The Breach News

Experts Uncover the Tactics of the ShinyHunters Cybercrime Group

The cybercrime group known as ShinyHunters has made headlines for its ongoing campaign of data breaches and is now reported to be actively exploiting vulnerabilities in companies’ GitHub repositories. This analysis highlights the group’s strategies for conducting broader and more sophisticated cyberattacks. According to a report from Intel 471 shared…

Read MoreExperts Uncover the Tactics of the ShinyHunters Cybercrime Group

HSCC Guidance for Navigating AI Cybersecurity Risks in the Health Sector

Artificial Intelligence & Machine Learning, Healthcare, Industry Specific Guidance Documents Highlight 5 Key Risk Areas and Best Practices for AI in Healthcare Marianne Kolbasuk McGee (HealthInfoSec) • November 12, 2025 The Health Sector Coordinating Council has previewed upcoming materials aimed at helping the healthcare sector address the cyber risks associated…

Read MoreHSCC Guidance for Navigating AI Cybersecurity Risks in the Health Sector

Patch Released for Critical VMware vCenter Vulnerability Enabling Remote Code Execution

Critical Vulnerabilities Discovered in VMware vCenter Server: A Call to Action for Businesses On Tuesday, Broadcom issued urgent updates in response to a significant security vulnerability affecting VMware vCenter Server that could potentially allow remote code execution. This vulnerability, designated CVE-2024-38812 and rated with a CVSS score of 9.8, is…

Read MorePatch Released for Critical VMware vCenter Vulnerability Enabling Remote Code Execution

12 Major Security Vulnerabilities Being Exploited by Russian Spy Hackers in the Field

A recent advisory from U.S. and U.K. intelligence agencies reveals that cyber operatives linked to the Russian Foreign Intelligence Service (SVR) have adapted their operational tactics in light of prior public revelations regarding their attack methodologies. This shift aims to circumvent detection and mitigation efforts from cybersecurity defenders. The National…

Read More12 Major Security Vulnerabilities Being Exploited by Russian Spy Hackers in the Field

Major Vulnerability in Cosmos Database Impacted Thousands of Microsoft Azure Users

Wiz, a cloud security organization, has disclosed a recently patched vulnerability in Microsoft’s Azure Cosmos database that posed a significant risk by allowing unauthorized users to gain full administrative access to the database instances of other customers. This vulnerability, named “ChaosDB,” was particularly alarming due to its potential for exploitation…

Read MoreMajor Vulnerability in Cosmos Database Impacted Thousands of Microsoft Azure Users

Third-Party Risk Intensifies Regulatory Uncertainty in OT Security

Third-Party Risk Management, Governance & Risk Management, Operational Technology (OT) Sean Tufts of Claroty Discusses Security Challenges for Critical Infrastructure , Brian Pereira (creed_digital) • November 12, 2025 Sean Tufts, Field CTO, Claroty Recent findings indicate that third-party risks present significant cybersecurity challenges for critical infrastructure providers, potentially leading to…

Read MoreThird-Party Risk Intensifies Regulatory Uncertainty in OT Security

English-Language Cybercrime Hub “The COM” Coordinates Diverse Global Attacks

Over the last decade, the English-speaking cybercriminal landscape, known as “The COM,” has grown from a niche group dedicated to trading rare social media usernames into a complex, service-driven underground economy orchestrating a wide array of global cyberattacks. Foundational communities like Dark0de and RaidForums have played a critical role in…

Read MoreEnglish-Language Cybercrime Hub “The COM” Coordinates Diverse Global Attacks

GitLab Addresses Serious SAML Authentication Bypass Vulnerability in CE and EE Versions

In a significant development for the cybersecurity landscape, GitLab has issued critical patches addressing a serious vulnerability in both its Community Edition (CE) and Enterprise Edition (EE) software. The flaw, categorized as an authentication bypass, could potentially allow unauthorized users to gain access to sensitive systems. This vulnerability is embedded…

Read MoreGitLab Addresses Serious SAML Authentication Bypass Vulnerability in CE and EE Versions