The Breach News

Two Windows Vulnerabilities, Including a Zero-Day, Actively Exploited

Researchers have identified that two critical vulnerabilities in Windows operating systems are currently being exploited in widespread cyberattacks. One of these vulnerabilities is a zero-day flaw that has remained active since 2017, while the second is a significant bug that Microsoft has struggled to patch effectively. The zero-day vulnerability was…

Read MoreTwo Windows Vulnerabilities, Including a Zero-Day, Actively Exploited

19-Year-Old Arrested for Using Leaked Optus Data in SMS Scam

Data Breach-Related Scam Leads to Arrest in Australia The Australian Federal Police (AFP) have apprehended a 19-year-old male resident of Sydney in connection with a blackmail scheme that allegedly exploits personal data leaked during the recent Optus data breach. This incident highlights a concerning trend of cybercriminals leveraging compromised data…

Read More19-Year-Old Arrested for Using Leaked Optus Data in SMS Scam

Denmark Shelves Chat Control Proposal Amid Backlash

Data Privacy, Data Security, Endpoint Security Denmark Withdraws Proposal for Client-Side Scanning Amid Controversy Akshaya Asokan (asokan_akshaya) • October 31, 2025 Image: Petr Svoboda/Shutterstock In a significant development, Denmark has withdrawn a contentious proposal that aimed to mandate online service providers to scan user communications and files for child sexual…

Read MoreDenmark Shelves Chat Control Proposal Amid Backlash

Proton’s Latest Observatory Uncovers Over 100 Billion Compromised Records — What You Should Know

Proton Launches Data Breach Observatory to Counter Online Threats In a robust extension of its commitment to safeguard privacy, Swiss privacy advocate Proton has introduced the Data Breach Observatory, a cutting-edge initiative designed to monitor and report data leaks actively. This innovative tool is engineered to scan dark web marketplaces…

Read MoreProton’s Latest Observatory Uncovers Over 100 Billion Compromised Records — What You Should Know

Researchers Identify Flaws in Open-Source AI and ML Models

A recent disclosure has revealed over thirty security vulnerabilities in various open-source artificial intelligence (AI) and machine learning (ML) models, some of which pose severe risks, including remote code execution and data theft. These vulnerabilities, reported through Protect AI’s Huntr bug bounty platform, affect tools such as ChuanhuChatGPT, Lunary, and…

Read MoreResearchers Identify Flaws in Open-Source AI and ML Models

ShadowPad Malware is Gaining Popularity Among Chinese Espionage Groups

In recent developments, the notorious ShadowPad malware has continued to be utilized by various Chinese cyber threat groups since its emergence in 2017. This Windows backdoor allows attackers to deploy additional malicious modules or exfiltrate sensitive information, raising serious concerns among cybersecurity professionals. SentinelOne researchers Yi-Jhen Hsieh and Joey Chen…

Read MoreShadowPad Malware is Gaining Popularity Among Chinese Espionage Groups

Resolving Years of Technical Debt: A Step-by-Step Guide

Artificial Intelligence & Machine Learning, Governance & Risk Management, IT Risk Management Global Technology Debt Stifles Advancement Amidst Clashes of AI, Cloud, and Legacy Systems Brian Pereira (creed_digital) • October 31, 2025 Image: Freepik Organizations worldwide continue to grapple with the ramifications of outdated software and legacy systems, many of…

Read MoreResolving Years of Technical Debt: A Step-by-Step Guide