The Breach News

UK NCSC Launches Software Vulnerability Initiative

Application Security , Governance & Risk Management , Next-Generation Technologies & Secure Development Agency Partners with Industry Experts for Enhanced Vulnerability Research Akshaya Asokan (asokan_akshaya) • July 16, 2025 The U.K. National Cyber Security Centre is seeking to expand vulnerability detection and mitigation efforts through collaboration with industry experts. (Image:…

Read MoreUK NCSC Launches Software Vulnerability Initiative

Thousands of Afghans Stealthily Relocated to the UK Following Data Breach – MSN

Thousands of Afghans Secretly Evacuated to the UK After Data Breach In a developing situation that highlights significant data security vulnerabilities, thousands of Afghan nationals were clandestinely transported to the United Kingdom following a substantial data leak. This breach, which has raised alarming concerns about privacy and security, reveals the…

Read MoreThousands of Afghans Stealthily Relocated to the UK Following Data Breach – MSN

DHS Under Increased Scrutiny for DNA Collection from Immigrant Children

Senator Wyden Questions DNA Collection Practices at DHS and DOJ United States Senator Ron Wyden has raised concerns regarding the collection of DNA from immigrants, including children, by the Departments of Homeland Security (DHS) and Justice (DOJ). In a recent inquiry, Wyden is demanding explanations about the legality, scope, and…

Read MoreDHS Under Increased Scrutiny for DNA Collection from Immigrant Children

AI Giants Advocate for Transparency in Model Decision-Making Processes

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Experts Investigate AI Model Reasoning and Its Implications Rashmi Ramesh (rashmiramesh_) • July 16, 2025 AI researchers from OpenAI, Google DeepMind, Anthropic, and others advocate for deeper exploration of chain-of-thought monitoring. (Image: Shutterstock) As artificial intelligence models articulate what they…

Read MoreAI Giants Advocate for Transparency in Model Decision-Making Processes

Louis Vuitton Links Regional Data Breaches to a Single Cyberattack

The luxury fashion powerhouse Louis Vuitton has disclosed a significant data breach affecting customers in the UK, South Korea, and Turkey, all traced to a singular security incident linked to the ShinyHunters extortion group. The retailer began notifying affected customers last week, initially focusing on South Korea, followed by notifications…

Read MoreLouis Vuitton Links Regional Data Breaches to a Single Cyberattack

Data Breach at UnitedHealth-Associated Tech Firm Episource Affects 5.4 Million Patients

Episource, a medical billing company affiliated with Optum, a subsidiary of UnitedHealth Group, has reported a significant data breach affecting over 5.4 million individuals in the United States. This incident, which occurred earlier this year, has been classified as one of the largest healthcare data breaches recorded in 2025, as…

Read MoreData Breach at UnitedHealth-Associated Tech Firm Episource Affects 5.4 Million Patients

Hackers Exploit Backdoor to Access Data from SonicWall Appliance

Cybercrime, Fraud Management & Cybercrime, Governance & Risk Management Hacking Group UNC6148 Exploits OVERSTEP Rootkit to Steal Credentials, According to Google Akshaya Asokan (asokan_akshaya) • July 16, 2025 A cybercrime group leveraged a backdoor in a fully patched SonicWall appliance to exfiltrate credentials and may have sold this information to…

Read MoreHackers Exploit Backdoor to Access Data from SonicWall Appliance

Hackers Take Advantage of Vulnerability by Concealing Malware within DNS Records

Malicious Malware Hidden Within DNS Records: A Growing Threat In a concerning development in the realm of cybersecurity, researchers have discovered hackers embedding malware within domain name system (DNS) records, a strategy that eludes many conventional defenses. This approach allows harmful scripts and early-stage malware to retrieve binary files without…

Read MoreHackers Take Advantage of Vulnerability by Concealing Malware within DNS Records