The Breach News

Russia Detains Meduza Theft Developers Following Government Cyberattack – Hackread – Your Source for Cybersecurity News, Data Breaches, Tech, AI, Crypto, and More

On Thursday, October 30, 2025, Russian law enforcement executed a surprise operation in Moscow, apprehending three individuals linked to the development and distribution of the notorious Meduza Stealer. The arrests were confirmed by Irina Volk, a spokesperson for Russia’s Interior Ministry, following an extensive investigation by the Investigative Department of…

Read MoreRussia Detains Meduza Theft Developers Following Government Cyberattack – Hackread – Your Source for Cybersecurity News, Data Breaches, Tech, AI, Crypto, and More

A Sherlock Holmes Approach to Cybersecurity: Uncovering the Impossible Through Exposure Validation

Exposure Validation: A Strategic Imperative for Cybersecurity In the realm of cybersecurity, exposure validation has emerged as a critical practice akin to the deductive methods of Sherlock Holmes. Renowned for his ability to sift through irrelevant information to reveal hidden truths, Holmes famously noted, “When you have eliminated the impossible,…

Read MoreA Sherlock Holmes Approach to Cybersecurity: Uncovering the Impossible Through Exposure Validation

Attackers Can Exploit Firewalls and Middleboxes for Enhanced DDoS Attacks

Cybersecurity Researchers Uncover New TCP-Based DDoS Attack Vector Recent findings from a collaborative team of academics at the University of Maryland and the University of Colorado Boulder have raised alarm bells regarding potential vulnerabilities in the Transmission Control Protocol (TCP), specifically through the exploitation of non-compliant network middleboxes. These devices,…

Read MoreAttackers Can Exploit Firewalls and Middleboxes for Enhanced DDoS Attacks

Two Windows Vulnerabilities, Including a Zero-Day, Actively Exploited

Researchers have identified that two critical vulnerabilities in Windows operating systems are currently being exploited in widespread cyberattacks. One of these vulnerabilities is a zero-day flaw that has remained active since 2017, while the second is a significant bug that Microsoft has struggled to patch effectively. The zero-day vulnerability was…

Read MoreTwo Windows Vulnerabilities, Including a Zero-Day, Actively Exploited

19-Year-Old Arrested for Using Leaked Optus Data in SMS Scam

Data Breach-Related Scam Leads to Arrest in Australia The Australian Federal Police (AFP) have apprehended a 19-year-old male resident of Sydney in connection with a blackmail scheme that allegedly exploits personal data leaked during the recent Optus data breach. This incident highlights a concerning trend of cybercriminals leveraging compromised data…

Read More19-Year-Old Arrested for Using Leaked Optus Data in SMS Scam

Denmark Shelves Chat Control Proposal Amid Backlash

Data Privacy, Data Security, Endpoint Security Denmark Withdraws Proposal for Client-Side Scanning Amid Controversy Akshaya Asokan (asokan_akshaya) • October 31, 2025 Image: Petr Svoboda/Shutterstock In a significant development, Denmark has withdrawn a contentious proposal that aimed to mandate online service providers to scan user communications and files for child sexual…

Read MoreDenmark Shelves Chat Control Proposal Amid Backlash

Proton’s Latest Observatory Uncovers Over 100 Billion Compromised Records — What You Should Know

Proton Launches Data Breach Observatory to Counter Online Threats In a robust extension of its commitment to safeguard privacy, Swiss privacy advocate Proton has introduced the Data Breach Observatory, a cutting-edge initiative designed to monitor and report data leaks actively. This innovative tool is engineered to scan dark web marketplaces…

Read MoreProton’s Latest Observatory Uncovers Over 100 Billion Compromised Records — What You Should Know

Researchers Identify Flaws in Open-Source AI and ML Models

A recent disclosure has revealed over thirty security vulnerabilities in various open-source artificial intelligence (AI) and machine learning (ML) models, some of which pose severe risks, including remote code execution and data theft. These vulnerabilities, reported through Protect AI’s Huntr bug bounty platform, affect tools such as ChuanhuChatGPT, Lunary, and…

Read MoreResearchers Identify Flaws in Open-Source AI and ML Models

ShadowPad Malware is Gaining Popularity Among Chinese Espionage Groups

In recent developments, the notorious ShadowPad malware has continued to be utilized by various Chinese cyber threat groups since its emergence in 2017. This Windows backdoor allows attackers to deploy additional malicious modules or exfiltrate sensitive information, raising serious concerns among cybersecurity professionals. SentinelOne researchers Yi-Jhen Hsieh and Joey Chen…

Read MoreShadowPad Malware is Gaining Popularity Among Chinese Espionage Groups