The Breach News

Researchers Caution Against Privilege Escalation Threats in Google’s Vertex AI ML Platform

Recent cybersecurity findings have revealed two significant vulnerabilities within Google’s Vertex AI machine learning platform. These exploits could be leveraged by malicious entities to escalate user privileges and exfiltrate sensitive models directly from the cloud environment. According to an analysis released by researchers from Palo Alto Networks Unit 42, exploiting…

Read MoreResearchers Caution Against Privilege Escalation Threats in Google’s Vertex AI ML Platform

XE Hacker Group Leverages VeraCore Zero-Day to Install Persistent Web Shells

Cybersecurity Alert: Exploitation of VeraCore Vulnerabilities by XE Group Recent assessments have revealed that cybercriminals are taking advantage of several vulnerabilities within specific software applications, notably Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore. These exploits allow threat actors to deploy reverse shells and web shells, granting them persistent…

Read MoreXE Hacker Group Leverages VeraCore Zero-Day to Install Persistent Web Shells

Unresolved Travis CI API Vulnerability Reveals Thousands of Confidential User Access Tokens

A significant security vulnerability in the Travis CI API has put the user tokens of numerous developers at risk, potentially exposing them to severe cyber threats. This flaw enables malicious actors to compromise cloud infrastructures, perform unauthorized code modifications, and execute supply chain attacks. Recent research from cloud security experts…

Read MoreUnresolved Travis CI API Vulnerability Reveals Thousands of Confidential User Access Tokens

White Hat Hackers in an Era of Automation

Artificial Intelligence & Machine Learning, Governance & Risk Management, Next-Generation Technologies & Secure Development Pentesting Tools Reveal Vulnerabilities, Yet Demand Remains for White Hat Skills Brandy Harris • September 24, 2025 In the past, vulnerability management operated on a predictable schedule—quarterly scans, annual penetration tests, and slow remediation timelines. Ethical…

Read MoreWhite Hat Hackers in an Era of Automation

Medusa Ransomware Alleges Comcast Data Breach, Seeks $1.2 Million Ransom

The Medusa ransomware group has claimed responsibility for a significant ransomware attack targeting Comcast Corporation, a prominent global media and technology enterprise recognized for its broadband, television, and film services. According to evidence posted on the group’s dark web leak site, Medusa has exfiltrated approximately 834.4 gigabytes of data, demanding…

Read MoreMedusa Ransomware Alleges Comcast Data Breach, Seeks $1.2 Million Ransom

The Challenge of Permissions for Non-Human Entities: Understanding the Delays in Credential Remediation

Rising Threat of Secrets Sprawl: Key Findings from GitGuardian and CyberArk Research Recent research by GitGuardian and CyberArk highlights a concerning trend in the cybersecurity landscape, with 79% of IT decision-makers reporting experiences with secrets leaks—an increase from 75% the year prior. The data is alarming, revealing that over 12.7…

Read MoreThe Challenge of Permissions for Non-Human Entities: Understanding the Delays in Credential Remediation

Harrods Alerts Customers About Data Breach Impacting Personal Information – SecurityWeek

Harrods Alerts Customers to Personal Data Breach British luxury department store Harrods has alerted its clientele to a recent security breach that has compromised certain personal details. This incident highlights the ongoing risks that retailers and service providers face regarding data security, particularly in an age where personal information is…

Read MoreHarrods Alerts Customers About Data Breach Impacting Personal Information – SecurityWeek

Zimbra Unveils Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities

Critical Security Flaws Addressed by Zimbra in Collaboration Software Zimbra has announced essential software updates aimed at rectifying significant security vulnerabilities present in its Collaboration software. If exploited, these vulnerabilities could lead to unauthorized information disclosure under specific conditions, posing a serious risk to user data. One notable vulnerability, tracked…

Read MoreZimbra Unveils Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities