The Breach News

New Ransomware-as-a-Service ‘Eldorado’ Aims at Windows and Linux Platforms

A new ransomware-as-a-service (RaaS) operation, known as Eldorado, has emerged with capabilities to lock files on both Windows and Linux platforms. This malware variant first surfaced on March 16, 2024, when its affiliate program was advertised on the infamous RAMP ransomware forum. The cybersecurity firm Group-IB, based in Singapore, has…

Read MoreNew Ransomware-as-a-Service ‘Eldorado’ Aims at Windows and Linux Platforms

White House Official Urges Insurance Companies to Cease Ransomware Payment Funding, Though It Lacks Official Directive – DataBreaches.Net

Insurance Companies Urged to Cease Ransomware Payment Incentives In a recent statement, a senior official from the White House emphasized the urgent need for insurance companies to stop providing policies that encourage extortion payments during ransomware attacks. This call to action aligns with a growing concern among cybersecurity experts regarding…

Read MoreWhite House Official Urges Insurance Companies to Cease Ransomware Payment Funding, Though It Lacks Official Directive – DataBreaches.Net

Researchers Discover More Than 20 Vulnerabilities in Supply Chains of MLOps Platforms

Cybersecurity experts are raising alarm over significant security risks identified within the machine learning (ML) software supply chain. Investigations have uncovered more than 20 vulnerabilities that could be exploited to compromise MLOps (Machine Learning Operations) platforms, potentially exposing businesses to severe operational risks. These vulnerabilities, categorized as inherent and implementation…

Read MoreResearchers Discover More Than 20 Vulnerabilities in Supply Chains of MLOps Platforms

Cybercriminals Target Jenkins Script Console for Cryptocurrency Mining Attacks

Cybersecurity experts have identified a significant vulnerability in Jenkins, a widely-used continuous integration and delivery platform. Attackers can exploit improperly configured Jenkins Script Console instances to facilitate malicious activities, including cryptocurrency mining. Shubham Singh and Sunil Bharti from Trend Micro recently detailed this risk, noting that misconfigurations related to authentication…

Read MoreCybercriminals Target Jenkins Script Console for Cryptocurrency Mining Attacks

Fileless Malware Consuming the Computing Resources of Linux Servers

A significant cybersecurity incident is unfolding, with thousands of Linux servers across the globe falling prey to a sophisticated dropper malware. This concerning development involves the deployment of proxyjacking and cryptomining malware, indicating a dangerous shift in the tactics employed by cybercriminals. The primary targets of this attack include organizations…

Read MoreFileless Malware Consuming the Computing Resources of Linux Servers

This Week in Data/Cyber/Tech: Do Regulators Have a Duty to Act After a Personal Data Breach? | Insights

Recent Developments in Data Protection: A Look at Regulatory Compliance Post-Breach The realm of data protection is rarely devoid of noteworthy news, and the past week continued this trend with a significant ruling from the European Court of Justice (CJEU), shedding light on how regulatory enforcement may be approached in…

Read MoreThis Week in Data/Cyber/Tech: Do Regulators Have a Duty to Act After a Personal Data Breach? | Insights

SonicWall Releases Urgent Patch for Firewall Vulnerability Enabling Unauthorized Access

Critical Flaw Detected in SonicWall Firewalls, User Action Required SonicWall has issued urgent security updates to mitigate a significant vulnerability in its firewall products, which, if exploited, could allow unauthorized access to these critical network devices. The vulnerability, designated as CVE-2024-40766, has a high Common Vulnerability Scoring System (CVSS) score…

Read MoreSonicWall Releases Urgent Patch for Firewall Vulnerability Enabling Unauthorized Access

ViperSoftX Malware Camouflaged as eBooks on Torrent Sites to Launch Covert Attacks

ViperSoftX Malware Exploits eBook Distribution for Stealthy PowerShell Execution The sophisticated malware known as ViperSoftX has recently been detected in a new distribution method involving the use of eBooks shared through torrent sites. Since its first identification by Fortinet in 2020, ViperSoftX has become notorious for its ability to exfiltrate…

Read MoreViperSoftX Malware Camouflaged as eBooks on Torrent Sites to Launch Covert Attacks

Cloudflare Successfully Thwarts Unprecedented 3.8 Tbps DDoS Attack

Cloudflare Responds to Record-Breaking DDoS Attack, Mitigates Threat to Customers In a recent cybersecurity incident, internet infrastructure provider Cloudflare successfully defended against a colossal distributed denial-of-service (DDoS) attack that reached 3.8 terabits per second (Tbps) and 2.14 billion packets per second (PPS). This incident was confirmed by Matthew Prince, the…

Read MoreCloudflare Successfully Thwarts Unprecedented 3.8 Tbps DDoS Attack