The Breach News

Arid Viper Targets Arabic Android Users with Spyware Masquerading as a Dating App

The cyber threat group known as Arid Viper, also referred to as APT-C-23 or Desert Falcon, has emerged as the perpetrator behind a recent Android spyware campaign aimed at Arabic-speaking individuals. This sophisticated operation involves the distribution of a fake dating application that is designed to infiltrate users’ devices, extracting…

Read MoreArid Viper Targets Arabic Android Users with Spyware Masquerading as a Dating App

New Xiū gǒu Phishing Kit Targets Key Sectors in the UK, US, Japan, and Australia

Cybersecurity experts at Netcraft have identified a sophisticated phishing kit named “Xiū gǒu,” which has been active since September 2024 and is specifically targeting users in multiple countries, including the UK, US, Spain, Australia, and Japan. This malicious toolkit exploits a range of public and private sector services, such as…

Read MoreNew Xiū gǒu Phishing Kit Targets Key Sectors in the UK, US, Japan, and Australia

Sophos Reveals Five Years of Ongoing Chinese Cyberattacks

Volt Typhoon, APT31, APT41 Target Sophos Firewall Devices: A Wake-Up Call for Cybersecurity In a significant disclosure, firewall manufacturer Sophos reported a sustained five-year assault by various Chinese state-sponsored hacking groups on its security appliances. The revelation, described by Sophos as a crucial wake-up call for the cybersecurity sector, highlights…

Read MoreSophos Reveals Five Years of Ongoing Chinese Cyberattacks

U.S. Takes Down the World’s Largest 911 S5 Botnet, Involving 19 Million Infected Devices

The United States Department of Justice (DoJ) announced on Wednesday the dismantling of what it claims to be “likely the world’s largest botnet,” which was composed of approximately 19 million compromised devices. These infected machines were made available to various malicious actors for a variety of cybercrimes. This extensive botnet,…

Read MoreU.S. Takes Down the World’s Largest 911 S5 Botnet, Involving 19 Million Infected Devices

Data Breach Notification: Edelson Lechtzin LLP Investigating Potential Data Compromise for CUSO Financial Services, LP Customers – ForexTV.com

Data Breach Investigation Launched by Edelson Lechtzin LLP for CUSO Financial Services, LP Customers In a significant cybersecurity incident, Edelson Lechtzin LLP has initiated an investigation involving potential data compromise affecting customers of CUSO Financial Services, LP. This alarming development raises pressing concerns for stakeholders regarding the integrity and security…

Read More

Data Breach Notification: Edelson Lechtzin LLP Investigating Potential Data Compromise for CUSO Financial Services, LP Customers – ForexTV.com

CISA Warns Federal Agencies to Address Actively Exploited Vulnerability in Linux Kernel

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a significant Linux kernel vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, highlighting the threat of active exploitation. This flaw, designated as CVE-2024-1086, has been assigned a high CVSS score of 7.8 and pertains to a critical use-after-free issue within…

Read MoreCISA Warns Federal Agencies to Address Actively Exploited Vulnerability in Linux Kernel

Urgent: F5 Issues Warning on Ongoing Attacks Targeting BIG-IP Vulnerability

Critical Security Flaw Detected in F5 BIG-IP Systems F5 Networks has issued an urgent warning regarding significant exploitation of a recently disclosed vulnerability in its BIG-IP product line. The alert comes less than a week after the vulnerability was made public, highlighting active abuse that allows cybercriminals to execute arbitrary…

Read MoreUrgent: F5 Issues Warning on Ongoing Attacks Targeting BIG-IP Vulnerability

Presenting the Overlooked Paper that Predicted the End of Modern Cryptography

Quantum Advancements Challenge Lightweight Block Ciphers Recent research has unveiled a novel approach to cryptanalysis through the exploration of integral distinguishers, particularly targeting three lightweight block ciphers: PRESENT, GIFT64, and RECTANGLE. These block ciphers are specifically designed for constrained environments, such as embedded systems, where performance and resource efficiency are…

Read MorePresenting the Overlooked Paper that Predicted the End of Modern Cryptography