The Breach News

F5 Security Breach, Linux Rootkits, Pixnapping Threats, EtherHiding, and More

Recent revelations in cybersecurity highlight the increasing prevalence of long-term breaches, which often go unnoticed until substantial damage is done. A striking example is the incident involving F5, a significant player in the application delivery and security space. On August 9, 2025, F5 announced that unidentified threat actors had infiltrated…

Read MoreF5 Security Breach, Linux Rootkits, Pixnapping Threats, EtherHiding, and More

Cybersecurity Agencies Issue Warning on IDOR Vulnerabilities Used in Data Breaches

Recent advisories issued by cybersecurity agencies in both Australia and the United States have exposed critical vulnerabilities present in web applications that could be exploited by cybercriminals, risking data breaches and the theft of sensitive information. The joint advisory particularly underscores the threat posed by Insecure Direct Object Reference (IDOR)…

Read MoreCybersecurity Agencies Issue Warning on IDOR Vulnerabilities Used in Data Breaches

Madman Theory Ignites Wild Scattered Lapsus$ Hunter’s Playbook

Cybercrime, Fraud Management & Cybercrime, Ransomware Chaos Theory Meets Ransomware, Creating Unpredictable Outcomes Mathew J. Schwartz (euroinfosec) • October 17, 2025 Image: Shutterstock Once predominantly a forte of Russian cybercriminals evading law enforcement, a surge in ransomware activity is now attributed to reckless teenagers from the West who operate under…

Read MoreMadman Theory Ignites Wild Scattered Lapsus$ Hunter’s Playbook

Dodo and IPrimus Data Breach: Over 1,600 Accounts Compromised

Cybersecurity Incident: Data Breach at Australian Telecom Providers Dodo and iPrimus A significant data breach has impacted two prominent Australian telecommunications companies, Dodo and iPrimus, resulting in the exposure of over 1,600 customer accounts. This cyberattack, which targeted their email systems, has raised substantial concerns regarding the security of personal…

Read MoreDodo and IPrimus Data Breach: Over 1,600 Accounts Compromised

Transform Vulnerability Management into Exposure Management: Your Starting Point!

Vulnerability Management (VM) has served as a foundational aspect of cybersecurity within organizations. Established nearly alongside the discipline itself, it seeks to help entities identify and rectify potential security weaknesses before they escalate into serious issues. In recent years, however, the shortcomings of traditional VM approaches have become increasingly pronounced.…

Read MoreTransform Vulnerability Management into Exposure Management: Your Starting Point!

Apache Log4j Vulnerability: Log4Shell Actively Under Widespread Attack

Recent cybersecurity developments have revealed that cybercriminals are actively exploiting the newly discovered “Log4Shell” vulnerability in the widely used Log4j library. This vulnerability has enabled attackers to exploit unpatched servers, allowing them to deploy cryptocurrency miners, utilize Cobalt Strike for additional malicious objectives, and integrate compromised devices into expanding botnets.…

Read MoreApache Log4j Vulnerability: Log4Shell Actively Under Widespread Attack

Enigmatic Team Bangladesh Launches DDoS Attacks and Data Breaches Against India

A hacktivist collective named Mysterious Team Bangladesh has been implicated in over 750 distributed denial-of-service (DDoS) attacks, alongside 78 instances of website defacement, since June 2022. According to a report by Group-IB, a cybersecurity firm based in Singapore, this group primarily targets organizations in the logistics, government, and financial sectors…

Read MoreEnigmatic Team Bangladesh Launches DDoS Attacks and Data Breaches Against India

New York Hospitals Are Confronting Stricter Cybersecurity Regulations Beyond HIPAA

Recent cybersecurity regulations in New York state have significantly heightened compliance requirements for certain hospitals, presenting new challenges for data governance. Matthew Bernstein, a consultant with Bernstein Data, highlighted that these regulations operate alongside the federal HIPAA security rule, complicating compliance for healthcare providers. Introduced last year, New York State’s…

Read MoreNew York Hospitals Are Confronting Stricter Cybersecurity Regulations Beyond HIPAA