The Breach News

DarkGate Malware Shifts from AutoIt to AutoHotkey in Recent Cyber Attacks

Cybersecurity experts have recently identified a shift in the tactics employed by the DarkGate malware-as-a-service (MaaS) operation, which is now utilizing AutoHotkey scripts instead of the previously favored AutoIt scripts. This adaptation, observed in version 6 of DarkGate released in March 2024 by the developer known as RastaFarEye, marks a…

Read MoreDarkGate Malware Shifts from AutoIt to AutoHotkey in Recent Cyber Attacks

Exploring Offensive and Defensive AI: A Chat with GPT

ChatGPT: A Dual-Edged Sword in Cybersecurity As one of the fastest-growing consumer applications to date, ChatGPT has emerged as a powerful generative AI chatbot, capable of crafting human-like and contextually aware text responses. Its rapid popularity extends across a variety of applications, including content creation, programming, education, customer support, and…

Read MoreExploring Offensive and Defensive AI: A Chat with GPT

We’ve Become a Fortress: The Rise of Militarization in US Elections

As the U.S. approaches another election cycle, unprecedented security measures are being implemented to safeguard the democratic process. The landscape of election security has evolved significantly, characterized by a suite of formidable protections that include drones, snipers, body armor, and bulletproof glass. These enhancements come in response to heightened threats…

Read MoreWe’ve Become a Fortress: The Rise of Militarization in US Elections

Private Company Accessed Italian Government Database, Say Prosecutors

Cybercrime, Fraud Management & Cybercrime Italian Foreign Minister Denounces Database Breach as a Threat to Democracy Akshaya Asokan (asokan_akshaya) • October 29, 2024 Investigators in Milan are examining a prolonged breach of government databases by a private investigation firm. (Image: Shutterstock) Italy’s Foreign Minister, Antonio Tajani, has publicly denounced the…

Read MorePrivate Company Accessed Italian Government Database, Say Prosecutors

FBI Releases 7,000 Decryption Keys to Assist LockBit Ransomware Victims

The FBI has announced that it possesses over 7,000 decryption keys related to the LockBit ransomware operation, a significant development aimed at assisting victims in recovering their data at no cost. Bryan Vorndran, the assistant director of the FBI’s Cyber Division, highlighted this initiative during his keynote address at the…

Read MoreFBI Releases 7,000 Decryption Keys to Assist LockBit Ransomware Victims

ExtraHop Report Uncovers Data Breach Costs Surpassing Industry Estimates – Intelligent CISO

ExtraHop Report Highlights Financial Repercussions of Data Breaches on Public Companies ExtraHop has unveiled a comprehensive report examining the short- and long-term financial effects that prominent data breaches inflict on publicly traded companies. The report reveals that, on average, a data breach costs organizations approximately $677 million— a figure significantly…

Read MoreExtraHop Report Uncovers Data Breach Costs Surpassing Industry Estimates – Intelligent CISO

Zyxel Issues Firmware Patch for Vulnerabilities in End-of-Life NAS Devices

Zyxel has issued critical security updates to address significant vulnerabilities affecting two of its end-of-life network-attached storage (NAS) devices. These flaws could allow unauthenticated attackers to execute operating system commands and arbitrary code on compromised systems. The affected models include the NAS326, which is running versions V5.21(AAZF.16)C0 and earlier, and…

Read MoreZyxel Issues Firmware Patch for Vulnerabilities in End-of-Life NAS Devices

MuddyC2Go: Iranian Hackers Deploy New C2 Framework Targeting Israel

Recent cybersecurity investigations reveal that Iranian state-sponsored actors have employed a novel command-and-control (C2) framework identified as MuddyC2Go. This development is part of ongoing cyber assaults directed at Israel, heightening concerns regarding the threat landscape in the region. Security researcher Simon Kenin from Deep Instinct outlined in a report released…

Read MoreMuddyC2Go: Iranian Hackers Deploy New C2 Framework Targeting Israel