The Breach News

Major Vulnerability in Cisco IP Phone Series Opens Door to Command Injection Attacks

Cisco Releases Critical Security Updates for Harmed IP Phone Models On Wednesday, Cisco announced significant security patches intended to address a critical vulnerability affecting its IP Phone series, including the 6800, 7800, 7900, and 8800 models. This announcement comes in response to the discovery of a severe flaw, identified as…

Read MoreMajor Vulnerability in Cisco IP Phone Series Opens Door to Command Injection Attacks

BankBot Makes Its Comeback on the Play Store: The Ongoing Android Malware Saga

Despite ongoing efforts by Google to secure its Play Store against malware, new threats continue to exploit vulnerabilities in its defenses. Recent investigations by various cybersecurity firms have unveiled two notable malware campaigns, one of which disseminates an updated variant of the notorious **BankBot** trojan that mimics legitimate banking applications…

Read MoreBankBot Makes Its Comeback on the Play Store: The Ongoing Android Malware Saga

Point-of-Sale Malware ‘ChewBacca’ Utilizes Tor to Steal Credit Card Data Across 11 Countries

The recent surge in cybercrime has brought Point of Sale (POS) systems into the crosshairs of attackers, particularly highlighted by significant data breaches at major U.S. retailers including Target and Neiman Marcus. These incidents exposed the sensitive financial information of over 110 million and 1.1 million customers, respectively, underscoring the…

Read MorePoint-of-Sale Malware ‘ChewBacca’ Utilizes Tor to Steal Credit Card Data Across 11 Countries

Intrusive Hackers Target Systems via Remote Monitoring Software

Fraud Management & Cybercrime, Governance & Risk Management, Ransomware VoidCrypt Ransomware Variant Exploits Remote Monitoring Tools, Reports Huntress Greg Sirico • February 13, 2026 Image: Andrey Popov/Shutterstock Recent findings from cybersecurity firm Huntress reveal that employee monitoring software is not only advantageous for management but has also become a valuable…

Read MoreIntrusive Hackers Target Systems via Remote Monitoring Software

Kurd Hacker Forum: Emerging Dark Web Risks to Data Security in the Middle East – iZOOlogic

Kurdish Hacker Forum: Emerging Dark Web Threat to Middle Eastern Data Security A recent investigation has highlighted the emergence of a Kurdish hacker forum that poses an increasing risk to data security across the Middle East. This development underscores a growing trend—cybercriminals are leveraging online platforms to coordinate attacks and…

Read MoreKurd Hacker Forum: Emerging Dark Web Risks to Data Security in the Middle East – iZOOlogic

Critical Vulnerability in FortiOS and FortiProxy May Allow Hackers Remote Access

Fortinet Issues Critical Security Patches Addressing Major Vulnerabilities Fortinet has announced the release of patches to rectify 15 significant security vulnerabilities, including one labeled as critical, affecting both FortiOS and FortiProxy. This particular vulnerability, identified as CVE-2023-25610, has been rated with a severity score of 9.3 out of 10, indicating…

Read MoreCritical Vulnerability in FortiOS and FortiProxy May Allow Hackers Remote Access

Can AI-Powered Ads Cover the Costs?

OpenAI Explores Advertising Strategy as Monetization Challenges PersistAmidst increasing operational costs, OpenAI is facing a significant challenge: a majority of users do not subscribe to paid versions of ChatGPT. In response, the organization is venturing into digital advertising—a strategy commonly adopted by tech companies navigating similar financial dilemmas. However, the…

Read MoreCan AI-Powered Ads Cover the Costs?

Figure Technology Confirms Data Breach Following Social Engineering Attack | Ukraine News

Figure Technology, a company specializing in blockchain-based lending, has acknowledged a data breach affecting its systems. The incident was confirmed on Friday by company spokesperson Aleteya Jadik, who detailed that social engineering tactics were employed against an employee, enabling attackers to extract “a limited number of files.” “a limited number…

Read MoreFigure Technology Confirms Data Breach Following Social Engineering Attack | Ukraine News

Fortinet FortiOS Vulnerability Targeted in Attacks on Government Entities

A new cyber incident has emerged involving an unknown threat actor exploiting a vulnerability in Fortinet’s FortiOS software. The attack has resulted in significant data loss and corruption of operating systems and files, primarily targeting government entities and large organizations. Fortinet researchers Guillaume Lovet and Alex Kong, in an advisory…

Read MoreFortinet FortiOS Vulnerability Targeted in Attacks on Government Entities