The Breach News

Researchers Uncover ‘Deceptive Delight’ Technique for Bypassing AI Models

Cybersecurity Researchers Uncover New Jailbreak Technique for AI Models Recent findings by cybersecurity experts at Palo Alto Networks’ Unit 42 have revealed a novel adversarial approach known as “Deceptive Delight,” capable of bypassing the safety measures of large language models (LLMs) during interactive dialogues. By interspersing harmful instructions within benign…

Read MoreResearchers Uncover ‘Deceptive Delight’ Technique for Bypassing AI Models

Hackers Posed as Aerobics Instructors for Years to Target Aerospace Workers

Iranian Cyber Espionage Group Targets Aerospace Defense Sector with Social Engineering Tactics An Iranian cyber espionage group has been implicated in a sophisticated attack designed to plant malware on the systems of an employee at an aerospace defense contractor. This operation, which has transpired over several years, underscores the evolving…

Read MoreHackers Posed as Aerobics Instructors for Years to Target Aerospace Workers

Australia’s Scam Prevention Framework: The Burst Bubble

Fraud Management & Cybercrime, Fraud Risk Management Treasury Yet to Release Sector-Specific Controls and Reimbursement Mechanisms Suparna Goswami (gsuparna) • October 29, 2025 Image: Evanto Elements In a significant move earlier this year, Australia implemented a pioneering scam prevention law designed to position the nation as an unwelcoming environment for…

Read MoreAustralia’s Scam Prevention Framework: The Burst Bubble

A Call to Action for Australian Businesses

Recently, a headline regarding a cyber breach emerged, emphasizing that the exposure of personal information represents the “worst-case scenario” in such incidents. While breaches do raise significant public concern, the situation is more complex than this characterization suggests. This analysis does not zero in on any single incident; rather, it…

Read MoreA Call to Action for Australian Businesses

CISA Alerts on Ongoing Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)

A critical vulnerability affecting Microsoft SharePoint, identified as CVE-2024-38094, has been recently incorporated into the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog. This adds urgency as CISA has flagged the issue, citing active exploitation in the wild. This high-severity vulnerability, which carries a CVSS score…

Read MoreCISA Alerts on Ongoing Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)

Chinese Hackers Deploy PlugX Variant on Compromised Microsoft Exchange Servers

A sophisticated cyberespionage operation has emerged, directly attributed to a Chinese group utilizing vulnerabilities in Microsoft Exchange Servers unveiled earlier this March. This group, identified as PKPLUG (also known as Mustang Panda and HoneyMyte), has executed a new attack sequence deploying an undocumented variant of a remote access trojan, dubbed…

Read MoreChinese Hackers Deploy PlugX Variant on Compromised Microsoft Exchange Servers

Uber Asserts No Sensitive Data Compromised in Recent Breach, Yet There’s More to the Story

Uber Technologies Inc. has recently acknowledged a security breach affecting its internal computer systems, first reported late Thursday. The company stated that there is currently “no evidence” suggesting that sensitive user data, such as trip history, has been accessed during the incident. In a public statement, Uber clarified, “We have…

Read MoreUber Asserts No Sensitive Data Compromised in Recent Breach, Yet There’s More to the Story

Cybersecurity Experts Wanted: Protecting the Balance

Professional Certifications & Continuous Training, Recruitment & Reskilling Strategy, Training & Security Leadership Midsize Businesses Require Skilled Cybersecurity Professionals as Threat Dynamics Evolve Brandy Harris • October 29, 2025 Image: Shutterstock As larger corporations fortify their cybersecurity defenses and minimize ransom payouts, ransomware attackers are increasingly targeting midsize organizations. These…

Read MoreCybersecurity Experts Wanted: Protecting the Balance