The Breach News

Cisco Probes Data Breach Following Sale Announcement on BreachForums

A prominent data leaker has claimed to have successfully infiltrated Cisco, a leading networking technology firm, and exfiltrated sensitive company data. This discovery has prompted Cisco to initiate an investigation into the incident. Earlier this week, a cybercriminal operating under the alias IntelBroker took to BreachForums, a well-known hacking marketplace,…

Read MoreCisco Probes Data Breach Following Sale Announcement on BreachForums

CISA Issues Warning About Exploitable Vulnerabilities in Widely Used BIND 9 DNS Software

The Internet Systems Consortium (ISC) has issued critical patches addressing a series of security vulnerabilities in its Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite. These vulnerabilities pose a significant risk as they could be exploited by cyber threat actors to initiate denial-of-service (DoS) scenarios. According…

Read MoreCISA Issues Warning About Exploitable Vulnerabilities in Widely Used BIND 9 DNS Software

State-Sponsored Hackers Leverage Two Cisco Zero-Day Vulnerabilities for Espionage Activities

A recent malware campaign has targeted Cisco networking equipment, exploiting two previously unknown vulnerabilities identified as zero-day flaws to deliver customized malware and conduct covert data collection in targeted environments. Cisco Talos, naming this operation “ArcaneDoor,” has attributed the attacks to UAT4356, an advanced state-sponsored group also known as Storm-1849…

Read MoreState-Sponsored Hackers Leverage Two Cisco Zero-Day Vulnerabilities for Espionage Activities

What Appeared to Be an AI Crime-Fighting Super Tool Raised Concerns from Defense Attorneys

In a notable case from 2017, nine-year-old Kayla Unbehaun was abducted from South Elgin, Illinois. The investigation, initially led by local law enforcement, sought to locate both Kayla and her mother, Heather Unbehaun, who was named as the primary suspect. Over several years, authorities traced the pair’s whereabouts to various…

Read MoreWhat Appeared to Be an AI Crime-Fighting Super Tool Raised Concerns from Defense Attorneys

AI Company’s Misconfigured Server Leaks 5.3 TB of Mental Health Data

5.3 TB of Sensitive Mental Health Records Exposed in Data Breach of Confidant Health In a significant cybersecurity incident, a misconfigured server managed by Confidant Health, an AI-driven healthcare firm based in the United States, has compromised an alarming 5.3 terabytes of confidential mental health data. This breach includes sensitive…

Read MoreAI Company’s Misconfigured Server Leaks 5.3 TB of Mental Health Data

Urgent Alert: Active Exploitation of Three Critical Vulnerabilities in Ivanti CSA

Ivanti Identifies Active Exploitation of New Vulnerabilities in Cloud Service Appliance Ivanti has issued an alert regarding three newly discovered security vulnerabilities in its Cloud Service Appliance (CSA), which are currently being actively exploited by attackers. These vulnerabilities add to the growing concerns over the security of this essential service,…

Read MoreUrgent Alert: Active Exploitation of Three Critical Vulnerabilities in Ivanti CSA

Legal Services Firm Requests Government Investigation into Star Health Data Breach, ET CISO

On October 15, 2024, the Software Freedom Law Centre India (SFLCI), a legal services organization based in New Delhi, formally requested the Indian Computer Emergency Response Team (CERT-In) to investigate a significant cybersecurity incident. This incident concerns a severe data breach affecting Star Health and Allied Insurance, one of the…

Read MoreLegal Services Firm Requests Government Investigation into Star Health Data Breach, ET CISO

Serious Docker Engine Vulnerability Enables Attackers to Circumvent Authorization Plugins

Docker Warns of Critical Flaw in Docker Engine Docker has issued an urgent alert regarding a significant vulnerability affecting various versions of the Docker Engine. This flaw could allow attackers to bypass authorization plugins (AuthZ) under certain conditions, posing a serious security risk for users. Labeled as CVE-2024-41110, this bypass…

Read MoreSerious Docker Engine Vulnerability Enables Attackers to Circumvent Authorization Plugins