The Breach News

Adobe Hacked: 2.9 Million Customer Accounts Compromised

October 4, 2013

On Thursday, hackers infiltrated Adobe Systems’ internal network, compromising the personal information of 2.9 million customers alongside the source code of several popular Adobe products. This incident marks a significant blow to Adobe’s reputation, affecting well-known software like Photoshop.

The breach exposed sensitive user details, including account IDs, encrypted passwords, and credit and debit card numbers. While Adobe has not specified which software users were affected, the compromised products include Adobe Acrobat, ColdFusion, and ColdFusion Builder.

In a customer security alert, Adobe stated: “We believe these attacks may be related. We are working diligently internally, as well as with external partners and law enforcement, to address the incident.” Adobe’s Arkin reassured that there is currently no awareness of zero-day exploits or other particular threats to its customers following the breach.

Adobe Suffers Major Data Breach: Hackers Compromise 2.9 Million Customer Accounts On October 4, 2013, Adobe Systems reported a significant data breach that has raised alarms across the cybersecurity landscape. Cybercriminals infiltrated the company’s internal network, leading to the unauthorized acquisition of personal information belonging to approximately 2.9 million customers…

Read More

Adobe Hacked: 2.9 Million Customer Accounts Compromised

October 4, 2013

On Thursday, hackers infiltrated Adobe Systems’ internal network, compromising the personal information of 2.9 million customers alongside the source code of several popular Adobe products. This incident marks a significant blow to Adobe’s reputation, affecting well-known software like Photoshop.

The breach exposed sensitive user details, including account IDs, encrypted passwords, and credit and debit card numbers. While Adobe has not specified which software users were affected, the compromised products include Adobe Acrobat, ColdFusion, and ColdFusion Builder.

In a customer security alert, Adobe stated: “We believe these attacks may be related. We are working diligently internally, as well as with external partners and law enforcement, to address the incident.” Adobe’s Arkin reassured that there is currently no awareness of zero-day exploits or other particular threats to its customers following the breach.

CISA Urges Immediate Patching of Critical Sitecore Vulnerability Under Active Attack

September 5, 2025
Vulnerability / Threat Intelligence

Federal Civilian Executive Branch (FCEB) agencies are directed to update their Sitecore systems by September 25, 2025, due to a critical security vulnerability, identified as CVE-2025-53690, that is currently being exploited. The vulnerability has a CVSS score of 9.0 out of 10, highlighting its severity. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), this flaw affects Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud, allowing for deserialization of untrusted data through default machine keys. This presents an opportunity for attackers to execute remote code by exploiting exposed ASP.NET machine keys. Mandiant, a Google-owned cybersecurity firm, reported that the ongoing ViewState deserialization attacks utilized a sample machine key found in Sitecore deployment guides from 2017 and earlier. The threat intelligence team…

CISA Urges Immediate Updates to Sitecore Systems Due to Critical Vulnerability Under Active Attack September 5, 2025 Recent developments in cybersecurity have prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue a warning to Federal Civilian Executive Branch (FCEB) agencies regarding a critical vulnerability in Sitecore software, specifically affecting…

Read More

CISA Urges Immediate Patching of Critical Sitecore Vulnerability Under Active Attack

September 5, 2025
Vulnerability / Threat Intelligence

Federal Civilian Executive Branch (FCEB) agencies are directed to update their Sitecore systems by September 25, 2025, due to a critical security vulnerability, identified as CVE-2025-53690, that is currently being exploited. The vulnerability has a CVSS score of 9.0 out of 10, highlighting its severity. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), this flaw affects Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud, allowing for deserialization of untrusted data through default machine keys. This presents an opportunity for attackers to execute remote code by exploiting exposed ASP.NET machine keys. Mandiant, a Google-owned cybersecurity firm, reported that the ongoing ViewState deserialization attacks utilized a sample machine key found in Sitecore deployment guides from 2017 and earlier. The threat intelligence team…

Critical Remote Code Execution Vulnerability Found in Multiple Netgear Router Models

On September 22, 2021, networking company Netgear alerted users about a critical remote code execution (RCE) vulnerability, identified as CVE-2021-40847 (CVSS score: 8.1), affecting various router models. This weakness could allow remote attackers to gain control of affected systems. Netgear has released firmware updates to address the issue for the following models:

  • R6400v2 (version 1.0.4.120)
  • R6700 (version 1.0.2.26)
  • R6700v3 (version 1.0.4.120)
  • R6900 (version 1.0.2.26)
  • R6900P (version 3.3.142_HOTFIX)
  • R7000 (version 1.0.11.128)
  • R7000P (version 1.3.3.142_HOTFIX)
  • R7850 (version 1.0.5.76)
  • R7900 (version 1.0.4.46)
  • R8000 (version 1.0.4.76)
  • RS400 (version 1.5.1.80)

Security researcher Adam Nichols from GRIMM noted that the vulnerability is linked to Circle, a third-party component integrated into the router firmware.

