Web Services Targeted in Phishing Campaigns by Threat Group TGR-UNK-0011 Recent investigations by Palo Alto Networks’ Unit 42 have unveiled alarming activities targeting Amazon Web Services (AWS). The threat group known as TGR-UNK-0011, which has been active since 2019, is leveraging misconfigurations within AWS environments to execute sophisticated phishing…

Read MoreHackers Leverage AWS Misconfigurations to Execute Phishing Attacks Using SES and WorkMail

Mobile App Security: A Major Blind Spot for Developers—93% Trust Their Apps’ Safety, Yet 62% Experienced Breaches Last Year

Overconfidence in Mobile App Security Poses Risks for Organizations Recent research reveals a troubling trend among organizations regarding their mobile application security practices. Despite a high level of confidence reported by 93% of respondents about their security capabilities, a significant 62% experienced breaches over the past year, averaging nine incidents…

Read MoreMobile App Security: A Major Blind Spot for Developers—93% Trust Their Apps’ Safety, Yet 62% Experienced Breaches Last Year

RESURGE Malware Leverages Ivanti Vulnerability with Rootkit and Web Shell Capabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently unveiled a critical malware strain identified as RESURGE, which has been utilized to exploit a security vulnerability in Ivanti Connect Secure appliances. This vulnerability, designated as CVE-2025-0282, involves a stack-based buffer overflow that could permit remote code execution in affected systems.…

Read MoreRESURGE Malware Leverages Ivanti Vulnerability with Rootkit and Web Shell Capabilities

The FBI’s View on Ransomware Threats

Examining Ransomware: Current Threats, Prevention Strategies, and FBI Support In April 2021, a significant food supply disruption occurred in the Netherlands, linked not to agricultural issues but to a ransomware attack. This incident underscores how ransomware has escalated into one of the internet’s most pressing security concerns, affecting entities like…

Read MoreThe FBI’s View on Ransomware Threats

F5 Aims to Combat AI Model Misuse with Planned Acquisition of CalypsoAI

Agentic AI, Artificial Intelligence & Machine Learning, Cloud Security Calypso’s Red-Teaming and Agentic Threat Tools Enhance F5’s Application Security Strategy Michael Novinson (MichaelNovinson) • September 11, 2025 Shawn Wormke, Senior Vice President of Product Management, F5 (Image: F5) F5 Networks, an established provider of application and API security, announced plans…

Read MoreF5 Aims to Combat AI Model Misuse with Planned Acquisition of CalypsoAI