The Breach News

Geopolitical Risks Intensify for Cyber-Physical Systems

Critical Infrastructure Security, Governance & Risk Management, Operational Technology (OT) Geopolitical Turbulence Fuels New Threats to Operational Technology and Supply Chains Brian Pereira (creed_digital) • November 4, 2025 Research from Claroty indicates that a significant cyber-physical breach is likely within the next year. (Image: Shutterstock) The current landscape of global…

Read MoreGeopolitical Risks Intensify for Cyber-Physical Systems

Hackers Leverage Roundcube Webmail XSS Flaw to Capture Login Credentials

An emerging cybersecurity threat has surfaced, centered around the exploitation of a recently patched vulnerability in the open-source Roundcube webmail software. This vulnerability has been targeted as part of a phishing campaign aimed at stealing user credentials from various organizations. The cybersecurity firm Positive Technologies reported the discovery of a…

Read MoreHackers Leverage Roundcube Webmail XSS Flaw to Capture Login Credentials

Chinese Hackers Utilize Recent SolarWinds 0-Day in Targeted Attacks

Microsoft has recently identified a series of attacks on SolarWinds’ Serv-U managed file transfer service, which were executed using a now-resolved remote code execution (RCE) vulnerability attributed to a Chinese threat group known as “DEV-0322.” This announcement follows SolarWinds’ emergency patches aimed at countering an exploit that could have allowed…

Read MoreChinese Hackers Utilize Recent SolarWinds 0-Day in Targeted Attacks

FBI Alerts Public to Criminals Impersonating ICE Agents, Advises Verification Protocols

— Criminal impersonation of U.S. immigration officers has emerged as a significant threat, as detailed in a recent warning bulletin from the Federal Bureau of Investigation (FBI). The document, released last month, outlines several incidents across multiple states involving individuals fraudulently claiming to be agents of Immigration and Customs Enforcement…

Read MoreFBI Alerts Public to Criminals Impersonating ICE Agents, Advises Verification Protocols

How Hidden Secrets in Source Code Can Cause Major Breaches

The Rise of Supply Chain Attacks: A Growing Concern for Businesses In 2021, the cybersecurity landscape was notably defined by a surge in supply chain attacks. These incidents occur when cybercriminals compromise third-party software components to infiltrate downstream applications. High-profile breaches such as those involving SolarWinds, Kaseya, and Codecov have…

Read MoreHow Hidden Secrets in Source Code Can Cause Major Breaches

Hypervisors: The New Prime Target for Cybercriminals

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime, Governance & Risk Management Google Issues Warning on Emerging Cyber Threats Akshaya Asokan (asokan_akshaya), David Perera (@daveperera) • November 4, 2025 Image: Shutterstock/ISMG A recent report from Google highlights critical vulnerabilities in the virtualization technology that supports modern IT frameworks, calling attention…

Read MoreHypervisors: The New Prime Target for Cybercriminals

Celerium Chosen as Preferred Cybersecurity Provider for Data Breach Defense by the American Hospital Association – PR Newswire

Celerium Designated a Preferred Cybersecurity Provider by the American Hospital Association In a significant advancement for healthcare cybersecurity, Celerium has been recognized as a Preferred Cybersecurity Provider by the American Hospital Association (AHA) for its robust data breach defense solutions. This designation underscores Celerium’s commitment to safeguarding sensitive healthcare data…

Read MoreCelerium Chosen as Preferred Cybersecurity Provider for Data Breach Defense by the American Hospital Association – PR Newswire

CISA Includes ScienceLogic SL1 Vulnerability in Exploited Catalog Following Recent Zero-Day Attack

On Monday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially included a significant security vulnerability affecting ScienceLogic SL1 in its Known Exploited Vulnerabilities (KEV) list. This action comes in response to confirmed instances of active exploitation as a zero-day vulnerability. The flaw, designated as CVE-2024-9537 (scoring 9.3 on the…

Read MoreCISA Includes ScienceLogic SL1 Vulnerability in Exploited Catalog Following Recent Zero-Day Attack