The Breach News

Vulnerability Allowing Access to Any Indian DigiLocker Account Without a Password

Indian Government Addresses Security Flaw in Digilocker Service The Indian Government has confirmed the resolution of a significant vulnerability within its secure document wallet service, Digilocker. This flaw potentially allowed unauthorized remote access, enabling attackers to bypass mobile one-time passwords (OTPs) and gain unauthorized sign-in access to other users’ accounts.…

Read MoreVulnerability Allowing Access to Any Indian DigiLocker Account Without a Password

OT Vulnerabilities on the Rise, Yet Patching Remains Challenging

Governance & Risk Management, Operational Technology (OT) Trellix Warns of Rising Threats to PLCs from Cyber Attackers Greg Sirico • November 18, 2025 Image: Shutterstock Cybersecurity firm Trellix has issued a stark warning regarding the increasing vulnerability of programmable logic controllers (PLCs) within operational technology environments. Their report highlights a…

Read MoreOT Vulnerabilities on the Rise, Yet Patching Remains Challenging

Discovery Practice Management Resolves Lawsuit Related to 2020 Data Breach – The HIPAA Journal

Discovery Practice Management Settles Lawsuit Over 2020 Data Breach In a significant development for the cybersecurity landscape, Discovery Practice Management has reached a settlement regarding a data breach that occurred in 2020. This incident has raised concerns among business owners about the vulnerabilities inherent in the handling of sensitive patient…

Read MoreDiscovery Practice Management Resolves Lawsuit Related to 2020 Data Breach – The HIPAA Journal

Popular PuTTY SSH Client Exposed to Key Recovery Vulnerability

The developers of the PuTTY Secure Shell (SSH) and Telnet client have issued a warning about a critical vulnerability affecting versions 0.68 through 0.80. This flaw poses a significant risk, allowing attackers to potentially recover NIST P-521 (ecdsa-sha2-nistp521) private keys, compromising the security of authenticated sessions. Identified as CVE-2024-31497, the…

Read MorePopular PuTTY SSH Client Exposed to Key Recovery Vulnerability

22-Year-Old Arrested for Hacking Water System and Putting Lives at Risk

A 22-year-old resident of Ellsworth County, Kansas, faces serious allegations after being indicted for unauthorized access to a public water facility’s computer system. This breach potentially endangered the safety and well-being of the community’s residents. The individual, identified as Wyatt A. Travnichek, has been charged with tampering with the public…

Read More22-Year-Old Arrested for Hacking Water System and Putting Lives at Risk

Microsoft Azure Defends Against 15.72 Tbps Aisuru Botnet DDoS Attack

On October 24, 2025, Microsoft Azure experienced an unprecedented Distributed-Denial-of-Service (DDoS) attack, marking the highest recorded assault on cloud infrastructure to date. This significant cyber event peaked at 15.72 Terabits per second (Tbps) and 3.64 billion packets per second (pps), specifically targeting a single endpoint located in Australia. In a…

Read MoreMicrosoft Azure Defends Against 15.72 Tbps Aisuru Botnet DDoS Attack

Inspector General Highlights Security Vulnerability in NIH Genomics Initiative

Access Management, Data Privacy, Data Security NIH Working on Fixes to Address National Security Risks and Weak Access Controls Marianne Kolbasuk McGee (HealthInfoSec) • November 17, 2025 A federal watchdog agency identified security vulnerabilities that could permit unauthorized access to genomics data collected under the NIH’s All of Us research…

Read MoreInspector General Highlights Security Vulnerability in NIH Genomics Initiative

A Remarkable Turnaround: A Company Apologizes Following a Cyber Attack

In a recent incident, Checkout.com, a payment processing service, faced a data breach attributed to the hacking group known as ShinyHunters, which exploited vulnerabilities in a legacy third-party cloud storage system. This breach reportedly affected less than 25% of the company’s current merchant base, as stated by Mariano Albera, the…

Read MoreA Remarkable Turnaround: A Company Apologizes Following a Cyber Attack

Potential Credential Leaks in Build Logs from AWS, Google, and Azure CLI Tools

Recent cybersecurity research has unveiled a critical vulnerability in command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud, risking the exposure of sensitive credentials within build logs. Titled LeakyCLI by the cloud security firm Orca, this vulnerability draws attention to how certain commands can inadvertently disclose sensitive…

Read MorePotential Credential Leaks in Build Logs from AWS, Google, and Azure CLI Tools