The Breach News

Star Health’s Communications Criticized for Prioritizing Data Leak Distribution Over Addressing Vulnerabilities – Goodreturns

Star Health’s Communications Criticized for Emphasizing Data Leak Distribution Over Vulnerability Addressing In a recent cybersecurity incident, Star Health has come under fire for its handling of a significant data leak. The critiques have focused on the company’s communication strategy, which appears to prioritize information dissemination regarding the breach rather…

Read MoreStar Health’s Communications Criticized for Prioritizing Data Leak Distribution Over Addressing Vulnerabilities – Goodreturns

DarkGate Malware Shifts from AutoIt to AutoHotkey in Recent Cyber Attacks

Cybersecurity experts have recently identified a shift in the tactics employed by the DarkGate malware-as-a-service (MaaS) operation, which is now utilizing AutoHotkey scripts instead of the previously favored AutoIt scripts. This adaptation, observed in version 6 of DarkGate released in March 2024 by the developer known as RastaFarEye, marks a…

Read MoreDarkGate Malware Shifts from AutoIt to AutoHotkey in Recent Cyber Attacks

Exploring Offensive and Defensive AI: A Chat with GPT

ChatGPT: A Dual-Edged Sword in Cybersecurity As one of the fastest-growing consumer applications to date, ChatGPT has emerged as a powerful generative AI chatbot, capable of crafting human-like and contextually aware text responses. Its rapid popularity extends across a variety of applications, including content creation, programming, education, customer support, and…

Read MoreExploring Offensive and Defensive AI: A Chat with GPT

We’ve Become a Fortress: The Rise of Militarization in US Elections

As the U.S. approaches another election cycle, unprecedented security measures are being implemented to safeguard the democratic process. The landscape of election security has evolved significantly, characterized by a suite of formidable protections that include drones, snipers, body armor, and bulletproof glass. These enhancements come in response to heightened threats…

Read MoreWe’ve Become a Fortress: The Rise of Militarization in US Elections

Private Company Accessed Italian Government Database, Say Prosecutors

Cybercrime, Fraud Management & Cybercrime Italian Foreign Minister Denounces Database Breach as a Threat to Democracy Akshaya Asokan (asokan_akshaya) • October 29, 2024 Investigators in Milan are examining a prolonged breach of government databases by a private investigation firm. (Image: Shutterstock) Italy’s Foreign Minister, Antonio Tajani, has publicly denounced the…

Read MorePrivate Company Accessed Italian Government Database, Say Prosecutors

FBI Releases 7,000 Decryption Keys to Assist LockBit Ransomware Victims

The FBI has announced that it possesses over 7,000 decryption keys related to the LockBit ransomware operation, a significant development aimed at assisting victims in recovering their data at no cost. Bryan Vorndran, the assistant director of the FBI’s Cyber Division, highlighted this initiative during his keynote address at the…

Read MoreFBI Releases 7,000 Decryption Keys to Assist LockBit Ransomware Victims

ExtraHop Report Uncovers Data Breach Costs Surpassing Industry Estimates – Intelligent CISO

ExtraHop Report Highlights Financial Repercussions of Data Breaches on Public Companies ExtraHop has unveiled a comprehensive report examining the short- and long-term financial effects that prominent data breaches inflict on publicly traded companies. The report reveals that, on average, a data breach costs organizations approximately $677 million— a figure significantly…

Read MoreExtraHop Report Uncovers Data Breach Costs Surpassing Industry Estimates – Intelligent CISO

Zyxel Issues Firmware Patch for Vulnerabilities in End-of-Life NAS Devices

Zyxel has issued critical security updates to address significant vulnerabilities affecting two of its end-of-life network-attached storage (NAS) devices. These flaws could allow unauthenticated attackers to execute operating system commands and arbitrary code on compromised systems. The affected models include the NAS326, which is running versions V5.21(AAZF.16)C0 and earlier, and…

Read MoreZyxel Issues Firmware Patch for Vulnerabilities in End-of-Life NAS Devices