The Breach News

SonicWall Releases Critical Patches for Vulnerability in SMA 100 Series Devices

On September 25, 2021, SonicWall, a network security firm, addressed a serious security vulnerability identified in its Secure Mobile Access (SMA) 100 series appliances. This flaw allows remote, unauthorized attackers to gain administrative access to the affected devices. Designated as CVE-2021-20034, the issue involves arbitrary file deletion and has a critical CVSS score of 9.1 out of 10. Exploiting this vulnerability could enable an adversary to bypass path traversal checks, leading to deletion of files and a reset of the device to factory settings. SonicWall indicated that the vulnerability stems from inadequate file path restrictions, potentially allowing arbitrary file deletions. Fortunately, the company noted that there are currently no signs of exploitation in the wild. SonicWall also acknowledged Wenxu Yin of Alpha Lab, Qihoo 360, for reporting this security concern, which affects the SMA 100 Series, including models like SMA 200 and SMA 210.

SonicWall Responds to Critical Security Flaw in SMA 100 Series Devices On September 25, 2021, SonicWall, a prominent player in the network security landscape, announced that it has issued patches addressing a significant security vulnerability affecting its Secure Mobile Access (SMA) 100 series devices. This flaw, identified as CVE-2021-20034, allows…

Read More

SonicWall Releases Critical Patches for Vulnerability in SMA 100 Series Devices

On September 25, 2021, SonicWall, a network security firm, addressed a serious security vulnerability identified in its Secure Mobile Access (SMA) 100 series appliances. This flaw allows remote, unauthorized attackers to gain administrative access to the affected devices. Designated as CVE-2021-20034, the issue involves arbitrary file deletion and has a critical CVSS score of 9.1 out of 10. Exploiting this vulnerability could enable an adversary to bypass path traversal checks, leading to deletion of files and a reset of the device to factory settings. SonicWall indicated that the vulnerability stems from inadequate file path restrictions, potentially allowing arbitrary file deletions. Fortunately, the company noted that there are currently no signs of exploitation in the wild. SonicWall also acknowledged Wenxu Yin of Alpha Lab, Qihoo 360, for reporting this security concern, which affects the SMA 100 Series, including models like SMA 200 and SMA 210.

British Minister’s Son Charged in Hacking of US Army and NASA Systems

On October 30, 2013, 28-year-old Lauri Love, the son of a British Baptist minister, faced charges for allegedly hacking into the computer systems of the US Army, NASA, and other federal agencies. Arrested at his home in Stradishall, England by the National Crime Agency, Love, along with unnamed co-conspirators, is accused of breaching thousands of computer systems from October 2012 to October 2013. The indictment does not claim that Love sought financial gain from the information accessed. His father, Alexander Love, 60, serves as a chaplain at HMP Highpoint North, while his mother, Sirkka-Liisa Love, 59, is a teacher at the same facility. Love stands charged with unauthorized access to a U.S. government computer and conspiracy to disrupt federal operations, reportedly leading to the theft of data belonging to over 5,000 individuals.

British Baptist Minister’s Son Charged with Hacking U.S. Military and NASA Systems Published October 30, 2013 A 28-year-old British man, Lauri Love, has been charged with unauthorized access to computer systems belonging to the U.S. Army, NASA, and other federal agencies. The arrest took place on Friday at Love’s residence…

Read More

British Minister’s Son Charged in Hacking of US Army and NASA Systems

On October 30, 2013, 28-year-old Lauri Love, the son of a British Baptist minister, faced charges for allegedly hacking into the computer systems of the US Army, NASA, and other federal agencies. Arrested at his home in Stradishall, England by the National Crime Agency, Love, along with unnamed co-conspirators, is accused of breaching thousands of computer systems from October 2012 to October 2013. The indictment does not claim that Love sought financial gain from the information accessed. His father, Alexander Love, 60, serves as a chaplain at HMP Highpoint North, while his mother, Sirkka-Liisa Love, 59, is a teacher at the same facility. Love stands charged with unauthorized access to a U.S. government computer and conspiracy to disrupt federal operations, reportedly leading to the theft of data belonging to over 5,000 individuals.

Anthropic’s Mythos Will Spark a Cybersecurity Reckoning—But Not How You Expect

Anthropic Launches Claude Mythos Preview: A New Development in Cybersecurity Risks This week, Anthropic unveiled its Claude Mythos Preview model, heralded as a significant milestone in the evolution of cybersecurity. The company asserts that this new technology poses an unprecedented existential threat to current software defense mechanisms, sparking debates about…

Read MoreAnthropic’s Mythos Will Spark a Cybersecurity Reckoning—But Not How You Expect

How Top CISOs Secure Budget Approval

As budget season approaches, security often faces scrutiny and can become a lower priority. If you’re a CISO or security leader, you probably find yourself justifying the need for your programs, tools, or additional team members, emphasizing that the next security breach is just one oversight away. However, these arguments can falter unless articulated in a way that resonates with the board. According to Gartner, 88% of boards view cybersecurity as a business risk rather than just an IT concern, yet many security leaders still face challenges in elevating the importance of cybersecurity within their organizations. To make security issues resonate with the board, it’s crucial to communicate in terms of business continuity, compliance, and financial implications. Here are a few strategies to help you reframe the conversation, simplifying the technical complexities into clear business objectives.

