The Breach News

Severe OpenWrt Vulnerability Leaves Devices Vulnerable to Malicious Firmware Injection

A significant security vulnerability has been identified in the Attended Sysupgrade (ASU) feature of OpenWrt. If exploited, this flaw could enable the distribution of compromised firmware packages, posing a threat to users of this popular open-source Linux-based OS. The vulnerability, assigned the identifier CVE-2024-54143, has a critical CVSS score of…

Read MoreSevere OpenWrt Vulnerability Leaves Devices Vulnerable to Malicious Firmware Injection

Microsoft Cautions on Ongoing Attacks Targeting Apache Log4j Vulnerabilities

Cybersecurity experts are raising alarms over ongoing attempts by both nation-state actors and commodity attackers to exploit vulnerabilities in the Log4j open-source logging framework, a situation that poses significant risks to organizations worldwide. Microsoft has reported a surge in exploitation attempts aimed at deploying malware on susceptible systems, highlighting the…

Read MoreMicrosoft Cautions on Ongoing Attacks Targeting Apache Log4j Vulnerabilities

Nation-State Hackers Distribute Malware via “Bulletproof” Blockchains

Cybersecurity Alert: North Korean Cyber Operatives Exploit Smart Contracts for Malware Deployment Recent investigations by Google have uncovered a sophisticated malware delivery system leveraging smart contracts on the Ethereum and BNB Smart Chain blockchains. The cost-effectiveness of creating or modifying these contracts—often below $2 per transaction—marks a stark contrast to…

Read MoreNation-State Hackers Distribute Malware via “Bulletproof” Blockchains

Kinsing Actors Capitalizing on Recent Linux Vulnerability to Compromise Cloud Environments

The cybercriminal group associated with Kinsing has commenced attempts to exploit a newly identified Linux privilege escalation vulnerability known as Looney Tunables. This initiative appears to be part of an experimental campaign targeting cloud environments. According to cloud security firm Aqua, Kinsing is also expanding its attack vectors by extracting…

Read MoreKinsing Actors Capitalizing on Recent Linux Vulnerability to Compromise Cloud Environments

Breach Brief: Chinese Hackers Target ArcGIS Vulnerability

Cybercrime, Fraud Management & Cybercrime Internet-Exposed Call Center Software Under Attack; Patch Tuesday Update Anviksha More (AnvikshaMore) • October 16, 2025 Image: Shutterstock/ISMG This week, the Information Security Media Group covers a range of cybersecurity incidents: Chinese hackers exploiting ArcGIS, vulnerabilities in internet-exposed call center software, and the latest Patch…

Read MoreBreach Brief: Chinese Hackers Target ArcGIS Vulnerability

Does the ACL Data Breach Penalty Signal a Change in Privacy Law Enforcement?

On October 8, the Federal Court of Australia ruled that Australian Clinical Labs (ACL) must pay a substantial penalty for a data breach linked to its Medlab Pathology business, which occurred in February 2022. This ruling marks a significant moment in the enforcement of data protection laws, highlighting the increasing…

Read MoreDoes the ACL Data Breach Penalty Signal a Change in Privacy Law Enforcement?

FBI, NSA, and CISA Alert on Russian Hackers Targeting Critical Infrastructure

US Intelligence Agencies Warn of Increased Cyber Threats from Russian Actors In light of escalating tensions between the U.S. and Russia related to Ukraine and Kazakhstan, American cybersecurity and intelligence agencies have issued a joint advisory detailing strategies for detecting, responding to, and mitigating cyberattacks perpetrated by Russian state-sponsored entities.…

Read MoreFBI, NSA, and CISA Alert on Russian Hackers Targeting Critical Infrastructure

Why the F5 Hack Posed an ‘Imminent Threat’ to Thousands of Networks

Numerous digital infrastructures—primarily managed by the US government and major Fortune 500 companies—are currently under an “imminent threat” of breaches from nation-state hacking groups, following an alarming breach of a leading software provider, as warned by federal authorities on Wednesday. F5 Networks, a Seattle-based provider of networking solutions, publicly acknowledged…

Read MoreWhy the F5 Hack Posed an ‘Imminent Threat’ to Thousands of Networks

Alarmingly Low Confidence in File Upload Security: What’s Behind It?

The trend towards adopting cloud-based and containerized web applications is rapidly gaining traction across various sectors, including technology, finance, healthcare, and government. While the advantages of this transition are significant, it also introduces a range of new security risks that organizations must confront. According to OPSWAT’s 2023 Web Application Security…

Read MoreAlarmingly Low Confidence in File Upload Security: What’s Behind It?