The Breach News

Hackers Utilize Morse Code in Phishing Attacks to Bypass Detection

Microsoft has reported a sophisticated year-long phishing campaign characterized by a remarkable ability to evade detection. The attackers exhibited a pattern of altering their obfuscation and encryption strategies approximately every 37 days, employing various techniques, including Morse code, to obscure their activities while extracting user credentials. The phishing attempts typically…

Read MoreHackers Utilize Morse Code in Phishing Attacks to Bypass Detection

Chainguard Secures $280M for Global Open-Source Security Initiative

3rd Party Risk Management, Governance & Risk Management General Catalyst Provides Non-Dilutive Funding for Chainguard’s Global Expansion Michael Novinson (MichaelNovinson) • October 31, 2025 Eyal Bar, Chief Financial Officer, Chainguard (Image: Chainguard) Chainguard, a startup focusing on supply chain security and founded by a former Google Cloud engineer, has secured…

Read MoreChainguard Secures $280M for Global Open-Source Security Initiative

Russia Detains Meduza Theft Developers Following Government Cyberattack – Hackread – Your Source for Cybersecurity News, Data Breaches, Tech, AI, Crypto, and More

On Thursday, October 30, 2025, Russian law enforcement executed a surprise operation in Moscow, apprehending three individuals linked to the development and distribution of the notorious Meduza Stealer. The arrests were confirmed by Irina Volk, a spokesperson for Russia’s Interior Ministry, following an extensive investigation by the Investigative Department of…

Read MoreRussia Detains Meduza Theft Developers Following Government Cyberattack – Hackread – Your Source for Cybersecurity News, Data Breaches, Tech, AI, Crypto, and More

A Sherlock Holmes Approach to Cybersecurity: Uncovering the Impossible Through Exposure Validation

Exposure Validation: A Strategic Imperative for Cybersecurity In the realm of cybersecurity, exposure validation has emerged as a critical practice akin to the deductive methods of Sherlock Holmes. Renowned for his ability to sift through irrelevant information to reveal hidden truths, Holmes famously noted, “When you have eliminated the impossible,…

Read MoreA Sherlock Holmes Approach to Cybersecurity: Uncovering the Impossible Through Exposure Validation

Attackers Can Exploit Firewalls and Middleboxes for Enhanced DDoS Attacks

Cybersecurity Researchers Uncover New TCP-Based DDoS Attack Vector Recent findings from a collaborative team of academics at the University of Maryland and the University of Colorado Boulder have raised alarm bells regarding potential vulnerabilities in the Transmission Control Protocol (TCP), specifically through the exploitation of non-compliant network middleboxes. These devices,…

Read MoreAttackers Can Exploit Firewalls and Middleboxes for Enhanced DDoS Attacks

Two Windows Vulnerabilities, Including a Zero-Day, Actively Exploited

Researchers have identified that two critical vulnerabilities in Windows operating systems are currently being exploited in widespread cyberattacks. One of these vulnerabilities is a zero-day flaw that has remained active since 2017, while the second is a significant bug that Microsoft has struggled to patch effectively. The zero-day vulnerability was…

Read MoreTwo Windows Vulnerabilities, Including a Zero-Day, Actively Exploited

19-Year-Old Arrested for Using Leaked Optus Data in SMS Scam

Data Breach-Related Scam Leads to Arrest in Australia The Australian Federal Police (AFP) have apprehended a 19-year-old male resident of Sydney in connection with a blackmail scheme that allegedly exploits personal data leaked during the recent Optus data breach. This incident highlights a concerning trend of cybercriminals leveraging compromised data…

Read More19-Year-Old Arrested for Using Leaked Optus Data in SMS Scam