Critical Remote Code Execution Vulnerability Found in Multiple Netgear Router Models On September 22, 2021, networking equipment manufacturer Netgear announced the release of crucial patches to address a high-severity remote code execution vulnerability that could allow unauthorized attackers to gain control over affected routers. This vulnerability, assigned the identifier CVE-2021-40847…

Read More

Critical Remote Code Execution Vulnerability Found in Multiple Netgear Router Models

On September 22, 2021, networking company Netgear alerted users about a critical remote code execution (RCE) vulnerability, identified as CVE-2021-40847 (CVSS score: 8.1), affecting various router models. This weakness could allow remote attackers to gain control of affected systems. Netgear has released firmware updates to address the issue for the following models:

  • R6400v2 (version 1.0.4.120)
  • R6700 (version 1.0.2.26)
  • R6700v3 (version 1.0.4.120)
  • R6900 (version 1.0.2.26)
  • R6900P (version 3.3.142_HOTFIX)
  • R7000 (version 1.0.11.128)
  • R7000P (version 1.3.3.142_HOTFIX)
  • R7850 (version 1.0.5.76)
  • R7900 (version 1.0.4.46)
  • R8000 (version 1.0.4.76)
  • RS400 (version 1.5.1.80)

Security researcher Adam Nichols from GRIMM noted that the vulnerability is linked to Circle, a third-party component integrated into the router firmware.

13 Members of Anonymous Charged in ‘Operation Payback’ Cyber Attack Scheme

Oct 04, 2013

A U.S. Grand Jury has indicted 13 alleged members of the hacking collective Anonymous for their involvement in cyber attacks against various websites during the anti-copyright initiative known as “Operation Payback.” The group executed denial-of-service (DDoS) attacks on sites belonging to organizations like the Recording Industry Association of America, Visa, and MasterCard. These actions were in retaliation for the closure of “The Pirate Bay,” a Swedish file-sharing platform used for illegal downloads. The DDoS campaign later targeted Bank of America and other credit card companies after they declined to process payments for WikiLeaks. The indictment charges the suspects with conspiracy to intentionally damage protected computers and using software called Low Orbit Ion Cannon (LOIC) to facilitate the attacks.

Thirteen Members of Anonymous Indicted in Operation Payback Cyber Attacks On October 4, 2013, a U.S. grand jury announced the indictment of thirteen individuals associated with the hacking group Anonymous, in connection with a series of cyber attacks carried out under the banner of “Operation Payback.” This initiative was reportedly…

Read More

13 Members of Anonymous Charged in ‘Operation Payback’ Cyber Attack Scheme

Oct 04, 2013

A U.S. Grand Jury has indicted 13 alleged members of the hacking collective Anonymous for their involvement in cyber attacks against various websites during the anti-copyright initiative known as “Operation Payback.” The group executed denial-of-service (DDoS) attacks on sites belonging to organizations like the Recording Industry Association of America, Visa, and MasterCard. These actions were in retaliation for the closure of “The Pirate Bay,” a Swedish file-sharing platform used for illegal downloads. The DDoS campaign later targeted Bank of America and other credit card companies after they declined to process payments for WikiLeaks. The indictment charges the suspects with conspiracy to intentionally damage protected computers and using software called Low Orbit Ion Cannon (LOIC) to facilitate the attacks.

“Noisy Bear Campaign Disguised as Phishing Test Revealed Targeting Kazakhstan’s Energy Sector”

Sep 06, 2025 – Malware / Cyber Espionage

A suspected Russian threat actor is behind a series of attacks aimed at Kazakhstan’s energy sector, identified as Operation BarrelFire by Seqrite Labs, which tracks the group as Noisy Bear. Active since at least April 2025, the campaign specifically targets employees of KazMunaiGas (KMG). The attackers delivered a counterfeit document purporting to be from the KMG IT department, mimicking legitimate internal communications and addressing topics like policy updates, certification processes, and salary adjustments. According to security researcher Subhajeet Singha, the infection process starts with a phishing email containing a ZIP file that includes a Windows shortcut (LNK) downloader, a decoy document related to KazMunaiGas, and a README.txt file with instructions in both Russian and Kazakh to execute a program named “KazMunayGaz_Viewer.”

Noisy Bear Campaign: Phishing Test Unveiled in Kazakhstan’s Energy Sector On September 6, 2025, cybersecurity experts revealed that a series of attacks targeting Kazakhstan’s energy sector has been linked to a threat actor possibly originating from Russia. This campaign, dubbed Operation BarrelFire, is attributed to a new group identified by…

Read More

“Noisy Bear Campaign Disguised as Phishing Test Revealed Targeting Kazakhstan’s Energy Sector”

Sep 06, 2025 – Malware / Cyber Espionage

A suspected Russian threat actor is behind a series of attacks aimed at Kazakhstan’s energy sector, identified as Operation BarrelFire by Seqrite Labs, which tracks the group as Noisy Bear. Active since at least April 2025, the campaign specifically targets employees of KazMunaiGas (KMG). The attackers delivered a counterfeit document purporting to be from the KMG IT department, mimicking legitimate internal communications and addressing topics like policy updates, certification processes, and salary adjustments. According to security researcher Subhajeet Singha, the infection process starts with a phishing email containing a ZIP file that includes a Windows shortcut (LNK) downloader, a decoy document related to KazMunaiGas, and a README.txt file with instructions in both Russian and Kazakh to execute a program named “KazMunayGaz_Viewer.”

