The Breach News

ShinyHunters Alleges Snowflake Breach at Rockstar Games Using Anodot

Rockstar Games Faces Potential Data Leak Threat from ShinyHunters Group Rockstar Games has recently been thrust into the headlines not due to ongoing discussions surrounding the much-anticipated Grand Theft Auto VI, but because the ShinyHunters hacking group has claimed to infiltrate the company’s Snowflake environment. The group alleges that a…

Read MoreShinyHunters Alleges Snowflake Breach at Rockstar Games Using Anodot

Compromise of GitHub Account Triggers Salesloft Drift Breach Affecting 22 Companies

Sep 08, 2025
Supply Chain Attack / API Security

Salesloft has announced that the breach associated with its Drift application originated from a compromised GitHub account. An investigation by Google-owned Mandiant revealed that the threat actor, identified as UNC6395, accessed the Salesloft GitHub account over a span of three months, from March to June 2025. The method of access to the GitHub account remains unknown. Currently, 22 companies have reported being impacted by this supply chain breach. According to Salesloft’s advisory, the attackers leveraged this access to download content from various repositories, add a guest user, and establish workflows. The investigation also revealed that reconnaissance activities were taking place within the Salesloft and Drift application environments during the same time frame. However, it noted that there is no indication of any actions beyond these limited reconnaissance efforts. In the subsequent phase, the attackers gained access to Drift’s Amazon Web Services (AWS)…

GitHub Account Compromise Leads to Data Breach at Salesloft, Impacting 22 Companies In a development that underscores the vulnerabilities in software supply chains, Salesloft has disclosed that a significant data breach associated with its Drift application originated from the compromise of its GitHub account. This incident was investigated by Mandiant,…

Read More

Compromise of GitHub Account Triggers Salesloft Drift Breach Affecting 22 Companies

Sep 08, 2025
Supply Chain Attack / API Security

Salesloft has announced that the breach associated with its Drift application originated from a compromised GitHub account. An investigation by Google-owned Mandiant revealed that the threat actor, identified as UNC6395, accessed the Salesloft GitHub account over a span of three months, from March to June 2025. The method of access to the GitHub account remains unknown. Currently, 22 companies have reported being impacted by this supply chain breach. According to Salesloft’s advisory, the attackers leveraged this access to download content from various repositories, add a guest user, and establish workflows. The investigation also revealed that reconnaissance activities were taking place within the Salesloft and Drift application environments during the same time frame. However, it noted that there is no indication of any actions beyond these limited reconnaissance efforts. In the subsequent phase, the attackers gained access to Drift’s Amazon Web Services (AWS)…

SonicWall Releases Critical Patches for Vulnerability in SMA 100 Series Devices

On September 25, 2021, SonicWall, a network security firm, addressed a serious security vulnerability identified in its Secure Mobile Access (SMA) 100 series appliances. This flaw allows remote, unauthorized attackers to gain administrative access to the affected devices. Designated as CVE-2021-20034, the issue involves arbitrary file deletion and has a critical CVSS score of 9.1 out of 10. Exploiting this vulnerability could enable an adversary to bypass path traversal checks, leading to deletion of files and a reset of the device to factory settings. SonicWall indicated that the vulnerability stems from inadequate file path restrictions, potentially allowing arbitrary file deletions. Fortunately, the company noted that there are currently no signs of exploitation in the wild. SonicWall also acknowledged Wenxu Yin of Alpha Lab, Qihoo 360, for reporting this security concern, which affects the SMA 100 Series, including models like SMA 200 and SMA 210.

SonicWall Responds to Critical Security Flaw in SMA 100 Series Devices On September 25, 2021, SonicWall, a prominent player in the network security landscape, announced that it has issued patches addressing a significant security vulnerability affecting its Secure Mobile Access (SMA) 100 series devices. This flaw, identified as CVE-2021-20034, allows…

Read More

SonicWall Releases Critical Patches for Vulnerability in SMA 100 Series Devices

On September 25, 2021, SonicWall, a network security firm, addressed a serious security vulnerability identified in its Secure Mobile Access (SMA) 100 series appliances. This flaw allows remote, unauthorized attackers to gain administrative access to the affected devices. Designated as CVE-2021-20034, the issue involves arbitrary file deletion and has a critical CVSS score of 9.1 out of 10. Exploiting this vulnerability could enable an adversary to bypass path traversal checks, leading to deletion of files and a reset of the device to factory settings. SonicWall indicated that the vulnerability stems from inadequate file path restrictions, potentially allowing arbitrary file deletions. Fortunately, the company noted that there are currently no signs of exploitation in the wild. SonicWall also acknowledged Wenxu Yin of Alpha Lab, Qihoo 360, for reporting this security concern, which affects the SMA 100 Series, including models like SMA 200 and SMA 210.

