The Breach News

Malicious Go Package Takes Advantage of Module Mirror Caching for Ongoing Remote Access

Recent findings by cybersecurity researchers have unveiled a software supply chain attack that specifically targets the Go programming ecosystem. This operation involves a harmful package engineered to provide adversaries with remote access to compromised systems. The malicious package, identified as github.com/boltdb-go/bolt, is a deceptive imitation of the legitimate BoltDB database…

Read MoreMalicious Go Package Takes Advantage of Module Mirror Caching for Ongoing Remote Access

Russian Hackers Focusing on Diplomatic Targets Across Europe, the Americas, and Asia

A series of sophisticated phishing campaigns targeting diplomatic and governmental organizations has been linked to a Russian-state sponsored hacking group known as APT29, or Cozy Bear. This threat actor has been active since January 17, 2022, employing a range of techniques that highlight their ongoing interest in gathering sensitive diplomatic…

Read MoreRussian Hackers Focusing on Diplomatic Targets Across Europe, the Americas, and Asia

Google’s New AI Ransomware Defense: Effective, but Limited

Ransomware attacks have increasingly become a pressing digital threat as their sophistication grows, extending beyond traditional data-encrypting malware to include data grab-and-leak tactics. While the conventional form of ransomware that encrypts data and demands a ransom remains prevalent, Google has recently introduced a new defense mechanism for its Drive for…

Read MoreGoogle’s New AI Ransomware Defense: Effective, but Limited

North Korean IT Workers in Western Companies Now Seeking Ransom for Stolen Data

Recent intelligence reveals that North Korean IT professionals are infiltrating Western companies under false pretenses, not only stealing sensitive intellectual property but also extorting their employers for ransom to prevent data exposure. This notable shift signifies an escalation in the tactics used by these actors, moving beyond conventional data breaches…

Read MoreNorth Korean IT Workers in Western Companies Now Seeking Ransom for Stolen Data

When Individual Goals Compromise Organizational Security

A recent study published in the International Journal of Services, Economics and Management has revealed that professional aspirations often take precedence over security concerns in cloud usage and management decisions. The research, which surveyed 125 cloud users, found that motivations related to career advancement—such as gaining cloud expertise to enhance…

Read MoreWhen Individual Goals Compromise Organizational Security

CISA Includes Four Actively Exploited Vulnerabilities in KEV Catalog, Advises Remediation by February 25

On Tuesday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced the addition of four critical security vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. This move was prompted by clear evidence indicating that these vulnerabilities are currently being exploited in active attacks. The vulnerabilities identified are significant and warrant…

Read MoreCISA Includes Four Actively Exploited Vulnerabilities in KEV Catalog, Advises Remediation by February 25

“Override Panda” Hacking Group Emerges Again with New Espionage Operations

In recent weeks, the Chinese state-sponsored hacking group known as Override Panda has made headlines again, launching a sophisticated phishing campaign aimed at acquiring sensitive information. This resurgence focuses on utilizing spear-phishing tactics to compromise targeted entities. According to a report by Cluster25, this threat actor leveraged a spear-phishing email…

Read More“Override Panda” Hacking Group Emerges Again with New Espionage Operations