The Breach News

IntelBroker Publishes Data on Cisco Breach from Cloud Instance

In recent developments within the cybersecurity landscape, the Serbian hacker group, IntelBroker, has made headlines for its audacious breaches of major corporations, including Apple Inc., Facebook Marketplace, AMD, and Zscaler. They have recently claimed to have compromised Cisco’s infrastructure, reportedly releasing around 2.9 GB of data purporting to originate from…

Read MoreIntelBroker Publishes Data on Cisco Breach from Cloud Instance

Sonar Enhances Code Security for Third Parties with Tidelift Acquisition

Third-Party Risk Management, Governance & Risk Management Sonar Targets Open-Source Library Risks, Enhancing DevSecOps Michael Novinson (@MichaelNovinson) • December 17, 2024 Harry Wang, Vice President of Growth and New Ventures at Sonar (Image: Sonar) Sonar, a Geneva-based code security provider, has announced its intention to acquire Tidelift, a startup with…

Read MoreSonar Enhances Code Security for Third Parties with Tidelift Acquisition

Regional Care Data Breach Affects 225,000 Individuals – SecurityWeek

Data Breach at Regional Care Affects 225,000 Individuals Source: SecurityWeek A significant data breach has occurred at Regional Care, impacting approximately 225,000 individuals. The breach has raised alarms regarding the security of sensitive personal information contained within the healthcare sector, highlighting persistent vulnerabilities in data protection mechanisms. This incident underscores…

Read MoreRegional Care Data Breach Affects 225,000 Individuals – SecurityWeek

Androxgh0st Botnet Aims at IoT Devices by Exploiting 27 Security Flaws

KEY POINTS The Androxgh0st botnet has made significant advancements in its operations, now exploiting a total of 27 vulnerabilities that impact web servers, Internet of Things (IoT) devices, and various technologies, including prominent platforms like Cisco ASA, Atlassian JIRA, and TP-Link routers. This development underscores the urgency for cyber defense…

Read MoreAndroxgh0st Botnet Aims at IoT Devices by Exploiting 27 Security Flaws

Ransomware Assaults Target Texas University and Namibia Telecom

Interlock Ransomware Attacks Texas Tech University Health Sciences Center A lesser-known ransomware group, Interlock, has launched a significant cyberattack against the Texas Tech University Health Sciences Center, jeopardizing the personal data of nearly 1.46 million patients. This group claims to have breached the university’s network in September 2024, exfiltrating over…

Read MoreRansomware Assaults Target Texas University and Namibia Telecom

Vulnerable Cleo Managed File Transfer Software Without Updates

Attack Surface Management, Governance & Risk Management, Patch Management Over 200 Vulnerable Servers Targeted by Ransomware Group Amid Growing Exploits Mathew J. Schwartz (euroinfosec) • December 18, 2024 Recent reports indicate over 200 Cleo managed file-transfer servers remain publicly accessible and without necessary updates, posing significant risks in light of…

Read MoreVulnerable Cleo Managed File Transfer Software Without Updates

Meta Faces $263 Million Fine in Europe Due to 2018 Data Breach

GDPR Compliance: A Governance Imperative for Modern Businesses As the landscape of data privacy continues to evolve, the importance of compliance with the General Data Protection Regulation (GDPR) has reached an urgency unprecedented in the business world. Thomas George, president of Cybermedia Research, emphasizes that companies, as legal entities, are…

Read MoreMeta Faces $263 Million Fine in Europe Due to 2018 Data Breach

Strategies for Mitigating Cyber Threats in the Chemical Industry

The chemical industry is integral to the global economy, supplying essential materials spanning pharmaceuticals and agriculture. However, with technological advancements come heightened risks to digital infrastructures. The sector is increasingly vulnerable to various cyber threats like ransomware, data breaches, and industrial espionage, which can precipitate dire outcomes, from production halts…

Read MoreStrategies for Mitigating Cyber Threats in the Chemical Industry