The Breach News

Dating App Tea Promised Women’s Safety—Then a Data Breach Exposed Their Secrets

Data Breach in Women’s Safety App Sparks Cybersecurity Concerns In a troubling turn of events, the women-only dating safety app known as Tea has experienced significant security breaches that have exposed sensitive user data. Initially conceived as a platform for women to anonymously share reviews and warnings about potential partners,…

Read MoreDating App Tea Promised Women’s Safety—Then a Data Breach Exposed Their Secrets

Cybercriminals Utilize Open-Source Tools to Target Financial Institutions in Africa

Jun 26, 2025
Threat Intelligence / Ransomware

Cybersecurity experts are highlighting a wave of cyberattacks aimed at financial institutions across Africa, dating back to at least July 2023. These attacks leverage a combination of open-source and publicly available tools to sustain access. Researchers from Palo Alto Networks’ Unit 42 are monitoring this activity under the label CL-CRI-1014, where “CL” stands for “cluster” and “CRI” signifies “criminal motivation.” The primary objective appears to be gaining initial access to systems, which is then sold to other criminal actors in underground forums, effectively turning the threat actor into an initial access broker (IAB). “The threat actor mimics signatures from legitimate applications to create forged file signatures, camouflaging their toolset and concealing malicious activities,” noted researchers Tom Fakterman and Guy Levi. “Threat actors frequently spoof legitimate products for illicit purposes.” The attacks are marked by the use of tools such as PoshC2 and others.

Cyber Criminals Utilize Open-Source Tools to Target African Financial Institutions June 26, 2025 Threat Intelligence / Ransomware Recent investigations have revealed a troubling trend of cyber attacks aimed at financial institutions across Africa, with reports indicating that this wave of attacks began as early as July 2023. Cybersecurity experts at…

Read More

Cybercriminals Utilize Open-Source Tools to Target Financial Institutions in Africa

Jun 26, 2025
Threat Intelligence / Ransomware

Cybersecurity experts are highlighting a wave of cyberattacks aimed at financial institutions across Africa, dating back to at least July 2023. These attacks leverage a combination of open-source and publicly available tools to sustain access. Researchers from Palo Alto Networks’ Unit 42 are monitoring this activity under the label CL-CRI-1014, where “CL” stands for “cluster” and “CRI” signifies “criminal motivation.” The primary objective appears to be gaining initial access to systems, which is then sold to other criminal actors in underground forums, effectively turning the threat actor into an initial access broker (IAB). “The threat actor mimics signatures from legitimate applications to create forged file signatures, camouflaging their toolset and concealing malicious activities,” noted researchers Tom Fakterman and Guy Levi. “Threat actors frequently spoof legitimate products for illicit purposes.” The attacks are marked by the use of tools such as PoshC2 and others.

Breach Reports Continue to Emerge

3rd Party Risk Management, Data Breach Notification, Data Security More Than 410,000 Patients Reported Affected, Likely More to Come Marianne Kolbasuk McGee (HealthInfoSec) • July 29, 2025 Image: Oracle Following revelations of a hacking incident earlier this year that compromised legacy patient data from Cerner electronic health record (EHR) servers,…

Read MoreBreach Reports Continue to Emerge

U.S. Agencies Issue Warning About Increased Iranian Cyber Threats Targeting Defense and Critical Infrastructure

Date: June 30, 2025
Topic: Cybersecurity / Critical Infrastructure

U.S. cybersecurity and intelligence agencies have released a joint advisory cautioning about the rising risk of cyber attacks from Iranian government-sponsored or affiliated groups. “In recent months, we’ve observed heightened activity from hacktivists and Iranian-linked actors, likely to escalate due to current geopolitical circumstances,” the agencies stated. They highlighted that these cyber adversaries typically exploit opportunities presented by unpatched or outdated software vulnerable to known Common Vulnerabilities and Exposures, as well as the use of default or easily guessed passwords on internet-connected accounts and devices. Currently, there is no evidence pointing to a coordinated campaign of malicious cyber actions in the U.S. attributed to Iran, according to insights from the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Defense Cyber Crime Center (DC3), and the National Security Agency (NSA). Emphasizing the need for enhanced vigilance…