Acknowledge the Serious Risks

Cyber threats are continually evolving, ranging from ransomware to supply chain attacks, and…

How Leading CISOs Secure Budget Approval for Cybersecurity Initiatives As budget season approaches, cybersecurity often becomes a focal point of scrutiny. For Chief Information Security Officers (CISOs) and security leaders, articulating the significance of their programs, essential tools, and necessary personnel can feel challenging, especially when the conversation strays into…

Read More

How Top CISOs Secure Budget Approval

As budget season approaches, security often faces scrutiny and can become a lower priority. If you’re a CISO or security leader, you probably find yourself justifying the need for your programs, tools, or additional team members, emphasizing that the next security breach is just one oversight away. However, these arguments can falter unless articulated in a way that resonates with the board. According to Gartner, 88% of boards view cybersecurity as a business risk rather than just an IT concern, yet many security leaders still face challenges in elevating the importance of cybersecurity within their organizations. To make security issues resonate with the board, it’s crucial to communicate in terms of business continuity, compliance, and financial implications. Here are a few strategies to help you reframe the conversation, simplifying the technical complexities into clear business objectives.

Acknowledge the Serious Risks

Cyber threats are continually evolving, ranging from ransomware to supply chain attacks, and…

Critical Chrome Update Released to Fix Actively Exploited Zero-Day Flaw

On September 25, 2021, Google issued an urgent security patch for its Chrome web browser to address a vulnerability that is currently being exploited. Identified as CVE-2021-37973, the issue is categorized as a “use after free” flaw within the Portals API, a system that facilitates seamless navigation between web pages. Clément Lecigne from Google’s Threat Analysis Group reported the vulnerability. While detailed information about the flaw has not been shared to protect users, Google confirmed that an exploit for CVE-2021-37973 is known to be in use. This update comes shortly after Apple patched a related exploit affecting older versions of iOS and macOS (CVE-2021-30869).

Urgent Chrome Update Released to Address Actively Exploited Zero-Day Vulnerability On September 25, 2021, Google released an urgent security update for its Chrome web browser to rectify a critical flaw that has been actively exploited in the wild. Identified as CVE-2021-37973, this vulnerability is categorized as a “use after free”…

Read More

Critical Chrome Update Released to Fix Actively Exploited Zero-Day Flaw

On September 25, 2021, Google issued an urgent security patch for its Chrome web browser to address a vulnerability that is currently being exploited. Identified as CVE-2021-37973, the issue is categorized as a “use after free” flaw within the Portals API, a system that facilitates seamless navigation between web pages. Clément Lecigne from Google’s Threat Analysis Group reported the vulnerability. While detailed information about the flaw has not been shared to protect users, Google confirmed that an exploit for CVE-2021-37973 is known to be in use. This update comes shortly after Apple patched a related exploit affecting older versions of iOS and macOS (CVE-2021-30869).

Finland’s Foreign Ministry Networks Compromised in Sophisticated Malware Attack

November 1, 2013

Finnish broadcaster MTV3 reports that the Ministry of Foreign Affairs of Finland has been the target of a prolonged cyber espionage operation lasting four years. The country’s foreign minister confirmed a significant hacking incident within the ministry’s data network. The attack involved advanced malware, reportedly more sophisticated than the notorious Red October, aimed at intercepting communications between Finland and the European Union. Discovery of the breach occurred earlier this year, following a foreign notification to CERT-FI, rather than through Finnish investigative efforts. Authorities have kept the details confidential while continuing forensic analysis, revealing that low-level classified information may have been compromised. In January 2013, previous reporting covered the Red October cyber-espionage operation, which affected various entities.

Finland’s Ministry of Foreign Affairs Targeted in Prolonged Malware Attack In a significant cybersecurity incident, the Finnish Ministry of Foreign Affairs has fallen victim to a sophisticated malware intrusion, part of an extensive four-year cyber espionage campaign. Reports from Finnish commercial broadcaster MTV3 indicate that the breach, which involved the…

Read More

Finland’s Foreign Ministry Networks Compromised in Sophisticated Malware Attack

November 1, 2013

Finnish broadcaster MTV3 reports that the Ministry of Foreign Affairs of Finland has been the target of a prolonged cyber espionage operation lasting four years. The country’s foreign minister confirmed a significant hacking incident within the ministry’s data network. The attack involved advanced malware, reportedly more sophisticated than the notorious Red October, aimed at intercepting communications between Finland and the European Union. Discovery of the breach occurred earlier this year, following a foreign notification to CERT-FI, rather than through Finnish investigative efforts. Authorities have kept the details confidential while continuing forensic analysis, revealing that low-level classified information may have been compromised. In January 2013, previous reporting covered the Red October cyber-espionage operation, which affected various entities.