New Windows Vulnerability Exposes Devices to Rootkit Installation by Hackers

New Microsoft Windows Vulnerability Could Enable Rootkit Installation by Hackers September 23, 2021 Security researchers have identified a critical vulnerability in the Microsoft Windows Platform Binary Table (WPBT) that poses risks to all devices operating on Windows since the release of Windows 8. This unpatched flaw could allow attackers to…

Read More

New Windows Vulnerability Exposes Devices to Rootkit Installation by Hackers

New Phishing Attack Targets Poste Italiane’s Postal and Financial Services Again

Date: Oct 21, 2013

This phishing attack exemplifies a sophisticated blend of technology and psychology. Individuals are often deceived into clicking on unsecured website links. This week, Sophos experts uncovered a noteworthy phishing scheme aimed at Poste Italiane, the Italian postal service. This incident stood out due to its use of an old social engineering tactic. Poste Italiane encompasses postal, financial, and payment services and has been identified as a leading target in a recent F-Secure Threat report. The frequency of attacks against Poste Italiane is striking, with the primary goal of tricking customers into unknowingly submitting their credentials to fraudulent login sites. In this latest attack, criminals deployed a common tactic by sending an email with an enticing HTML attachment that prompts recipients to open it: “To activate the ‘Security Web Postepay,’ you need to: – Download…”

Phishing Attack Targets Poste Italiane, Exposing Vulnerabilities in Online Security October 21, 2013 In a concerning development for the Italian postal and financial services sector, a sophisticated phishing attack targeting Poste Italiane has come to light. Security experts at Sophos detected this breach, which showcases a notable revival of established…

Read More

New Phishing Attack Targets Poste Italiane’s Postal and Financial Services Again

Date: Oct 21, 2013

This phishing attack exemplifies a sophisticated blend of technology and psychology. Individuals are often deceived into clicking on unsecured website links. This week, Sophos experts uncovered a noteworthy phishing scheme aimed at Poste Italiane, the Italian postal service. This incident stood out due to its use of an old social engineering tactic. Poste Italiane encompasses postal, financial, and payment services and has been identified as a leading target in a recent F-Secure Threat report. The frequency of attacks against Poste Italiane is striking, with the primary goal of tricking customers into unknowingly submitting their credentials to fraudulent login sites. In this latest attack, criminals deployed a common tactic by sending an email with an enticing HTML attachment that prompts recipients to open it: “To activate the ‘Security Web Postepay,’ you need to: – Download…”

Critical Security Updates for Apple iOS and macOS Released to Address Actively Exploited Vulnerabilities

September 24, 2021

On Thursday, Apple launched important security updates to tackle multiple vulnerabilities in older iOS and macOS versions, which have been exploited in real-world attacks. This release also expands on previous patches for a security flaw targeted by NSO Group’s Pegasus spyware aimed at iPhone users.

Notably, CVE-2021-30869, a type confusion vulnerability within Apple’s XNU kernel, could allow malicious apps to execute arbitrary code with elevated privileges. Apple has improved state handling to mitigate this issue. Google’s Threat Analysis Group, which reported the vulnerability, noted it was being exploited alongside a remote code execution vulnerability affecting WebKit.

Additionally, Apple addressed two more vulnerabilities, CVE-2021-30858 and CVE-2021-30860, which were patched earlier this month.

Apple Issues Critical Updates to Address Zero-Day Vulnerabilities in iOS and macOS September 24, 2021 Apple has issued important security updates for older versions of iOS and macOS in response to vulnerabilities that are currently being actively exploited. The company identified these issues during its ongoing security monitoring and reported…

Read More

Critical Security Updates for Apple iOS and macOS Released to Address Actively Exploited Vulnerabilities

September 24, 2021

On Thursday, Apple launched important security updates to tackle multiple vulnerabilities in older iOS and macOS versions, which have been exploited in real-world attacks. This release also expands on previous patches for a security flaw targeted by NSO Group’s Pegasus spyware aimed at iPhone users.

Notably, CVE-2021-30869, a type confusion vulnerability within Apple’s XNU kernel, could allow malicious apps to execute arbitrary code with elevated privileges. Apple has improved state handling to mitigate this issue. Google’s Threat Analysis Group, which reported the vulnerability, noted it was being exploited alongside a remote code execution vulnerability affecting WebKit.

Additionally, Apple addressed two more vulnerabilities, CVE-2021-30858 and CVE-2021-30860, which were patched earlier this month.