The Breach News

Wing Security SaaS Pulse: Free Continuous Security and Actionable Insights

Wing Security Launches SaaS Pulse: A Free Solution for Continuous SaaS Risk Management In a bid to address the ever-evolving landscape of cybersecurity risks associated with Software as a Service (SaaS) applications, Wing Security has unveiled SaaS Pulse, a free tool designed to provide organizations with ongoing surveillance and actionable…

Read MoreWing Security SaaS Pulse: Free Continuous Security and Actionable Insights

U.S. Pledges $10 Million Reward for Information on Russian Cadet Blizzard Hackers Linked to Major Cyberattacks

The United States government, in conjunction with a coalition of international partners, has officially linked a Russian hacking group known as Cadet Blizzard to the General Staff Main Intelligence Directorate (GRU) 161st Specialist Training Center, also referred to as Unit 29155. This attribution highlights the group’s significant role in cyber…

Read MoreU.S. Pledges $10 Million Reward for Information on Russian Cadet Blizzard Hackers Linked to Major Cyberattacks

CosmicBeetle Launches Custom ScRansom Ransomware in Collaboration with RansomHub

CosmicBeetle Introduces ScRansom Ransomware Targeting SMBs Globally In a significant escalation in the realm of cyber threats, the group known as CosmicBeetle has launched a new ransomware variant called ScRansom, focusing on attacks against small- and medium-sized businesses (SMBs) across Europe, Asia, Africa, and South America. This malicious activity follows…

Read MoreCosmicBeetle Launches Custom ScRansom Ransomware in Collaboration with RansomHub

Ivanti Alerts Users to Ongoing Exploitation of Recently Patched Vulnerability in Cloud Appliance

Significant Security Flaw Discovered in Ivanti Cloud Service Appliance Under Active Attack In a recent disclosure, Ivanti announced that a newly patched security vulnerability in its Cloud Service Appliance (CSA) is currently being exploited in the wild. This serious issue, identified as CVE-2024-8190, has been assigned a CVSS score of…

Read MoreIvanti Alerts Users to Ongoing Exploitation of Recently Patched Vulnerability in Cloud Appliance

Whistleblower Reaches Settlement Following Columbus Data Leak Controversy, Still Bound by Silence – DataBreaches.net

Whistleblower Settlement Arising from Columbus Data Leak Highlights Ongoing Concerns in Cybersecurity A recent settlement has been reached between a whistleblower and a prominent organization following a significant data breach that brought widespread scrutiny to Columbus, Ohio. The incident, which involved a substantial leak of sensitive information, has not only…

Read MoreWhistleblower Reaches Settlement Following Columbus Data Leak Controversy, Still Bound by Silence – DataBreaches.net

Fortinet Acknowledges Data Breach Following Reported Refusal to Pay Ransom – TechRadar

Fortinet Acknowledges Data Breach Following Ransom Payment Refusal In a significant cybersecurity incident, Fortinet has confirmed a data breach that reportedly occurred after the company declined to pay a ransom demanded by cybercriminals. This acknowledgment raises serious concerns about the security posture of a prominent player in the cybersecurity industry…

Read MoreFortinet Acknowledges Data Breach Following Reported Refusal to Pay Ransom – TechRadar

Is Invoking Invasion of Privacy a Suitable Comparison for Data Breach Cases? – Law.com

Is Invasion of Privacy a Suitable Comparison for Data Breach Cases? In an era where data breaches have become increasingly disruptive, the conversation around the legal implications of these incidents is evolving. An article from Law.com raises a thought-provoking question: is the notion of invasion of privacy an appropriate analogue…

Read MoreIs Invoking Invasion of Privacy a Suitable Comparison for Data Breach Cases? – Law.com

The Troubling Connection Between Harmful Groups and ‘The Com’ – DataBreaches.net

The Dark Nexus Between Harm Groups and ‘The Com’ In recent developments within the cybersecurity landscape, a troubling connection has emerged between various harmful groups and a platform referred to as ‘The Com’. This nexus raises significant concerns for business owners who must navigate growing threats in the digital realm.…

Read MoreThe Troubling Connection Between Harmful Groups and ‘The Com’ – DataBreaches.net