The Breach News

Penn Braces for Alumni Lawsuits After Major Data Breach

Following a recent security breach involving “select information systems,” the University of Pennsylvania is facing multiple class action lawsuits. These legal actions assert that the institution failed to implement adequate measures to safeguard sensitive data. As of this report, The Daily Pennsylvanian has identified four lawsuits initiated by Penn graduates.…

Read MorePenn Braces for Alumni Lawsuits After Major Data Breach

Critical Vulnerability in Kubernetes Image Builder Poses Root Access Risk to Nodes

A significant security vulnerability has emerged within the Kubernetes Image Builder, posing a risk of unauthorized root access under specific conditions. The flaw, identified as CVE-2024-9486 and rated with a critical CVSS score of 9.8, has been resolved in the latest release, version 0.1.38. The vulnerability was reported by security…

Read MoreCritical Vulnerability in Kubernetes Image Builder Poses Root Access Risk to Nodes

Geopolitical Risks Intensify for Cyber-Physical Systems

Critical Infrastructure Security, Governance & Risk Management, Operational Technology (OT) Geopolitical Turbulence Fuels New Threats to Operational Technology and Supply Chains Brian Pereira (creed_digital) • November 4, 2025 Research from Claroty indicates that a significant cyber-physical breach is likely within the next year. (Image: Shutterstock) The current landscape of global…

Read MoreGeopolitical Risks Intensify for Cyber-Physical Systems

Hackers Leverage Roundcube Webmail XSS Flaw to Capture Login Credentials

An emerging cybersecurity threat has surfaced, centered around the exploitation of a recently patched vulnerability in the open-source Roundcube webmail software. This vulnerability has been targeted as part of a phishing campaign aimed at stealing user credentials from various organizations. The cybersecurity firm Positive Technologies reported the discovery of a…

Read MoreHackers Leverage Roundcube Webmail XSS Flaw to Capture Login Credentials

Chinese Hackers Utilize Recent SolarWinds 0-Day in Targeted Attacks

Microsoft has recently identified a series of attacks on SolarWinds’ Serv-U managed file transfer service, which were executed using a now-resolved remote code execution (RCE) vulnerability attributed to a Chinese threat group known as “DEV-0322.” This announcement follows SolarWinds’ emergency patches aimed at countering an exploit that could have allowed…

Read MoreChinese Hackers Utilize Recent SolarWinds 0-Day in Targeted Attacks

FBI Alerts Public to Criminals Impersonating ICE Agents, Advises Verification Protocols

— Criminal impersonation of U.S. immigration officers has emerged as a significant threat, as detailed in a recent warning bulletin from the Federal Bureau of Investigation (FBI). The document, released last month, outlines several incidents across multiple states involving individuals fraudulently claiming to be agents of Immigration and Customs Enforcement…

Read MoreFBI Alerts Public to Criminals Impersonating ICE Agents, Advises Verification Protocols

How Hidden Secrets in Source Code Can Cause Major Breaches

The Rise of Supply Chain Attacks: A Growing Concern for Businesses In 2021, the cybersecurity landscape was notably defined by a surge in supply chain attacks. These incidents occur when cybercriminals compromise third-party software components to infiltrate downstream applications. High-profile breaches such as those involving SolarWinds, Kaseya, and Codecov have…

Read MoreHow Hidden Secrets in Source Code Can Cause Major Breaches