The Breach News

Introducing ZachXBT: The Masked Avenger Uncovering Billions in Cryptocurrency Scams and Thefts

Crypto Vigilante ZachXBT: Exposing Scams While Remaining Incognito ZachXBT, operating as an anonymous crypto investigator, has become a formidable figure in the fight against cryptocurrency-related scams and fraud. Utilizing a cartoonish platypus avatar dressed in a detective’s coat, ZachXBT has successfully maintained his anonymity to protect himself from the repercussions…

Read MoreIntroducing ZachXBT: The Masked Avenger Uncovering Billions in Cryptocurrency Scams and Thefts

2024 Analysis: Insider Threats Revealed

Rising Insider Threats: A 2024 Landscape of Cyber Risks In the ever-evolving world of cybersecurity, a significant concern has emerged: the escalation in insider threats. A recent survey involving 413 IT and cybersecurity professionals has shed light on alarming trends and challenges associated with these threats—alongside the critical best practices…

Read More2024 Analysis: Insider Threats Revealed

Misconfigured UN Database Leaks 228GB of Data on Victims of Gender Violence

A significant data breach has been uncovered, revealing over 115,000 sensitive documents linked to the UN Trust Fund to End Violence against Women. This compromise exposes personal data, financial records, and testimonies from victims, raising substantial privacy and security concerns. Cybersecurity investigator Jeremiah Fowler identified a misconfigured, unsecured database related…

Read MoreMisconfigured UN Database Leaks 228GB of Data on Victims of Gender Violence

Greenwich University Experiences Second Data Breach This Year, Allegedly Linked to Former Student’s ‘Revenge Hack’

The University of Greenwich has reported its second data breach of the year, stemming from an incident involving the unauthorized release of sensitive information by a disgruntled former student. This situation raises serious concerns about data security practices within academic institutions, particularly regarding how personal and confidential information is managed.…

Read MoreGreenwich University Experiences Second Data Breach This Year, Allegedly Linked to Former Student’s ‘Revenge Hack’

Cybercriminals Launch Over 100,000 Malicious Android Apps to Capture OTP Codes

A recent investigation has uncovered a significant malicious campaign leveraging harmful Android applications to pilfer users’ SMS messages, with activity dating back to at least February 2022. This large-scale operation purportedly involves over 107,000 unique malicious app samples aimed at intercepting one-time passwords (OTPs) that are essential for online account…

Read MoreCybercriminals Launch Over 100,000 Malicious Android Apps to Capture OTP Codes

The Concealed Dangers of Legacy MFA

In today’s rapidly evolving cybersecurity landscape, organizations are often confronted by threats that were previously underestimated or overlooked. A recent advisory issued by the Department of Homeland Security (DHS), in partnership with the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI, illustrates the urgency for organizations to adopt advanced…

Read MoreThe Concealed Dangers of Legacy MFA

Over 110,000 Websites Compromised in Polyfill Supply Chain Attack

Polyfill.io Supply Chain Attack Compromises Over 110,000 Websites In a concerning development for e-commerce and web developers, Google has responded to a supply chain attack targeting the widely used Polyfill.io service. The attack follows the acquisition of the domain by a Chinese company, which has modified the JavaScript library "polyfill.js"…

Read MoreOver 110,000 Websites Compromised in Polyfill Supply Chain Attack

Zero-Day Alert: Update Chrome Immediately to Address Newly Exploited Vulnerability

Google Issues Urgent Update to Fix Active Zero-Day Vulnerability in Chrome On January 16, 2024, Google unveiled critical updates aimed at addressing four significant security vulnerabilities within its Chrome browser, notably including an active zero-day flaw. This vulnerability, designated as CVE-2024-0519, pertains to an out-of-bounds memory access within the V8…

Read MoreZero-Day Alert: Update Chrome Immediately to Address Newly Exploited Vulnerability

Phone Location Tracking: Why It’s Out of Control and How You Can Take Action

Title: Analyzing App Location Permissions Amid Privacy Concerns In a growing focus on privacy, both Android and iOS platforms offer users insight into app permissions related to location data. Users are now able to manage their choices regarding whether an application can access their location consistently, only when in use,…

Read MorePhone Location Tracking: Why It’s Out of Control and How You Can Take Action