The Breach News

U.S. Agencies Issue Warning About Increased Iranian Cyber Threats Targeting Defense and Critical Infrastructure

Date: June 30, 2025
Topic: Cybersecurity / Critical Infrastructure

U.S. cybersecurity and intelligence agencies have released a joint advisory cautioning about the rising risk of cyber attacks from Iranian government-sponsored or affiliated groups. “In recent months, we’ve observed heightened activity from hacktivists and Iranian-linked actors, likely to escalate due to current geopolitical circumstances,” the agencies stated. They highlighted that these cyber adversaries typically exploit opportunities presented by unpatched or outdated software vulnerable to known Common Vulnerabilities and Exposures, as well as the use of default or easily guessed passwords on internet-connected accounts and devices. Currently, there is no evidence pointing to a coordinated campaign of malicious cyber actions in the U.S. attributed to Iran, according to insights from the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Defense Cyber Crime Center (DC3), and the National Security Agency (NSA). Emphasizing the need for enhanced vigilance…

U.S. Agencies Raise Alarm Over Increasing Iranian Cyber Threats Targeting Defense and Critical Infrastructure June 30, 2025 U.S. cybersecurity and intelligence agencies have collaboratively issued a cautionary advisory regarding an uptick in cyber threats emanating from Iranian state-affiliated actors. They have observed heightened activity from hacktivists and individuals connected to…

Read More

U.S. Agencies Issue Warning About Increased Iranian Cyber Threats Targeting Defense and Critical Infrastructure

Date: June 30, 2025
Topic: Cybersecurity / Critical Infrastructure

U.S. cybersecurity and intelligence agencies have released a joint advisory cautioning about the rising risk of cyber attacks from Iranian government-sponsored or affiliated groups. “In recent months, we’ve observed heightened activity from hacktivists and Iranian-linked actors, likely to escalate due to current geopolitical circumstances,” the agencies stated. They highlighted that these cyber adversaries typically exploit opportunities presented by unpatched or outdated software vulnerable to known Common Vulnerabilities and Exposures, as well as the use of default or easily guessed passwords on internet-connected accounts and devices. Currently, there is no evidence pointing to a coordinated campaign of malicious cyber actions in the U.S. attributed to Iran, according to insights from the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Defense Cyber Crime Center (DC3), and the National Security Agency (NSA). Emphasizing the need for enhanced vigilance…

SAP NetWeaver Vulnerability Exploited in Auto-Color Malware Assault on US Company

Darktrace, a prominent cybersecurity research organization, has reported what appears to be the first recorded instance of threat actors leveraging a severe vulnerability in SAP NetWeaver (CVE-2025-31324) to deploy a stealthy malware known as Auto-Color. This vulnerability, uncovered by SAP SE on April 24, 2025, carries a critical CVSS score…

Read MoreSAP NetWeaver Vulnerability Exploited in Auto-Color Malware Assault on US Company

Tea App Data Breach Escalates: 1.1 Million User Chats Exposed – Security Boulevard

Data Breach at Tea App Exposes 1.1 Million User Chats A significant data breach has recently impacted the Tea app, revealing that approximately 1.1 million user chats have been compromised. This breach is raising serious concerns regarding the security of user data and posing potential risks for both the individuals…

Read MoreTea App Data Breach Escalates: 1.1 Million User Chats Exposed – Security Boulevard

Researchers Discover Batavia Windows Spyware Targeting Russian Firms to Steal Documents

Cyber Espionage / Threat Intelligence
July 08, 2025

An ongoing cyber-espionage campaign has been identified, targeting Russian organizations with a new strain of Windows spyware known as Batavia. According to cybersecurity firm Kaspersky, the operation has been active since July 2024. The attack typically begins with phishing emails that contain malicious links, disguised as communications regarding contract agreements. “The primary objective of this attack is to deploy the previously unknown Batavia spyware to steal internal documents from the targeted organizations,” Kaspersky reported. These emails originate from the domain “oblast-ru[.]com,” believed to be controlled by the attackers. The links in these emails lead recipients to download an archive file that contains a malicious Visual Basic Encoded script (.VBE). Once executed, the script gathers system information from the compromised host and transmits it to a remote server, paving the way for the subsequent delivery of a next-stage payload.

