The Breach News

Combating Financial Fraud with Adversarial AI Protections

Artificial Intelligence & Machine Learning, Fraud Management & Cybercrime, Fraud Risk Management Evaluating the Pros and Cons of Generative Adversarial Networks Suparna Goswami (gsuparna), Rashmi Ramesh (rashmiramesh_) • March 20, 2025 Generative adversarial networks are enhancing the detection of fraud and improving facial recognition within financial institutions. (Image: Shutterstock) Recent…

Read MoreCombating Financial Fraud with Adversarial AI Protections

White House Transfers Cyber Risk Responsibilities to State and Local Agencies

Cybersecurity Spending, Government, Industry Specific Executive Order Transfers Cybersecurity Responsibilities to States, Raising Security Concerns Chris Riotta (@chrisriotta) • March 20, 2025 Experts indicate that states are increasingly vulnerable to cyber threats as federal support diminishes. (Image: Shutterstock) In a significant policy shift, the White House has announced a transition…

Read MoreWhite House Transfers Cyber Risk Responsibilities to State and Local Agencies

Insights from a Security Researcher on the HIPAA Security Rule – DataBreaches.net

New Insights on HIPAA Security Rule from Security Researcher In a recent development concerning healthcare cybersecurity, a security researcher has provided critical insights into compliance with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. This exploration into HIPAA’s implications highlights ongoing vulnerabilities within the healthcare sector and raises…

Read MoreInsights from a Security Researcher on the HIPAA Security Rule – DataBreaches.net

Navigating Compliance Risks and Unseen Liabilities for CISOs

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development, Standards, Regulations & Compliance Expert Insights from Jonathan Armstrong on AI Security and Legal Challenges Surrounding the EU AI Act Anna Delaney (annamadeline) • March 20, 2025 Jonathan Armstrong, Partner, Punter Southall Law The landscape of artificial intelligence regulation is…

Read MoreNavigating Compliance Risks and Unseen Liabilities for CISOs

Affordable Drone Accessories from China Enable Anyone with a Credit Card to Transform Toys into Weapons of War

In December, reports emerged highlighting the innovative capabilities of the Ukrainian military, particularly regarding the deployment of long-range tethered drones for operational use. According to the Kyiv Post, approximately 40 percent of these drones’ components are sourced domestically within Ukraine, though the remainder is imported due to the constraints of…

Read MoreAffordable Drone Accessories from China Enable Anyone with a Credit Card to Transform Toys into Weapons of War

Akira Ransomware Encryption Compromised via Cloud Computing

Ransomware has emerged as one of the most dreaded threats in the realm of cybersecurity. Cybercriminals are increasingly employing advanced technologies, including artificial intelligence, to carry out attacks that are both highly effective and remarkably sophisticated. As a result of these escalating threat levels, many victims find themselves faced with…

Read MoreAkira Ransomware Encryption Compromised via Cloud Computing

Hackers Take Advantage of Unresolved ChatGPT Vulnerability

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Over 10,000 Exploit Attempts Documented Within a Week from One Malicious IP Rashmi Ramesh (rashmiramesh_) • March 19, 2025 Image: Shutterstock Recent security research has unveiled that hackers are leveraging a vulnerability in ChatGPT’s infrastructure, leading to the redirection of…

Read MoreHackers Take Advantage of Unresolved ChatGPT Vulnerability