The Breach News

SolarWinds Hackers Compromise Microsoft Customer Support to Target Clients

In a recent development reflecting the persistent threat posed by Russian cyber actors, Microsoft has disclosed that the hackers behind the SolarWinds breach have resumed operations utilizing password spraying and brute-force methods to compromise customer accounts. This resurgence serves as a stark reminder that the attackers remain active and adept…

Read MoreSolarWinds Hackers Compromise Microsoft Customer Support to Target Clients

Analysis of 5 AI-Generated Malware Families by Google Reveals They Are Ineffective and Easily Detected

Recent assessments challenge the prevalent narratives promoted by certain AI firms claiming that AI-generated malware is a prevalent, imminent threat to traditional security measures. These companies, many of which are vying for new investment funding, paint a dramatic picture of a new era shaped by AI-driven malicious activities. A case…

Read MoreAnalysis of 5 AI-Generated Malware Families by Google Reveals They Are Ineffective and Easily Detected

Block Confirms Data Breach Linked to Former Employee’s Access to Cash App Data

Data Breach at Block’s Cash App: Former Employee Improperly Accessed Customer Information Block, the parent company of Cash App, has reported a significant data breach involving a former employee who unlawfully accessed sensitive reports related to Cash App Investing. This incident, which has raised concerns regarding data security, particularly involves…

Read MoreBlock Confirms Data Breach Linked to Former Employee’s Access to Cash App Data

DHS Urges Use of Immigration Database for Voter Verification

Data Governance, Data Privacy, Data Security DHS Expands SAVE Database for Voter Verification, Sparking Privacy Concerns Chris Riotta (@chrisriotta) • November 5, 2025 Image: VL-PhotoPro/Shutterstock The Department of Homeland Security (DHS) has announced plans to extend the use of its Systematic Alien Verification for Entitlements (SAVE) database for voter verification,…

Read MoreDHS Urges Use of Immigration Database for Voter Verification

Investigation Reveals KT’s Concealment of Malware Infections and Security Lapses Behind Hacking Breach

Seoul: Cybersecurity Gaps Exposed at KT Corp. Following Malware Incident In a troubling development, KT Corp., South Korea’s second-largest mobile operator, has been implicated in a significant cybersecurity breach involving the concealment of malware infections. An investigation led by government authorities uncovered that the company failed to disclose critical security…

Read MoreInvestigation Reveals KT’s Concealment of Malware Infections and Security Lapses Behind Hacking Breach

5 Steps to Enhance Detection and Response in a Multi-Layered Cloud Environment

The connection between detection and response (DR) practices and cloud security has historically been tenuous. As businesses worldwide increasingly transition to cloud-based environments, security strategies have predominantly centered on “shift-left” methodologies—prioritizing secure code, maintaining proper cloud configurations, and rectifying misconfigurations. This focus has inadvertently fostered a dependence on a broad…

Read More5 Steps to Enhance Detection and Response in a Multi-Layered Cloud Environment

[Webinar] The Expanding Web of Ransomware: Insights into Cyber Attack Groups

In today’s rapidly evolving cybersecurity landscape, organizations face a multitude of threats that range from phishing attacks to sophisticated ransomware strategies. The constant evolution of these threats means that cybersecurity teams must remain vigilant, as adversarial groups relentlessly refine their methods to breach systems. Currently, numerous hacking groups are dedicated…

Read More[Webinar] The Expanding Web of Ransomware: Insights into Cyber Attack Groups

Social Media Overrun by Scam Ads: Ex-Meta Employees Unveil a Solution

Meta’s Battle Against Scam Ads: Insights from Former Executive In 2019, billionaire Dutch television producer John de Mol initiated legal action against Facebook, alleging the platform’s negligence in preventing scammers from misusing his likeness in fraudulent advertisements. In response, Facebook dispatched Rob Leathern to Amsterdam to engage with de Mol’s…

Read MoreSocial Media Overrun by Scam Ads: Ex-Meta Employees Unveil a Solution

GitHub Reports Hackers Compromised Multiple Organizations Through Stolen OAuth Access Tokens

GitHub Exposes OAuth Token Exploit Used by Malicious Actor On Friday, GitHub, the prominent cloud-based repository hosting service, announced a breach involving the exploitation of stolen OAuth user tokens by an unidentified adversary. These tokens were allegedly used to illegitimately access and download sensitive data from multiple organizations. Mike Hanley,…

Read MoreGitHub Reports Hackers Compromised Multiple Organizations Through Stolen OAuth Access Tokens