The Breach News

Palo Alto Firewalls Vulnerable to Secure Boot Bypass and Firmware Exploits

A recent investigation into three firewall models produced by Palo Alto Networks has revealed notable security vulnerabilities. These flaws are related to both the firmware of the devices and improperly configured security settings. According to a report from security vendor Eclypsium shared with The Hacker News, these vulnerabilities are not…

Read MorePalo Alto Firewalls Vulnerable to Secure Boot Bypass and Firmware Exploits

Google Discovers ‘Initial Access Broker’ Collaborating with Conti Ransomware Group

Google’s Threat Analysis Group (TAG) has identified a new initial access broker known as “Exotic Lily,” linked to a notorious Russian cybercrime group famed for its participation in Conti and Diavol ransomware operations. The emergence of this threat actor raises serious concerns regarding cybersecurity practices across multiple sectors. Exotic Lily…

Read MoreGoogle Discovers ‘Initial Access Broker’ Collaborating with Conti Ransomware Group

The Browser as Your Office: Understanding Potential Risks for Your Organization

The Browser Is Now the Workplace: Potential Cybersecurity Exposures for Organizations In today’s digital landscape, many businesses have transitioned to remote and hybrid work models, with the browser serving as a primary interface for daily operations. However, this reliance on web-based applications has unveiled significant vulnerabilities that cyber adversaries are…

Read MoreThe Browser as Your Office: Understanding Potential Risks for Your Organization

U.S. State Government Network Compromised Through Ex-Employee Account

Cybersecurity Alert: Network Breach at U.S. State Government Organization The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed a significant cybersecurity breach affecting an unnamed state government organization’s network. The breach was executed through the exploitation of an administrator account linked to a former employee, highlighting the vulnerabilities associated…

Read MoreU.S. State Government Network Compromised Through Ex-Employee Account

60% of UK Secondary Schools Targeted by Cyber Attacks or Breaches in the Last Year | Cybercrime

Data Breach Targets UK Nurseries: Education Sector Under Cyber Threat Last month, a significant cyber incident targeted UK nurseries, culminating in the exposure of children’s data online by a hacking group known as Radiant. This breach has sparked widespread condemnation, with critics labeling it as a new low in cybersecurity…

Read More60% of UK Secondary Schools Targeted by Cyber Attacks or Breaches in the Last Year | Cybercrime

CISA Includes Five-Year-Old jQuery XSS Vulnerability in List of Exploited Flaws

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added a critical vulnerability in the widely used jQuery JavaScript library to its Known Exploited Vulnerabilities (KEV) catalog due to ongoing exploitation concerns. This security flaw, identified as CVE-2020-11023, poses medium-level severity, scored between 6.1 and 6.9 on the Common Vulnerability…

Read MoreCISA Includes Five-Year-Old jQuery XSS Vulnerability in List of Exploited Flaws

U.S. Government Alerts Companies to Possible Russian Cyber Threats

On Monday, the U.S. government reiterated its warnings regarding the likelihood of cyberattacks from Russia, believed to be a retaliatory response to the extensive economic sanctions imposed by Western nations following the country’s recent invasion of Ukraine. President Joe Biden indicated that the evolving intelligence suggested that the Russian government…

Read MoreU.S. Government Alerts Companies to Possible Russian Cyber Threats

Harnessing Cyber Threat Intelligence (CTI) for Enhanced Enterprise Risk Management – Webinar

Presented by Intel 471 60 mins In today’s rapidly evolving digital landscape, Cyber Threat Intelligence (CTI) has emerged as an essential component for organizational success. Executives and various business units are increasingly driving the demand for CTI, yet Chief Information Security Officers (CISOs) continue to encounter challenges in effectively operationalizing…

Read MoreHarnessing Cyber Threat Intelligence (CTI) for Enhanced Enterprise Risk Management – Webinar

Monthly Breaches Cast Doubts on South Korea’s Cybersecurity Measures

South Korea is renowned for its ultra-fast internet and extensive broadband coverage, establishing itself as a hub for digital innovation with major brands like Hyundai, LG, and Samsung. However, this digital prowess has also made the nation a target for cybercriminals, exposing vulnerabilities within its cybersecurity infrastructure. Recent high-profile security…

Read MoreMonthly Breaches Cast Doubts on South Korea’s Cybersecurity Measures