The Breach News

Sensitive Medical Cannabis Patient Data Compromised Due to Unsecured Database

In a significant data breach impacting medical marijuana patients in Ohio, security researcher Jeremiah Fowler discovered a publicly accessible database that allegedly contained highly sensitive personal information. This incident has raised concerns over data security within the burgeoning legal cannabis sector, where businesses have accumulated extensive customer data for both…

Read MoreSensitive Medical Cannabis Patient Data Compromised Due to Unsecured Database

Rethinking Pen Testing: Beyond Compliance for Enhanced Security

May 15, 2025
Compliance / Penetration Testing

Picture this: Your organization checks off its annual penetration test in January with high scores for compliance. By February, a routine software update goes live. Fast forward to April, and attackers have exploited a vulnerability from that update, compromising customer data long before it’s detected. This scenario is all too common, highlighting that one-time compliance assessments won’t safeguard against vulnerabilities introduced afterward. According to Verizon’s 2025 Data Breach Investigation Report, the exploitation of vulnerabilities surged by 34% year-over-year. While compliance frameworks offer essential security guidance, organizations must embrace continuous security validation to identify and address new vulnerabilities proactively. Here’s what you need to understand about penetration testing for compliance requirements—and the necessity of transitioning to ongoing penetration testing for real security resilience.

Reevaluating Penetration Testing: Beyond Compliance to Continuous Security In an age where cyber threats evolve at a rapid pace, relying solely on annual penetration testing for compliance can leave organizations vulnerable to devastating breaches. A stark example illustrates this point: an organization may achieve high compliance scores after its annual…

Read More

Rethinking Pen Testing: Beyond Compliance for Enhanced Security

May 15, 2025
Compliance / Penetration Testing

Picture this: Your organization checks off its annual penetration test in January with high scores for compliance. By February, a routine software update goes live. Fast forward to April, and attackers have exploited a vulnerability from that update, compromising customer data long before it’s detected. This scenario is all too common, highlighting that one-time compliance assessments won’t safeguard against vulnerabilities introduced afterward. According to Verizon’s 2025 Data Breach Investigation Report, the exploitation of vulnerabilities surged by 34% year-over-year. While compliance frameworks offer essential security guidance, organizations must embrace continuous security validation to identify and address new vulnerabilities proactively. Here’s what you need to understand about penetration testing for compliance requirements—and the necessity of transitioning to ongoing penetration testing for real security resilience.

Details of Major Allianz Life Data Breach Reportedly Uncovered – AOL.com

Allianz Life Data Breach Exposes Sensitive Information: Key Details Emerge Recent reports have surfaced regarding a significant data breach involving Allianz Life, a major player in insurance and financial services. The breach has raised alarms, as sensitive information related to customers and their policies may have been compromised. Initial investigations…

Read MoreDetails of Major Allianz Life Data Breach Reportedly Uncovered – AOL.com

Critical Vulnerability in TP-Link Routers (CVE-2023-33538) Under Active Exploitation, CISA Issues Urgent Warning

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently included a critical security flaw affecting TP-Link wireless routers in its Known Exploited Vulnerabilities (KEV) catalog, highlighting evidence of ongoing exploitation. The vulnerability, identified as CVE-2023-33538 (CVSS score: 8.8), involves a command injection issue that could allow arbitrary system command execution when handling the ssid1 parameter in a specially crafted HTTP GET request. Affected models include the TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2, which expose this flaw through the /userRpm/WlanNetworkRpm component. CISA has warned that some impacted devices may be at end-of-life (EoL) or end-of-service (EoS), advising users to stop using them if no mitigations are available. Currently, there is limited public information on the nature of the active exploitation, including attack scale and targeted entities.