[Webinar] The Rapid Rise of Shadow AI Agents: Strategies for Detection and Control

Join us on September 9, 2025
Artificial Intelligence / Threat Detection

⚠️ Just a single click can trigger a chain reaction. An engineer launches an “experimental” AI agent for a workflow test. A business team connects to streamline reporting. A cloud provider quietly activates a new agent behind the scenes. Individually, these actions may seem innocuous, but collectively they create an unseen network of Shadow AI Agents—operating beyond the reach of security measures and linked to unknown identities.

The harsh reality is that each of these agents poses significant risks:

  • Impersonation of legitimate users
  • Unauthorized non-human identities with access rights
  • Data breaches across supposedly secure boundaries

This is not a distant concern; it’s an urgent issue impacting enterprises globally, and they’re proliferating faster than governance can address. Don’t miss our upcoming discussion: Shadow AI Agents Uncovered. Secure your spot today—[Register Here].

Explore Why Shadow AI is Growing Rapidly
From identity providers to PaaS platforms, it’s alarmingly easy to create…

Webinar Announcement: Understanding the Risks Posed by Shadow AI Agents In the rapidly evolving landscape of artificial intelligence, a concerning trend is emerging: the proliferation of Shadow AI Agents. These agents, easily deployed by engineers or business units, can quietly operate within an organization, evading detection by security protocols. Despite…

Read More

[Webinar] The Rapid Rise of Shadow AI Agents: Strategies for Detection and Control

Join us on September 9, 2025
Artificial Intelligence / Threat Detection

⚠️ Just a single click can trigger a chain reaction. An engineer launches an “experimental” AI agent for a workflow test. A business team connects to streamline reporting. A cloud provider quietly activates a new agent behind the scenes. Individually, these actions may seem innocuous, but collectively they create an unseen network of Shadow AI Agents—operating beyond the reach of security measures and linked to unknown identities.

The harsh reality is that each of these agents poses significant risks:

  • Impersonation of legitimate users
  • Unauthorized non-human identities with access rights
  • Data breaches across supposedly secure boundaries

This is not a distant concern; it’s an urgent issue impacting enterprises globally, and they’re proliferating faster than governance can address. Don’t miss our upcoming discussion: Shadow AI Agents Uncovered. Secure your spot today—[Register Here].

Explore Why Shadow AI is Growing Rapidly
From identity providers to PaaS platforms, it’s alarmingly easy to create…

Urgent: Update Google Chrome Now to Fix 2 New Actively Exploited Zero-Day Vulnerabilities

On October 1, 2021, Google released critical security updates for its Chrome browser, addressing two newly discovered vulnerabilities currently being exploited. These mark the fourth and fifth zero-day flaws resolved this month. The vulnerabilities, identified as CVE-2021-37975 and CVE-2021-37976, relate to a use-after-free issue in the V8 JavaScript and WebAssembly engine, as well as an information leak in the core. As is standard practice, Google has withheld specific details about the attacks to ensure that users can quickly install the necessary updates. However, the company confirmed that “exploits for CVE-2021-37975 and CVE-2021-37976 exist in the wild.” CVE-2021-37975 was reported by an anonymous researcher, while CVE-2021-37976 was identified by Clément Lecigne from Google’s Threat Analysis Group.

Update Your Google Chrome Browser Immediately to Address Two New Actively Exploited Zero-Day Vulnerabilities On October 1, 2021, Google announced the release of critical security updates for its Chrome web browser, responding to two newly identified vulnerabilities that are presently being exploited by malicious actors. These vulnerabilities mark the fourth…

Read More

Urgent: Update Google Chrome Now to Fix 2 New Actively Exploited Zero-Day Vulnerabilities

On October 1, 2021, Google released critical security updates for its Chrome browser, addressing two newly discovered vulnerabilities currently being exploited. These mark the fourth and fifth zero-day flaws resolved this month. The vulnerabilities, identified as CVE-2021-37975 and CVE-2021-37976, relate to a use-after-free issue in the V8 JavaScript and WebAssembly engine, as well as an information leak in the core. As is standard practice, Google has withheld specific details about the attacks to ensure that users can quickly install the necessary updates. However, the company confirmed that “exploits for CVE-2021-37975 and CVE-2021-37976 exist in the wild.” CVE-2021-37975 was reported by an anonymous researcher, while CVE-2021-37976 was identified by Clément Lecigne from Google’s Threat Analysis Group.