Unveiling Batavia: New Spyware Targeting Russian Firms for Cyber Espionage In a recent development within the sphere of cyber espionage, researchers have identified a previously unreported piece of Windows spyware dubbed Batavia, specifically designed to infiltrate Russian organizations. This activity, which cybersecurity firm Kaspersky reports has been ongoing since July…

Read More

Researchers Discover Batavia Windows Spyware Targeting Russian Firms to Steal Documents

Cyber Espionage / Threat Intelligence
July 08, 2025

An ongoing cyber-espionage campaign has been identified, targeting Russian organizations with a new strain of Windows spyware known as Batavia. According to cybersecurity firm Kaspersky, the operation has been active since July 2024. The attack typically begins with phishing emails that contain malicious links, disguised as communications regarding contract agreements. “The primary objective of this attack is to deploy the previously unknown Batavia spyware to steal internal documents from the targeted organizations,” Kaspersky reported. These emails originate from the domain “oblast-ru[.]com,” believed to be controlled by the attackers. The links in these emails lead recipients to download an archive file that contains a malicious Visual Basic Encoded script (.VBE). Once executed, the script gathers system information from the compromised host and transmits it to a remote server, paving the way for the subsequent delivery of a next-stage payload.

Surge in Chaos Ransomware Linked to BlackSuit Group Departure

Fraud Management & Cybercrime, Ransomware Operation Checkmate Disrupts Major Russian-Speaking Ransomware Group Mathew J. Schwartz (euroinfosec) • July 28, 2025 The BlackSuit dark web leak site as of July 24, 2025. In a significant international effort, Operation Checkmate has dismantled BlackSuit, a ransomware group responsible for leveraging ransom demands that…

Read MoreSurge in Chaos Ransomware Linked to BlackSuit Group Departure

141 Million Data Breach Records Expose Bank Statements and Cryptocurrency Keys

141 million breached files reveal significant data exposure. getty Update, July 29, 2025: This article, initially published on July 28, has been revised to include additional details from the Anatomy of a Data Breach report, which reviewed 141 million compromised files across 1,257 breach incidents, and insights from a newly…

Read More141 Million Data Breach Records Expose Bank Statements and Cryptocurrency Keys

Building Trustworthy Digital Identities at Scale: Privacy, AI, and Effortless Logins

Is Managing Customer Logins and Data Overwhelming? You’re Not Alone!

In today’s digital world, everyone seeks fast, secure, and personalized online experiences. However, increasing concerns about data usage mean that trust can evaporate in an instant if things don’t feel right. With the rapid advancements in AI transforming everything from login processes to fraud detection, navigating these changes can feel daunting.

If you’re grappling with logins, data privacy, user onboarding, or establishing digital trust, our upcoming webinar, “Navigating Customer Identity in the AI Era,” is just for you! We’ll explore the Auth0 2025 Customer Identity Trends Report, uncovering what’s effective, what isn’t, and how to adapt your strategy moving forward.

Join us to gain practical insights into pressing challenges such as:

  • How AI is reshaping user expectations and the emerging demands they’re making.

Don’t miss this opportunity to stay ahead in the digital landscape!

The Evolving Landscape of Customer Identity Management in the Age of AI As digital experiences demand heightened speed and personalization, managing customer logins and data has become increasingly complex. Businesses are acutely aware that while users seek seamless online interactions, they are equally vigilant about their data privacy. This dichotomy…

Read More

Building Trustworthy Digital Identities at Scale: Privacy, AI, and Effortless Logins

Is Managing Customer Logins and Data Overwhelming? You’re Not Alone!

In today’s digital world, everyone seeks fast, secure, and personalized online experiences. However, increasing concerns about data usage mean that trust can evaporate in an instant if things don’t feel right. With the rapid advancements in AI transforming everything from login processes to fraud detection, navigating these changes can feel daunting.

If you’re grappling with logins, data privacy, user onboarding, or establishing digital trust, our upcoming webinar, “Navigating Customer Identity in the AI Era,” is just for you! We’ll explore the Auth0 2025 Customer Identity Trends Report, uncovering what’s effective, what isn’t, and how to adapt your strategy moving forward.

Join us to gain practical insights into pressing challenges such as:

  • How AI is reshaping user expectations and the emerging demands they’re making.

Don’t miss this opportunity to stay ahead in the digital landscape!