The Breach News

Healey Advocates for Required Reporting of Municipal Cyberattacks; Two Cape Towns Targeted in January – Cape Cod Times

Healey Advocates for Mandatory Reporting of Cyberattacks Amid January Incidents in Cape Cod In a recent development underscoring the escalating threat of cyberattacks on municipal entities, Massachusetts Governor Maura Healey has called for the implementation of mandatory reporting requirements for such incidents. This initiative follows significant cyber breaches that impacted…

Read MoreHealey Advocates for Required Reporting of Municipal Cyberattacks; Two Cape Towns Targeted in January – Cape Cod Times

Researchers Uncover ‘Deceptive Delight’ Technique for Bypassing AI Models

Cybersecurity Researchers Uncover New Jailbreak Technique for AI Models Recent findings by cybersecurity experts at Palo Alto Networks’ Unit 42 have revealed a novel adversarial approach known as “Deceptive Delight,” capable of bypassing the safety measures of large language models (LLMs) during interactive dialogues. By interspersing harmful instructions within benign…

Read MoreResearchers Uncover ‘Deceptive Delight’ Technique for Bypassing AI Models

Hackers Posed as Aerobics Instructors for Years to Target Aerospace Workers

Iranian Cyber Espionage Group Targets Aerospace Defense Sector with Social Engineering Tactics An Iranian cyber espionage group has been implicated in a sophisticated attack designed to plant malware on the systems of an employee at an aerospace defense contractor. This operation, which has transpired over several years, underscores the evolving…

Read MoreHackers Posed as Aerobics Instructors for Years to Target Aerospace Workers

Australia’s Scam Prevention Framework: The Burst Bubble

Fraud Management & Cybercrime, Fraud Risk Management Treasury Yet to Release Sector-Specific Controls and Reimbursement Mechanisms Suparna Goswami (gsuparna) • October 29, 2025 Image: Evanto Elements In a significant move earlier this year, Australia implemented a pioneering scam prevention law designed to position the nation as an unwelcoming environment for…

Read MoreAustralia’s Scam Prevention Framework: The Burst Bubble

A Call to Action for Australian Businesses

Recently, a headline regarding a cyber breach emerged, emphasizing that the exposure of personal information represents the “worst-case scenario” in such incidents. While breaches do raise significant public concern, the situation is more complex than this characterization suggests. This analysis does not zero in on any single incident; rather, it…

Read MoreA Call to Action for Australian Businesses

CISA Alerts on Ongoing Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)

A critical vulnerability affecting Microsoft SharePoint, identified as CVE-2024-38094, has been recently incorporated into the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog. This adds urgency as CISA has flagged the issue, citing active exploitation in the wild. This high-severity vulnerability, which carries a CVSS score…

Read MoreCISA Alerts on Ongoing Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)

Chinese Hackers Deploy PlugX Variant on Compromised Microsoft Exchange Servers

A sophisticated cyberespionage operation has emerged, directly attributed to a Chinese group utilizing vulnerabilities in Microsoft Exchange Servers unveiled earlier this March. This group, identified as PKPLUG (also known as Mustang Panda and HoneyMyte), has executed a new attack sequence deploying an undocumented variant of a remote access trojan, dubbed…

Read MoreChinese Hackers Deploy PlugX Variant on Compromised Microsoft Exchange Servers