The Breach News

Searchlight Cyber Acquires Intangic to Enhance Cyber Risk Quantification

Cyber Insurance, Governance & Risk Management, Risk Assessments Searchlight Cyber Acquires European Startup to Enhance Cyber Risk Insights Michael Novinson (@MichaelNovinson) • October 31, 2025 Ben Jones, co-founder and CEO, Searchlight Cyber (Image: Searchlight Cyber) Searchlight Cyber has announced the acquisition of Intangic, a European startup focused on cyber risk…

Read MoreSearchlight Cyber Acquires Intangic to Enhance Cyber Risk Quantification

Researchers Discover OS Downgrade Vulnerability Affecting Microsoft Windows Kernel

New Vulnerability Risks Driver Signature Enforcement on Windows Systems A recently uncovered attack method exposes vulnerabilities in Microsoft’s Driver Signature Enforcement (DSE) on fully updated Windows systems, enabling potential OS downgrade attacks. This breakthrough allows cybercriminals to load unsigned kernel drivers, paving the way for the deployment of custom rootkits.…

Read MoreResearchers Discover OS Downgrade Vulnerability Affecting Microsoft Windows Kernel

Accenture Targeted by LockBit Ransomware; Hackers Warn of Data Leak

The prominent global IT consultancy firm Accenture has recently fallen victim to a ransomware attack attributed to the LockBit group. This incident marks yet another significant breach in a landscape already troubled by high-profile cybercrimes, particularly as the cybercriminal marketplace continues to adjust following the takedown of similar influential groups…

Read MoreAccenture Targeted by LockBit Ransomware; Hackers Warn of Data Leak

Telstra Telecom Experiences Data Breach, Risking Employee Information Exposure

Data Breach Report: Telstra Targeted Following Optus Incident Australia’s largest telecommunications provider, Telstra, has reported a data breach linked to a third-party platform, just under two weeks after a similar incident affected rival company Optus. This breach has raised significant concerns regarding the security of employee data, although company officials…

Read MoreTelstra Telecom Experiences Data Breach, Risking Employee Information Exposure

Court Approves Settlement for HCA Data Breach Class Action

Healthcare, Industry Specific, Litigation HCA Healthcare Reaches Multimillion-Dollar Settlement Following 2023 Data Breach Marianne Kolbasuk McGee (HealthInfoSec) • October 31, 2025 HCA Healthcare has agreed to settle a class action lawsuit stemming from a 2023 email breach impacting approximately 11.3 million patients. (Image: HCA) This week, a federal court in…

Read MoreCourt Approves Settlement for HCA Data Breach Class Action

The Airstalk Intrusion: A Covert Malware Targeting Corporate Supply Chains

The cybersecurity landscape is shaken by the emergence of a newly identified malware dubbed Airstalk, which researchers attribute to a suspected nation-state threat group. This malware employs enterprise management tools in unconventional ways, highlighting vulnerabilities in third-party ecosystems, particularly those supporting the global outsourcing sector. Its stealth and sophistication signal…

Read MoreThe Airstalk Intrusion: A Covert Malware Targeting Corporate Supply Chains

New Study Shows Spectre Vulnerability Continues to Affect Recent AMD and Intel Processors

In a concerning development nearly six years after the initial discovery of the Spectre vulnerability affecting modern CPU architectures, recent research indicates that both AMD and Intel’s latest processors remain at risk of speculative execution attacks. This revelation emerges from a study conducted by researchers at ETH Zürich, highlighting vulnerabilities…

Read MoreNew Study Shows Spectre Vulnerability Continues to Affect Recent AMD and Intel Processors

Hackers Utilize Morse Code in Phishing Attacks to Bypass Detection

Microsoft has reported a sophisticated year-long phishing campaign characterized by a remarkable ability to evade detection. The attackers exhibited a pattern of altering their obfuscation and encryption strategies approximately every 37 days, employing various techniques, including Morse code, to obscure their activities while extracting user credentials. The phishing attempts typically…

Read MoreHackers Utilize Morse Code in Phishing Attacks to Bypass Detection