The Breach News

Insights from a Security Researcher on the HIPAA Security Rule – DataBreaches.net

New Insights on HIPAA Security Rule from Security Researcher In a recent development concerning healthcare cybersecurity, a security researcher has provided critical insights into compliance with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. This exploration into HIPAA’s implications highlights ongoing vulnerabilities within the healthcare sector and raises…

Read MoreInsights from a Security Researcher on the HIPAA Security Rule – DataBreaches.net

Navigating Compliance Risks and Unseen Liabilities for CISOs

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development, Standards, Regulations & Compliance Expert Insights from Jonathan Armstrong on AI Security and Legal Challenges Surrounding the EU AI Act Anna Delaney (annamadeline) • March 20, 2025 Jonathan Armstrong, Partner, Punter Southall Law The landscape of artificial intelligence regulation is…

Read MoreNavigating Compliance Risks and Unseen Liabilities for CISOs

Affordable Drone Accessories from China Enable Anyone with a Credit Card to Transform Toys into Weapons of War

In December, reports emerged highlighting the innovative capabilities of the Ukrainian military, particularly regarding the deployment of long-range tethered drones for operational use. According to the Kyiv Post, approximately 40 percent of these drones’ components are sourced domestically within Ukraine, though the remainder is imported due to the constraints of…

Read MoreAffordable Drone Accessories from China Enable Anyone with a Credit Card to Transform Toys into Weapons of War

Akira Ransomware Encryption Compromised via Cloud Computing

Ransomware has emerged as one of the most dreaded threats in the realm of cybersecurity. Cybercriminals are increasingly employing advanced technologies, including artificial intelligence, to carry out attacks that are both highly effective and remarkably sophisticated. As a result of these escalating threat levels, many victims find themselves faced with…

Read MoreAkira Ransomware Encryption Compromised via Cloud Computing

Hackers Take Advantage of Unresolved ChatGPT Vulnerability

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Over 10,000 Exploit Attempts Documented Within a Week from One Malicious IP Rashmi Ramesh (rashmiramesh_) • March 19, 2025 Image: Shutterstock Recent security research has unveiled that hackers are leveraging a vulnerability in ChatGPT’s infrastructure, leading to the redirection of…

Read MoreHackers Take Advantage of Unresolved ChatGPT Vulnerability

SpyX Data Breach Compromises Personal Information of Nearly 2 Million Users

Spyware Developer SpyX Faces Major Data Breach SpyX, a prominent developer of spyware, has suffered a significant data breach affecting personal information belonging to nearly 2 million users. The incident, which transpired on June 24, 2024, has raised serious concerns regarding privacy and cybersecurity, revealing a trove of sensitive user…

Read MoreSpyX Data Breach Compromises Personal Information of Nearly 2 Million Users

Beware: Browser Searches Can Lead to Ransomware Risks

The landscape of cybersecurity is witnessing a concerning evolution as recent reports indicate a surge in ransomware attacks. Traditionally, these attacks have been directed at individuals, corporations, and governmental bodies. However, cybersecurity specialists are now drawing attention to an alarming new tactic: the distribution of ransomware through online search queries.…

Read MoreBeware: Browser Searches Can Lead to Ransomware Risks

UK NCSC Establishes 2035 Target for Transition to Post-Quantum Security

Critical Infrastructure Security, Encryption & Key Management, Security Operations Cyber Agency Urges Critical Infrastructure Operators to Meet Post-Quantum Encryption Deadline Akshaya Asokan (asokan_akshaya) • March 19, 2025 Image: Shutterstock The UK’s National Cyber Security Centre (NCSC) is urging critical infrastructure operators to transition to post-quantum cryptography by 2035. This call…

Read MoreUK NCSC Establishes 2035 Target for Transition to Post-Quantum Security