The Breach News

Teraleak: Game Freak, Pokémon Developer, Hacked in Major Data Breach

Massive Data Breach at Game Freak Exposes Pokémon Secrets Game Freak, the acclaimed developer of the Pokémon franchise, has suffered a significant data breach, now dubbed the “Teraleak.” This incident has purportedly revealed nearly 1 terabyte of sensitive data, including source code, unreleased projects, concept art, and canceled games. The…

Read MoreTeraleak: Game Freak, Pokémon Developer, Hacked in Major Data Breach

Star Health Under Regulatory Investigation for Alleged Data Breach, Experts Caution About Potential Legal Consequences, ET LegalWorld

Data Breach at Star Health Sparks Regulatory and Legal Concerns On October 11, The Exchange sought clarification from Star Health and Allied Insurance Company Limited regarding a troubling news item detailing an alleged data breach. Reports indicate that a senior executive at the company improperly sold the personal data of…

Read MoreStar Health Under Regulatory Investigation for Alleged Data Breach, Experts Caution About Potential Legal Consequences, ET LegalWorld

Serious Vulnerability in Rockwell Automation Devices Enables Unauthorized Access

A serious security vulnerability has been identified in Rockwell Automation’s ControlLogix 1756 devices. This flaw poses the risk of allowing attackers to bypass crucial security measures, thereby executing programming and configuration commands for common industrial protocols, known as CIP (Common Industrial Protocol). Named CVE-2024-6242, this vulnerability has been assigned a…

Read MoreSerious Vulnerability in Rockwell Automation Devices Enables Unauthorized Access

Getting Started with CTEM: A Beginner’s Guide When You’re Uncertain

Understanding Continuous Threat Exposure Management (CTEM): A Comprehensive Overview Continuous Threat Exposure Management (CTEM) provides a strategic framework designed to help organizations continually evaluate and manage cyber risks. This approach deconstructs the intricate process of addressing security threats into five clear stages: Scoping, Discovery, Prioritization, Validation, and Mobilization. Each stage…

Read MoreGetting Started with CTEM: A Beginner’s Guide When You’re Uncertain

Weekly Cybersecurity Newsletter: Data Breaches, Vulnerabilities, Cyber Attacks, and More

In this week’s cybersecurity newsletter, we bring you a comprehensive overview of the current threats facing organizations globally, focusing on the latest cybersecurity incidents and the mitigation strategies that business owners should be aware of. The digital landscape is continually evolving, and understanding these threats is crucial to safeguarding sensitive…

Read MoreWeekly Cybersecurity Newsletter: Data Breaches, Vulnerabilities, Cyber Attacks, and More

Researchers Reveal Vulnerabilities in Windows Smart App Control and SmartScreen

Microsoft’s Smart App Control and SmartScreen Found Vulnerable to Exploitation Recently, cybersecurity researchers have identified critical vulnerabilities within Microsoft’s Windows Smart App Control (SAC) and SmartScreen features, which may grant threat actors an opportunity for initial access to targeted systems without triggering security alerts. This discovery raises concerns about the…

Read MoreResearchers Reveal Vulnerabilities in Windows Smart App Control and SmartScreen

Malicious Python Package Conceals Sliver C2 Framework Within Counterfeit Requests Library Logo

Malicious Python Package Discovered Concealing Golang Command-and-Control Framework Cybersecurity researchers have unveiled a nefarious Python package masquerading as an extension of the widely-used requests library. This malicious package, named requests-darwin-lite, has been found to hide a Golang variant of the Sliver command-and-control (C2) framework within an image file of the…

Read MoreMalicious Python Package Conceals Sliver C2 Framework Within Counterfeit Requests Library Logo

The 2024 Browser Security Report Reveals the Hidden Dangers of Every Web Session

As the browser becomes the dominant workspace in enterprises, it is increasingly exploited by cybercriminals as a key attack vector. Various threats ranging from account takeovers and phishing attacks to malicious browser extensions highlight the browser’s role in compromising sensitive data and breaching organizational systems. Security professionals tasked with developing…

Read MoreThe 2024 Browser Security Report Reveals the Hidden Dangers of Every Web Session