U.S. Agencies Raise Alarm Over Increasing Iranian Cyber Threats Targeting Defense and Critical Infrastructure June 30, 2025 U.S. cybersecurity and intelligence agencies have collaboratively issued a cautionary advisory regarding an uptick in cyber threats emanating from Iranian state-affiliated actors. They have observed heightened activity from hacktivists and individuals connected to…

Read More

U.S. Agencies Issue Warning About Increased Iranian Cyber Threats Targeting Defense and Critical Infrastructure

Date: June 30, 2025
Topic: Cybersecurity / Critical Infrastructure

U.S. cybersecurity and intelligence agencies have released a joint advisory cautioning about the rising risk of cyber attacks from Iranian government-sponsored or affiliated groups. “In recent months, we’ve observed heightened activity from hacktivists and Iranian-linked actors, likely to escalate due to current geopolitical circumstances,” the agencies stated. They highlighted that these cyber adversaries typically exploit opportunities presented by unpatched or outdated software vulnerable to known Common Vulnerabilities and Exposures, as well as the use of default or easily guessed passwords on internet-connected accounts and devices. Currently, there is no evidence pointing to a coordinated campaign of malicious cyber actions in the U.S. attributed to Iran, according to insights from the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Defense Cyber Crime Center (DC3), and the National Security Agency (NSA). Emphasizing the need for enhanced vigilance…

SAP NetWeaver Vulnerability Exploited in Auto-Color Malware Assault on US Company

Darktrace, a prominent cybersecurity research organization, has reported what appears to be the first recorded instance of threat actors leveraging a severe vulnerability in SAP NetWeaver (CVE-2025-31324) to deploy a stealthy malware known as Auto-Color. This vulnerability, uncovered by SAP SE on April 24, 2025, carries a critical CVSS score…

Read MoreSAP NetWeaver Vulnerability Exploited in Auto-Color Malware Assault on US Company

Tea App Data Breach Escalates: 1.1 Million User Chats Exposed – Security Boulevard

Data Breach at Tea App Exposes 1.1 Million User Chats A significant data breach has recently impacted the Tea app, revealing that approximately 1.1 million user chats have been compromised. This breach is raising serious concerns regarding the security of user data and posing potential risks for both the individuals…

Read MoreTea App Data Breach Escalates: 1.1 Million User Chats Exposed – Security Boulevard

Researchers Discover Batavia Windows Spyware Targeting Russian Firms to Steal Documents

Cyber Espionage / Threat Intelligence
July 08, 2025

An ongoing cyber-espionage campaign has been identified, targeting Russian organizations with a new strain of Windows spyware known as Batavia. According to cybersecurity firm Kaspersky, the operation has been active since July 2024. The attack typically begins with phishing emails that contain malicious links, disguised as communications regarding contract agreements. “The primary objective of this attack is to deploy the previously unknown Batavia spyware to steal internal documents from the targeted organizations,” Kaspersky reported. These emails originate from the domain “oblast-ru[.]com,” believed to be controlled by the attackers. The links in these emails lead recipients to download an archive file that contains a malicious Visual Basic Encoded script (.VBE). Once executed, the script gathers system information from the compromised host and transmits it to a remote server, paving the way for the subsequent delivery of a next-stage payload.

Unveiling Batavia: New Spyware Targeting Russian Firms for Cyber Espionage In a recent development within the sphere of cyber espionage, researchers have identified a previously unreported piece of Windows spyware dubbed Batavia, specifically designed to infiltrate Russian organizations. This activity, which cybersecurity firm Kaspersky reports has been ongoing since July…

Read More

Researchers Discover Batavia Windows Spyware Targeting Russian Firms to Steal Documents

Cyber Espionage / Threat Intelligence
July 08, 2025

An ongoing cyber-espionage campaign has been identified, targeting Russian organizations with a new strain of Windows spyware known as Batavia. According to cybersecurity firm Kaspersky, the operation has been active since July 2024. The attack typically begins with phishing emails that contain malicious links, disguised as communications regarding contract agreements. “The primary objective of this attack is to deploy the previously unknown Batavia spyware to steal internal documents from the targeted organizations,” Kaspersky reported. These emails originate from the domain “oblast-ru[.]com,” believed to be controlled by the attackers. The links in these emails lead recipients to download an archive file that contains a malicious Visual Basic Encoded script (.VBE). Once executed, the script gathers system information from the compromised host and transmits it to a remote server, paving the way for the subsequent delivery of a next-stage payload.