TP-Link Router Vulnerability CVE-2023-33538 Under Active Exploitation: CISA Issues Urgent Advisory On June 17, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced the inclusion of a high-severity security vulnerability found in TP-Link routers to its Known Exploited Vulnerabilities (KEV) catalog. This decision stems from credible evidence that the…

Read More

Critical Vulnerability in TP-Link Routers (CVE-2023-33538) Under Active Exploitation, CISA Issues Urgent Warning

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently included a critical security flaw affecting TP-Link wireless routers in its Known Exploited Vulnerabilities (KEV) catalog, highlighting evidence of ongoing exploitation. The vulnerability, identified as CVE-2023-33538 (CVSS score: 8.8), involves a command injection issue that could allow arbitrary system command execution when handling the ssid1 parameter in a specially crafted HTTP GET request. Affected models include the TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2, which expose this flaw through the /userRpm/WlanNetworkRpm component. CISA has warned that some impacted devices may be at end-of-life (EoL) or end-of-service (EoS), advising users to stop using them if no mitigations are available. Currently, there is limited public information on the nature of the active exploitation, including attack scale and targeted entities.

Why Cloudflare Prevented Unauthorized AI Access to Web Content

Agentic AI, Artificial Intelligence & Machine Learning, Cloud Security CEO Matthew Prince: Unchecked Scraping Could Undermine the Internet’s Economic Model Michael Novinson (MichaelNovinson) • August 19, 2025 Matthew Prince, Co-founder and CEO, Cloudflare (Image: Cloudflare) Cloudflare has recently implemented a default blockage against unauthorized AI crawlers seeking to access ad-supported…

Read MoreWhy Cloudflare Prevented Unauthorized AI Access to Web Content

Coinbase Exposed: Agents Bribed, Data of ~1% of Users Compromised; $20M Extortion Bid Fails

May 15, 2025
Cryptocurrency / Threat Intelligence

Coinbase has reported a data breach involving a small fraction of its users after cybercriminals targeted its overseas customer support agents. The company revealed that these criminals offered cash incentives to a limited number of insiders, who then extracted data concerning less than 1% of Coinbase’s monthly active users. The attackers aimed to compile a list of customers to impersonate Coinbase and trick them into surrendering their cryptocurrency assets. On May 11, 2025, the perpetrators attempted to extort Coinbase for $20 million, claiming possession of sensitive information about specific customer accounts and internal documents. In response, Coinbase confirmed that the compromised agents, based in India, have been terminated. The firm assured customers that no passwords, private keys, or funds were at risk.

Coinbase Faces Breach After Insider Compromise; User Data Exposed in Extortion Attempt May 15, 2025 In a recent security disclosure, Coinbase revealed that an unauthorized breach of its systems has resulted in the theft of account information pertaining to a small percentage of its user base. The cryptocurrency exchange stated…

Read More

Coinbase Exposed: Agents Bribed, Data of ~1% of Users Compromised; $20M Extortion Bid Fails

May 15, 2025
Cryptocurrency / Threat Intelligence

Coinbase has reported a data breach involving a small fraction of its users after cybercriminals targeted its overseas customer support agents. The company revealed that these criminals offered cash incentives to a limited number of insiders, who then extracted data concerning less than 1% of Coinbase’s monthly active users. The attackers aimed to compile a list of customers to impersonate Coinbase and trick them into surrendering their cryptocurrency assets. On May 11, 2025, the perpetrators attempted to extort Coinbase for $20 million, claiming possession of sensitive information about specific customer accounts and internal documents. In response, Coinbase confirmed that the compromised agents, based in India, have been terminated. The firm assured customers that no passwords, private keys, or funds were at risk.

Cyberattack Breaches Bragg’s Systems – SC Media

Cyberattack Compromises Bragg’s Systems Source: SC Media In a recent cybersecurity incident, Bragg’s systems have fallen victim to a sophisticated cyberattack, exposing critical vulnerabilities that may impact customer data and organizational operations. This breach underscores the persistent risks facing companies in today’s digital landscape, particularly for those operating within sensitive…

Read MoreCyberattack Breaches Bragg’s Systems – SC Media