The Breach News

Court Approves Settlement for HCA Data Breach Class Action

Healthcare, Industry Specific, Litigation HCA Healthcare Reaches Multimillion-Dollar Settlement Following 2023 Data Breach Marianne Kolbasuk McGee (HealthInfoSec) • October 31, 2025 HCA Healthcare has agreed to settle a class action lawsuit stemming from a 2023 email breach impacting approximately 11.3 million patients. (Image: HCA) This week, a federal court in…

Read MoreCourt Approves Settlement for HCA Data Breach Class Action

The Airstalk Intrusion: A Covert Malware Targeting Corporate Supply Chains

The cybersecurity landscape is shaken by the emergence of a newly identified malware dubbed Airstalk, which researchers attribute to a suspected nation-state threat group. This malware employs enterprise management tools in unconventional ways, highlighting vulnerabilities in third-party ecosystems, particularly those supporting the global outsourcing sector. Its stealth and sophistication signal…

Read MoreThe Airstalk Intrusion: A Covert Malware Targeting Corporate Supply Chains

New Study Shows Spectre Vulnerability Continues to Affect Recent AMD and Intel Processors

In a concerning development nearly six years after the initial discovery of the Spectre vulnerability affecting modern CPU architectures, recent research indicates that both AMD and Intel’s latest processors remain at risk of speculative execution attacks. This revelation emerges from a study conducted by researchers at ETH Zürich, highlighting vulnerabilities…

Read MoreNew Study Shows Spectre Vulnerability Continues to Affect Recent AMD and Intel Processors

Hackers Utilize Morse Code in Phishing Attacks to Bypass Detection

Microsoft has reported a sophisticated year-long phishing campaign characterized by a remarkable ability to evade detection. The attackers exhibited a pattern of altering their obfuscation and encryption strategies approximately every 37 days, employing various techniques, including Morse code, to obscure their activities while extracting user credentials. The phishing attempts typically…

Read MoreHackers Utilize Morse Code in Phishing Attacks to Bypass Detection

Chainguard Secures $280M for Global Open-Source Security Initiative

3rd Party Risk Management, Governance & Risk Management General Catalyst Provides Non-Dilutive Funding for Chainguard’s Global Expansion Michael Novinson (MichaelNovinson) • October 31, 2025 Eyal Bar, Chief Financial Officer, Chainguard (Image: Chainguard) Chainguard, a startup focusing on supply chain security and founded by a former Google Cloud engineer, has secured…

Read MoreChainguard Secures $280M for Global Open-Source Security Initiative

Russia Detains Meduza Theft Developers Following Government Cyberattack – Hackread – Your Source for Cybersecurity News, Data Breaches, Tech, AI, Crypto, and More

On Thursday, October 30, 2025, Russian law enforcement executed a surprise operation in Moscow, apprehending three individuals linked to the development and distribution of the notorious Meduza Stealer. The arrests were confirmed by Irina Volk, a spokesperson for Russia’s Interior Ministry, following an extensive investigation by the Investigative Department of…

Read MoreRussia Detains Meduza Theft Developers Following Government Cyberattack – Hackread – Your Source for Cybersecurity News, Data Breaches, Tech, AI, Crypto, and More

A Sherlock Holmes Approach to Cybersecurity: Uncovering the Impossible Through Exposure Validation

Exposure Validation: A Strategic Imperative for Cybersecurity In the realm of cybersecurity, exposure validation has emerged as a critical practice akin to the deductive methods of Sherlock Holmes. Renowned for his ability to sift through irrelevant information to reveal hidden truths, Holmes famously noted, “When you have eliminated the impossible,…

Read MoreA Sherlock Holmes Approach to Cybersecurity: Uncovering the Impossible Through Exposure Validation