The Breach News

US Government Warns That Dependence on Chinese Lithium Batteries Poses Significant Risks

In August, analysts from the U.S. Department of Homeland Security (DHS) circulated an internal report to local agencies highlighting significant economic risks associated with dependence on Chinese utility storage batteries. This warning raises concerns about America’s ability to develop a secure supply chain, particularly as the reliance on foreign technology…

Read MoreUS Government Warns That Dependence on Chinese Lithium Batteries Poses Significant Risks

A Proactive Approach to State Cybersecurity Compliance

The frequency and severity of cyberattacks directed at businesses and government entities are escalating. In response, state legislatures across the United States are urgently working to implement stricter cybersecurity regulations. Currently, 19 states have enacted or passed comprehensive consumer privacy laws. For cybersecurity professionals, this rapidly evolving landscape presents compliance…

Read MoreA Proactive Approach to State Cybersecurity Compliance

Enhanced Qilin Ransomware Intensifies Encryption and Evasion Tactics

Rust-Based Ransomware Implements Sophisticated Anti-Detection Measures In a disturbing development in the cyber threat landscape, a Russian-speaking ransomware group has unveiled a new variant dubbed Qilin.B, characterized by its advanced capabilities designed to thwart cyber defenses. These enhancements include log wiping, backup system disruption, and the ability to halt decryption…

Read MoreEnhanced Qilin Ransomware Intensifies Encryption and Evasion Tactics

Protect Personal and Corporate Identities with Identity Intelligence Solutions

In the evolving landscape of cybersecurity threats, the protection of both personal and corporate identities has become increasingly crucial. When cybercriminals gain access to compromised credentials, organizations face the risk of unauthorized entry into sensitive systems, leading to severe financial repercussions from ransomware and other malware assaults. To combat these…

Read MoreProtect Personal and Corporate Identities with Identity Intelligence Solutions

Opinion | Hong Kong Schools and NGOs Remain Vulnerable to Online Threats

Surge in Data Breaches Targets Educational Institutions in Hong Kong The pervasive reach of the internet has significantly increased convenience in various aspects of life. However, this growing reliance on digital platforms has also magnified online security threats, raising serious concerns for users and organizations alike. Recent statistics reveal a…

Read MoreOpinion | Hong Kong Schools and NGOs Remain Vulnerable to Online Threats

$3 Million Heist Bypasses Kraken Crypto Exchange Through Zero-Day Vulnerability

Security Vulnerability Exploited: $3 Million Stolen from Crypto Exchange Kraken In a significant breach, cryptocurrency exchange Kraken has reported that a critical zero-day vulnerability in its platform led to the theft of approximately $3 million in digital assets. The breach was orchestrated by an unnamed security researcher who not only…

Read More$3 Million Heist Bypasses Kraken Crypto Exchange Through Zero-Day Vulnerability

Massive Cyber Attack Disrupts Kyivstar, Ukraine’s Leading Telecom Provider

Kyivstar Targeted in Major Cyber Attack: Disruption of Services Reported Kyivstar, Ukraine’s largest telecommunications provider, has fallen victim to a significant cyber attack that has severely disrupted mobile and internet services across the nation. This event poses considerable challenges, particularly in the capital region, as indicated by metrics shared by…

Read MoreMassive Cyber Attack Disrupts Kyivstar, Ukraine’s Leading Telecom Provider

Vulnerability in Kia’s Web Portal Allows Researchers to Track and Hack Vehicles

In January 2023, a significant investigation uncovered a vast array of web vulnerabilities impacting several major automotive manufacturers, including Kia, Honda, Infiniti, Nissan, Acura, Mercedes-Benz, Hyundai, Genesis, BMW, Rolls Royce, and Ferrari. This extensive research culminated in an alarming report detailing how the identified flaws, reported directly to the affected…

Read MoreVulnerability in Kia’s Web Portal Allows Researchers to Track and Hack Vehicles

North Korean Cybercriminals Distributing Malware Through Phony Interviews

Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Hackers Breach Software Libraries to Distribute Malware Akshaya Asokan (asokan_akshaya) • October 25, 2024     Recent investigations by security experts have revealed a disturbing trend involving backdoored software packages found within the NPM library, indicative of an ongoing cyber operation…

Read MoreNorth Korean Cybercriminals Distributing Malware Through Phony Interviews