The Breach News

Mac Malware Alert: Cybercriminals Target Cryptocurrency Users

Fraud Management & Cybercrime, Malware as-a-Service Lazarus Group Enhances Cross-Platform Malware Efforts Targeting macOS Users Mathew J. Schwartz (euroinfosec) • October 31, 2024 Image: Shutterstock Recent developments indicate that hackers pursuing cryptocurrency are increasingly targeting macOS users. A report by Trellix, a vendor specializing in endpoint detection and response, highlighted…

Read MoreMac Malware Alert: Cybercriminals Target Cryptocurrency Users

BreachForums Makes a Comeback Weeks After FBI Takeover – Strategic Trap or Misstep?

The notorious online criminal marketplace, BreachForums, has made a swift comeback just two weeks following a major coordinated law enforcement operation spearheaded by the United States that dismantled its infrastructure and seized its assets. This resurgence has raised significant alarm among cybersecurity experts and organizations alike. Cybersecurity analysts and dark…

Read MoreBreachForums Makes a Comeback Weeks After FBI Takeover – Strategic Trap or Misstep?

IFF’s Cybersecurity Report for Q3 2024

Recent Surge in Cybersecurity Incidents Raises Alarms in India In recent months, a worrying series of cybersecurity incidents has highlighted vulnerabilities affecting millions of users in India. Among the most severe breaches are those involving Bharat Sanchar Nigam Limited (BSNL) and Star Health and Allied Insurance Co. Ltd., both of…

Read MoreIFF’s Cybersecurity Report for Q3 2024

RedTail Crypto-Mining Malware Targets Vulnerability in Palo Alto Networks Firewall

RedTail Malware Targets Palo Alto Networks Firewalls in Latest Cyber Attack Recently, cybersecurity analysts have identified an alarming development involving the RedTail cryptocurrency mining malware, which has integrated a newly disclosed vulnerability affecting Palo Alto Networks firewalls into its repertoire of exploits. This vulnerability, cataloged as CVE-2024-3400, has received a…

Read MoreRedTail Crypto-Mining Malware Targets Vulnerability in Palo Alto Networks Firewall

Inside Sophos’ Five-Year Battle Against Chinese Hackers Targeting Its Devices

In a revealing report, UK cybersecurity firm Sophos has highlighted a prolonged and intricate battle with a group of hackers based in Chengdu, China. This confrontation, which has persisted for over five years, underscores a troubling reality in the cybersecurity landscape: devices that are designed to shield organizations from cyber…

Read MoreInside Sophos’ Five-Year Battle Against Chinese Hackers Targeting Its Devices

New Study Highlights Insider Risks Linked to Poor Offboarding Practices

The Importance of Effective Offboarding Practices in Mitigating Insider Risks A recent analysis by Wing Security has revealed a concerning trend in corporate data security: approximately 63% of businesses might have former employees still authorized to access sensitive organizational data. This statistic underscores the pressing need for businesses to automate…

Read MoreNew Study Highlights Insider Risks Linked to Poor Offboarding Practices

Partners Must Embrace a Breach-Aware Mindset: Insights from Illumio – ARN

Illumio Advocates for Zero Trust Approach Amid Rising Cybersecurity Threats In the evolving landscape of cybersecurity, Illumio, a leading vendor specializing in zero trust segmentation, emphasizes the necessity of adopting an “assumed breach” mindset. This approach posits that organizations should act as if a breach has already occurred, regardless of…

Read MorePartners Must Embrace a Breach-Aware Mindset: Insights from Illumio – ARN

FlyingYeti Leverages WinRAR Vulnerability to Deploy COOKBOX Malware in Ukraine

Cloudflare Disrupts Phishing Campaign Targeting Ukrainian Entities On Thursday, Cloudflare announced that it has taken measures to disrupt an extensive phishing campaign that has been ongoing for a month. This operation is attributed to a Russia-aligned threat actor known as FlyingYeti, which has specifically targeted Ukraine amidst ongoing tensions in…

Read MoreFlyingYeti Leverages WinRAR Vulnerability to Deploy COOKBOX Malware in Ukraine