The Breach News

Regulations and Resilience Will Elevate CISOs’ Risk Management Challenges

In 2024, organizations navigated a complex landscape of emerging cybersecurity regulations as governments around the world introduced stricter mandates aimed at safeguarding privacy and data security across various sectors. While these regulations emerged, security and risk leaders raced to fortify their defenses against evolving technologies, such as generative AI (genAI),…

Read MoreRegulations and Resilience Will Elevate CISOs’ Risk Management Challenges

Emerging Attack Method ‘Sleepy Pickle’ Aims at Machine Learning Models

Emerging Threat: Exploitation of Machine Learning Models via Sleepy Pickle Attacks Recent revelations spotlight significant vulnerabilities within the widely utilized Pickle format, particularly concerning machine learning (ML) models. A new attack technique, referred to as Sleepy Pickle, has been identified, which leverages this format to compromise ML models themselves. This…

Read MoreEmerging Attack Method ‘Sleepy Pickle’ Aims at Machine Learning Models

Russian Cyber Espionage Group Unleashes LitterDrifter USB Worm in Coordinated Attacks

Russian state-sponsored cyber espionage activities have recently come under scrutiny as actors associated with the Federal Security Service (FSB) deploy a new malware variant known as LitterDrifter. This USB worm has been specifically used to breach defenses of various entities within Ukraine, raising significant alert levels among cybersecurity experts. Check…

Read MoreRussian Cyber Espionage Group Unleashes LitterDrifter USB Worm in Coordinated Attacks

Live Webinar: CISO Leadership Blueprint for Managing Budgets, Third-Party Risks, and Breaches

Tim Grieveson Appointed Senior Vice President – Global Cyber Security Risk Advisor at Bitsight Former CSO Brings Extensive Experience in Cybersecurity Leadership Tim Grieveson has joined Bitsight as their Senior Vice President and Global Cyber Security Risk Advisor, where he will leverage his extensive experience in cybersecurity to aid organizations…

Read MoreLive Webinar: CISO Leadership Blueprint for Managing Budgets, Third-Party Risks, and Breaches

Experts Caution Against Mekotio Banking Trojan Threatening Latin American Nations

Mekotio Banking Trojan Intensifies Threats Against Latin American Financial Institutions A serious cybersecurity concern has emerged as banks and financial institutions across Latin America face increasing threats from a malware known as Mekotio, also referred to as Melcoz. Recent findings from cybersecurity firm Trend Micro point to a notable rise…

Read MoreExperts Caution Against Mekotio Banking Trojan Threatening Latin American Nations

China-Connected Hackers Breached East Asian Company for Three Years via F5 Devices

A cyber espionage actor with links to China has been identified as the perpetrator behind a sustained attack against an undisclosed organization in East Asia, an intrusion that has reportedly spanned approximately three years. This threat actor took advantage of legacy F5 BIG-IP appliances within the target’s infrastructure, using them…

Read MoreChina-Connected Hackers Breached East Asian Company for Three Years via F5 Devices

Mustang Panda Hackers Target Philippine Government Amid Rising South China Sea Tensions

Recent reports reveal that the Mustang Panda hacking group, linked to China, has executed a cyberattack aimed at a government entity in the Philippines. This incident occurs amidst escalating tensions between the Philippines and China concerning territorial disputes in the South China Sea, highlighting the geopolitical implications of cybersecurity in…

Read MoreMustang Panda Hackers Target Philippine Government Amid Rising South China Sea Tensions

Detecting, Preventing, and Notifying About Data Breaches

Please complete the following fields: Select CountryUnited StatesCanadaIndiaAfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntigua & BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia & HerzegovinaBotswanaBrazilBritish Virgin IslandsBruneiBulgariaBurkina FasoBurundiCambodiaCameroonCape VerdeCayman IslandsCentral African RepublicChadChileChinaColombiaComorosCook IslandsCosta RicaCôte d’IvoireCroatiaCubaCyprusCzechiaDemocratic Republic of the CongoDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEswatiniEthiopiaFaroe IslandsFijiFinlandFranceFrench GuianaFrench PolynesiaGabonGambiaGeorgiaGermanyGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuamGuatemalaGuineaGuinea-BissauGuyanaHaitiHondurasHong KongHungaryIcelandIndonesiaIranIraqIrelandIsraelItalyJamaicaJapanJordanKazakhstanKenyaKiribatiKosovoKuwaitKyrgyzstanLaosLatviaLebanonLesothoLiberiaLibyaLiechtensteinLithuaniaLuxembourgMacaoMadagascarMalawiMalaysiaMaldivesMaliMaltaMarshall IslandsMartiniqueMauritaniaMauritiusMayotteMexicoMicronesiaMoldovaMonacoMongoliaMontserratMoroccoMozambiqueMyanmar (Burma)NamibiaNauruNepalNetherlandsNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorth MacedoniaNorthern Mariana IslandsNorwayOmanPakistanPalauPanamaPapua New GuineaParaguayPeruPhilippinesPolandPortugalPuerto RicoQatarRomaniaRussiaRwandaSamoaSan MarinoSão Tomé & PríncipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSlovakiaSloveniaSolomon…

Read MoreDetecting, Preventing, and Notifying About Data Breaches