British Minister’s Son Charged in Hacking of US Army and NASA Systems

On October 30, 2013, 28-year-old Lauri Love, the son of a British Baptist minister, faced charges for allegedly hacking into the computer systems of the US Army, NASA, and other federal agencies. Arrested at his home in Stradishall, England by the National Crime Agency, Love, along with unnamed co-conspirators, is accused of breaching thousands of computer systems from October 2012 to October 2013. The indictment does not claim that Love sought financial gain from the information accessed. His father, Alexander Love, 60, serves as a chaplain at HMP Highpoint North, while his mother, Sirkka-Liisa Love, 59, is a teacher at the same facility. Love stands charged with unauthorized access to a U.S. government computer and conspiracy to disrupt federal operations, reportedly leading to the theft of data belonging to over 5,000 individuals.

British Baptist Minister’s Son Charged with Hacking U.S. Military and NASA Systems Published October 30, 2013 A 28-year-old British man, Lauri Love, has been charged with unauthorized access to computer systems belonging to the U.S. Army, NASA, and other federal agencies. The arrest took place on Friday at Love’s residence…

Read More

British Minister’s Son Charged in Hacking of US Army and NASA Systems

On October 30, 2013, 28-year-old Lauri Love, the son of a British Baptist minister, faced charges for allegedly hacking into the computer systems of the US Army, NASA, and other federal agencies. Arrested at his home in Stradishall, England by the National Crime Agency, Love, along with unnamed co-conspirators, is accused of breaching thousands of computer systems from October 2012 to October 2013. The indictment does not claim that Love sought financial gain from the information accessed. His father, Alexander Love, 60, serves as a chaplain at HMP Highpoint North, while his mother, Sirkka-Liisa Love, 59, is a teacher at the same facility. Love stands charged with unauthorized access to a U.S. government computer and conspiracy to disrupt federal operations, reportedly leading to the theft of data belonging to over 5,000 individuals.

Anthropic’s Mythos Will Spark a Cybersecurity Reckoning—But Not How You Expect

Anthropic Launches Claude Mythos Preview: A New Development in Cybersecurity Risks This week, Anthropic unveiled its Claude Mythos Preview model, heralded as a significant milestone in the evolution of cybersecurity. The company asserts that this new technology poses an unprecedented existential threat to current software defense mechanisms, sparking debates about…

Read MoreAnthropic’s Mythos Will Spark a Cybersecurity Reckoning—But Not How You Expect

How Top CISOs Secure Budget Approval

As budget season approaches, security often faces scrutiny and can become a lower priority. If you’re a CISO or security leader, you probably find yourself justifying the need for your programs, tools, or additional team members, emphasizing that the next security breach is just one oversight away. However, these arguments can falter unless articulated in a way that resonates with the board. According to Gartner, 88% of boards view cybersecurity as a business risk rather than just an IT concern, yet many security leaders still face challenges in elevating the importance of cybersecurity within their organizations. To make security issues resonate with the board, it’s crucial to communicate in terms of business continuity, compliance, and financial implications. Here are a few strategies to help you reframe the conversation, simplifying the technical complexities into clear business objectives.

