The Breach News

Salesforce Declines to Meet $1 Billion Extortion Demand Following Data Breach of 1 Billion Records

Salesforce is facing a serious cybersecurity threat as a criminal syndicate, identifying itself as Scattered LAPSUS$ Hunters, has made allegations of stealing around one billion records from multiple Salesforce customers. The group initiated this extortion campaign back in May, utilizing voice calls to reach organizations that utilize Salesforce for data…

Read MoreSalesforce Declines to Meet $1 Billion Extortion Demand Following Data Breach of 1 Billion Records

Ukrainian Cryptojacking Kingpin Arrested at 29 for Exploiting Cloud Services

Ukrainian National Arrested for Sophisticated Cryptojacking Scheme A 29-year-old individual from Ukraine has been apprehended for orchestrating a comprehensive cryptojacking operation, which has reportedly yielded over $2 million (€1.8 million) in illicit earnings. Identified as the key architect behind the scheme, the suspect was arrested in Mykolaiv on January 9…

Read MoreUkrainian Cryptojacking Kingpin Arrested at 29 for Exploiting Cloud Services

Researcher Identifies Significant Vulnerabilities in Various Iterations of Ivanti Endpoint Manager

Ivanti Security Updates Patch Critical Vulnerabilities in Endpoint Manager Ivanti has announced the release of critical security updates to mitigate several vulnerabilities affecting its Avalanche, Application Control Engine, and Endpoint Manager (EPM) products. Among these are four significant flaws, each rated 9.8 out of 10.0 on the Common Vulnerability Scoring…

Read MoreResearcher Identifies Significant Vulnerabilities in Various Iterations of Ivanti Endpoint Manager

Russia-Ukraine Conflict: Phishing, Malware, and Hacker Factions Aligning with Their Causes

Ukraine’s Computer Emergency Response Team (CERT-UA) has issued a warning regarding cyber attacks orchestrated by Belarusian state-sponsored hackers, aimed at military personnel and associated individuals amid the ongoing conflict in Ukraine. This phishing campaign is significant as it targets accounts affiliated with the Ukrainian military, specifically personal accounts hosted on…

Read MoreRussia-Ukraine Conflict: Phishing, Malware, and Hacker Factions Aligning with Their Causes

Why Businesses Persist with Traditional AI Solutions

Artificial Intelligence & Machine Learning, Data Privacy, Data Security Explainability, Cost, Compliance Drive AI Choices in Enterprises Sandhya Michu • October 8, 2025 Image: Shutterstock In the evolving landscape of artificial intelligence, while technologies have become democratized and more accessible, experts caution against the uncritical adoption of large language models…

Read MoreWhy Businesses Persist with Traditional AI Solutions

MFA Overload: When Security Measures Backfire

As organizations increasingly adopt multi-factor authentication (MFA) to enhance security measures, cybercriminals are exploiting vulnerabilities in these systems. Traditional password-only security protocols are becoming obsolete due to their susceptibility to various cyber threats. MFA is seen as a crucial defense mechanism, requiring users to verify their identities through multiple authentication…

Read MoreMFA Overload: When Security Measures Backfire

Stay One Step Ahead of Cybercriminals and Safeguard Your Business

Is your business vulnerable to data loss or have you already experienced it? In light of recent high-profile cyber attacks, Lister Unified Communications, located in Stonehouse, is introducing a new cybersecurity solution specifically designed for small and medium-sized enterprises (SMEs). Rob Lister, the managing director of Lister, emphasized the escalating…

Read MoreStay One Step Ahead of Cybercriminals and Safeguard Your Business

Researchers Discover Exploit Bypassing Active Directory Restrictions on NTLMv1

Recent findings by cybersecurity experts have unveiled a considerable vulnerability in the Microsoft Active Directory Group Policy designed to disable the authentication method NT LAN Manager (NTLM) version 1. Researchers indicate that a misconfiguration within on-premises applications is capable of easily bypassing this Group Policy measure. According to Dor Segal,…

Read MoreResearchers Discover Exploit Bypassing Active Directory Restrictions on NTLMv1