The Breach News

Chinese APT Phantom Taurus Targets MS Exchange Servers Over Three-Year Period

Researchers from Palo Alto Networks have uncovered a cyberespionage campaign linked to a group with ties to China, which has been actively targeting foreign ministries, embassies, and military communications through breaches of Microsoft Exchange email servers. Identified as Phantom Taurus, this group has been under surveillance for nearly three years.…

Read MoreChinese APT Phantom Taurus Targets MS Exchange Servers Over Three-Year Period

Malicious Go Package Takes Advantage of Module Mirror Caching for Ongoing Remote Access

Recent findings by cybersecurity researchers have unveiled a software supply chain attack that specifically targets the Go programming ecosystem. This operation involves a harmful package engineered to provide adversaries with remote access to compromised systems. The malicious package, identified as github.com/boltdb-go/bolt, is a deceptive imitation of the legitimate BoltDB database…

Read MoreMalicious Go Package Takes Advantage of Module Mirror Caching for Ongoing Remote Access

Russian Hackers Focusing on Diplomatic Targets Across Europe, the Americas, and Asia

A series of sophisticated phishing campaigns targeting diplomatic and governmental organizations has been linked to a Russian-state sponsored hacking group known as APT29, or Cozy Bear. This threat actor has been active since January 17, 2022, employing a range of techniques that highlight their ongoing interest in gathering sensitive diplomatic…

Read MoreRussian Hackers Focusing on Diplomatic Targets Across Europe, the Americas, and Asia

Google’s New AI Ransomware Defense: Effective, but Limited

Ransomware attacks have increasingly become a pressing digital threat as their sophistication grows, extending beyond traditional data-encrypting malware to include data grab-and-leak tactics. While the conventional form of ransomware that encrypts data and demands a ransom remains prevalent, Google has recently introduced a new defense mechanism for its Drive for…

Read MoreGoogle’s New AI Ransomware Defense: Effective, but Limited

North Korean IT Workers in Western Companies Now Seeking Ransom for Stolen Data

Recent intelligence reveals that North Korean IT professionals are infiltrating Western companies under false pretenses, not only stealing sensitive intellectual property but also extorting their employers for ransom to prevent data exposure. This notable shift signifies an escalation in the tactics used by these actors, moving beyond conventional data breaches…

Read MoreNorth Korean IT Workers in Western Companies Now Seeking Ransom for Stolen Data

When Individual Goals Compromise Organizational Security

A recent study published in the International Journal of Services, Economics and Management has revealed that professional aspirations often take precedence over security concerns in cloud usage and management decisions. The research, which surveyed 125 cloud users, found that motivations related to career advancement—such as gaining cloud expertise to enhance…

Read MoreWhen Individual Goals Compromise Organizational Security