Acknowledge the Serious Risks

Cyber threats are continually evolving, ranging from ransomware to supply chain attacks, and…

How Leading CISOs Secure Budget Approval for Cybersecurity Initiatives As budget season approaches, cybersecurity often becomes a focal point of scrutiny. For Chief Information Security Officers (CISOs) and security leaders, articulating the significance of their programs, essential tools, and necessary personnel can feel challenging, especially when the conversation strays into…

Read More

How Top CISOs Secure Budget Approval

As budget season approaches, security often faces scrutiny and can become a lower priority. If you’re a CISO or security leader, you probably find yourself justifying the need for your programs, tools, or additional team members, emphasizing that the next security breach is just one oversight away. However, these arguments can falter unless articulated in a way that resonates with the board. According to Gartner, 88% of boards view cybersecurity as a business risk rather than just an IT concern, yet many security leaders still face challenges in elevating the importance of cybersecurity within their organizations. To make security issues resonate with the board, it’s crucial to communicate in terms of business continuity, compliance, and financial implications. Here are a few strategies to help you reframe the conversation, simplifying the technical complexities into clear business objectives.

Acknowledge the Serious Risks

Cyber threats are continually evolving, ranging from ransomware to supply chain attacks, and…

Critical Chrome Update Released to Fix Actively Exploited Zero-Day Flaw

On September 25, 2021, Google issued an urgent security patch for its Chrome web browser to address a vulnerability that is currently being exploited. Identified as CVE-2021-37973, the issue is categorized as a “use after free” flaw within the Portals API, a system that facilitates seamless navigation between web pages. Clément Lecigne from Google’s Threat Analysis Group reported the vulnerability. While detailed information about the flaw has not been shared to protect users, Google confirmed that an exploit for CVE-2021-37973 is known to be in use. This update comes shortly after Apple patched a related exploit affecting older versions of iOS and macOS (CVE-2021-30869).

Urgent Chrome Update Released to Address Actively Exploited Zero-Day Vulnerability On September 25, 2021, Google released an urgent security update for its Chrome web browser to rectify a critical flaw that has been actively exploited in the wild. Identified as CVE-2021-37973, this vulnerability is categorized as a “use after free”…

Read More

Critical Chrome Update Released to Fix Actively Exploited Zero-Day Flaw

On September 25, 2021, Google issued an urgent security patch for its Chrome web browser to address a vulnerability that is currently being exploited. Identified as CVE-2021-37973, the issue is categorized as a “use after free” flaw within the Portals API, a system that facilitates seamless navigation between web pages. Clément Lecigne from Google’s Threat Analysis Group reported the vulnerability. While detailed information about the flaw has not been shared to protect users, Google confirmed that an exploit for CVE-2021-37973 is known to be in use. This update comes shortly after Apple patched a related exploit affecting older versions of iOS and macOS (CVE-2021-30869).

Finland’s Foreign Ministry Networks Compromised in Sophisticated Malware Attack

November 1, 2013

Finnish broadcaster MTV3 reports that the Ministry of Foreign Affairs of Finland has been the target of a prolonged cyber espionage operation lasting four years. The country’s foreign minister confirmed a significant hacking incident within the ministry’s data network. The attack involved advanced malware, reportedly more sophisticated than the notorious Red October, aimed at intercepting communications between Finland and the European Union. Discovery of the breach occurred earlier this year, following a foreign notification to CERT-FI, rather than through Finnish investigative efforts. Authorities have kept the details confidential while continuing forensic analysis, revealing that low-level classified information may have been compromised. In January 2013, previous reporting covered the Red October cyber-espionage operation, which affected various entities.

Finland’s Ministry of Foreign Affairs Targeted in Prolonged Malware Attack In a significant cybersecurity incident, the Finnish Ministry of Foreign Affairs has fallen victim to a sophisticated malware intrusion, part of an extensive four-year cyber espionage campaign. Reports from Finnish commercial broadcaster MTV3 indicate that the breach, which involved the…

Read More

Finland’s Foreign Ministry Networks Compromised in Sophisticated Malware Attack

November 1, 2013

Finnish broadcaster MTV3 reports that the Ministry of Foreign Affairs of Finland has been the target of a prolonged cyber espionage operation lasting four years. The country’s foreign minister confirmed a significant hacking incident within the ministry’s data network. The attack involved advanced malware, reportedly more sophisticated than the notorious Red October, aimed at intercepting communications between Finland and the European Union. Discovery of the breach occurred earlier this year, following a foreign notification to CERT-FI, rather than through Finnish investigative efforts. Authorities have kept the details confidential while continuing forensic analysis, revealing that low-level classified information may have been compromised. In January 2013, previous reporting covered the Red October cyber-espionage operation, which affected various entities.