The Breach News

Cybercriminals Can Breach Your Network Simply by Sending a Fax

Recent research has unveiled alarming vulnerabilities concerning fax machines that could be exploited by remote attackers using nothing more than a fax number. Check Point researchers have pinpointed two critical remote code execution (RCE) vulnerabilities embedded within the communication protocols of millions of fax machines worldwide. Contrary to the perception…

Read MoreCybercriminals Can Breach Your Network Simply by Sending a Fax

Mastang Panda Exploits Venezuela News to Distribute LOTUSLITE Malware

Researchers at the Acronis Threat Research Unit (TRU) have uncovered a troubling trend where hackers are exploiting current news headlines to target U.S. government entities. Eschewing complex exploits, these cybercriminals utilize a more straightforward method: leveraging public curiosity about current events. In a report by Ilia Dafchev and Subhajeet Singha,…

Read MoreMastang Panda Exploits Venezuela News to Distribute LOTUSLITE Malware

Will CIOs Face Accountability?

3rd Party Risk Management, Artificial Intelligence & Machine Learning, Governance & Risk Management Rising Trend of Third-Party Breaches Affects AI Suppliers Rahul Neel Mani (@rneelmani) • January 13, 2026 Image: Pixabay The recent breach affecting Korean Air, which compromised sensitive data belonging to thousands of employees, was initially dismissed as…

Read MoreWill CIOs Face Accountability?

Hundreds of Citrix NetScaler ADC and Gateway Servers Compromised in Major Cyber Attack

Recent reports indicate that numerous Citrix NetScaler ADC and Gateway servers have suffered breaches orchestrated by cybercriminals deploying web shells. This information comes from the Shadowserver Foundation, which highlights a worrying trend in cybersecurity threats. The attacks exploit CVE-2023-3519, a severe code injection vulnerability that can facilitate unauthenticated remote code…

Read MoreHundreds of Citrix NetScaler ADC and Gateway Servers Compromised in Major Cyber Attack

Ex-Microsoft Engineer Sentenced to Prison for Involvement in Reveton Ransomware Scheme

A former Microsoft network engineer, Raymond Odigie Uadiale, recently received an 18-month prison sentence for his role in a money laundering operation tied to the Reveton ransomware. Uadiale had pleaded guilty earlier this year, highlighting the ongoing issue of cybersecurity threats and the criminal exploitation of digital platforms. Reveton, a…

Read MoreEx-Microsoft Engineer Sentenced to Prison for Involvement in Reveton Ransomware Scheme

Caution: Linux Mint Website Compromised; ISOs Substituted with Backdoored OS

Cybersecurity Incident: Linux Mint Users Exposed to Malicious ISO Download On February 20, a significant cybersecurity incident occurred involving the popular Linux Mint operating system, specifically its 17.3 Cinnamon edition. An unknown hacker or group of individuals successfully infiltrated the Linux Mint website, compromising the integrity of the download links…

Read MoreCaution: Linux Mint Website Compromised; ISOs Substituted with Backdoored OS

The Distinction Between Accountability and Taking Ownership

Navigating Influence Without Authority in Cybersecurity In the realm of cybersecurity, a frequent tension exists between those who possess technical expertise and those who wield authority within organizations. More often than not, the most influential figures in making cybersecurity decisions are business owners rather than the technical experts directly involved…

Read MoreThe Distinction Between Accountability and Taking Ownership