The Breach News

NiceRAT Malware Aims at South Korean Users through Pirated Software

Recent cybersecurity incidents have spotlighted a malware strain known as NiceRAT, which is being extensively deployed by threat actors to commandeer infected devices into a botnet. This wave of attacks primarily targets users in South Korea, utilizing deceptive tactics that position the malware as cracked software, including altered versions of…

Read MoreNiceRAT Malware Aims at South Korean Users through Pirated Software

MoneyGram Reveals Customer Data Was Compromised in Security Breach

MoneyGram Confirms Data Breach Following Cyberattack MoneyGram has acknowledged that it suffered a significant loss of sensitive customer information during a recent cyberattack targeting its systems. In an official notification letter sent to affected customers and made available on the company’s website, MoneyGram disclosed that hackers were able to infiltrate…

Read MoreMoneyGram Reveals Customer Data Was Compromised in Security Breach

SolarWinds Issues Patch to Address Critical Vulnerability in Web Help Desk Software

SolarWinds has issued patches to mitigate a severe security vulnerability in its Web Help Desk software that could allow attackers to execute arbitrary code on affected systems. The vulnerability, identified as CVE-2024-28986 with a CVSS score of 9.8, is characterized as a deserialization issue. The company, in its advisory, indicated…

Read MoreSolarWinds Issues Patch to Address Critical Vulnerability in Web Help Desk Software

Hackers Use Trusted Websites to Distribute BadSpace Windows Backdoor

Compromised Websites Facilitate New Windows Backdoor Threat: BadSpace Recent developments in cybersecurity have uncovered a concerning trend where legitimate but compromised websites are being exploited to deliver a malicious Windows backdoor known as BadSpace. This operation is particularly deceptive as it is presented under the guise of fictitious browser updates,…

Read MoreHackers Use Trusted Websites to Distribute BadSpace Windows Backdoor

Microsoft Addresses Zero-Day Vulnerability Targeted by North Korea’s Lazarus Group

A newly identified security vulnerability in Microsoft Windows has been exploited by the Lazarus Group, a state-sponsored hacking collective with ties to North Korea. The flaw, designated as CVE-2024-38193, has been characterized as a privilege escalation vulnerability impacting the Windows Ancillary Function Driver (AFD.sys) used in WinSock operations. With a…

Read MoreMicrosoft Addresses Zero-Day Vulnerability Targeted by North Korea’s Lazarus Group

Chinese Cyber Espionage Targets Asian Telecom Operators Since 2021

Cyber Espionage Campaign Targets Telecom Operators in Asia Cyber espionage groups linked to China have been identified as responsible for an extensive intrusion campaign that has affected several telecommunications operators within an unnamed Asian country, with activity dating back to at least 2021. According to a report from the Symantec…

Read MoreChinese Cyber Espionage Targets Asian Telecom Operators Since 2021

Internet Service Provider Reveals Major Data Breach Exposing 237,703 Customers’ Social Security Numbers

Data Breach Exposes Personal Information of Hundreds of Thousands of Comcast Customers Comcast, one of the largest internet service providers in the United States, has confirmed a significant data breach that has compromised the personal information of over 237,000 customers. A data breach notification submitted to the Maine Attorney General’s…

Read MoreInternet Service Provider Reveals Major Data Breach Exposing 237,703 Customers’ Social Security Numbers

5 Practical Strategies to Safeguard Against GenAI Data Leaks While Maintaining AI Accessibility

Since its inception, Generative AI has significantly transformed productivity within enterprises, streamlining processes such as software development, financial analysis, business strategy formulation, and customer interaction. Nonetheless, this surge in efficiency brings substantial risks, notably regarding the possibility of sensitive data leaks. Organizations find themselves in a precarious position, striving to…

Read More5 Practical Strategies to Safeguard Against GenAI Data Leaks While Maintaining AI Accessibility