The Breach News

Cybercriminals Target Jenkins Script Console for Cryptocurrency Mining Attacks

Cybersecurity experts have identified a significant vulnerability in Jenkins, a widely-used continuous integration and delivery platform. Attackers can exploit improperly configured Jenkins Script Console instances to facilitate malicious activities, including cryptocurrency mining. Shubham Singh and Sunil Bharti from Trend Micro recently detailed this risk, noting that misconfigurations related to authentication…

Read MoreCybercriminals Target Jenkins Script Console for Cryptocurrency Mining Attacks

Fileless Malware Consuming the Computing Resources of Linux Servers

A significant cybersecurity incident is unfolding, with thousands of Linux servers across the globe falling prey to a sophisticated dropper malware. This concerning development involves the deployment of proxyjacking and cryptomining malware, indicating a dangerous shift in the tactics employed by cybercriminals. The primary targets of this attack include organizations…

Read MoreFileless Malware Consuming the Computing Resources of Linux Servers

This Week in Data/Cyber/Tech: Do Regulators Have a Duty to Act After a Personal Data Breach? | Insights

Recent Developments in Data Protection: A Look at Regulatory Compliance Post-Breach The realm of data protection is rarely devoid of noteworthy news, and the past week continued this trend with a significant ruling from the European Court of Justice (CJEU), shedding light on how regulatory enforcement may be approached in…

Read MoreThis Week in Data/Cyber/Tech: Do Regulators Have a Duty to Act After a Personal Data Breach? | Insights

SonicWall Releases Urgent Patch for Firewall Vulnerability Enabling Unauthorized Access

Critical Flaw Detected in SonicWall Firewalls, User Action Required SonicWall has issued urgent security updates to mitigate a significant vulnerability in its firewall products, which, if exploited, could allow unauthorized access to these critical network devices. The vulnerability, designated as CVE-2024-40766, has a high Common Vulnerability Scoring System (CVSS) score…

Read MoreSonicWall Releases Urgent Patch for Firewall Vulnerability Enabling Unauthorized Access

ViperSoftX Malware Camouflaged as eBooks on Torrent Sites to Launch Covert Attacks

ViperSoftX Malware Exploits eBook Distribution for Stealthy PowerShell Execution The sophisticated malware known as ViperSoftX has recently been detected in a new distribution method involving the use of eBooks shared through torrent sites. Since its first identification by Fortinet in 2020, ViperSoftX has become notorious for its ability to exfiltrate…

Read MoreViperSoftX Malware Camouflaged as eBooks on Torrent Sites to Launch Covert Attacks

Cloudflare Successfully Thwarts Unprecedented 3.8 Tbps DDoS Attack

Cloudflare Responds to Record-Breaking DDoS Attack, Mitigates Threat to Customers In a recent cybersecurity incident, internet infrastructure provider Cloudflare successfully defended against a colossal distributed denial-of-service (DDoS) attack that reached 3.8 terabits per second (Tbps) and 2.14 billion packets per second (PPS). This incident was confirmed by Matthew Prince, the…

Read MoreCloudflare Successfully Thwarts Unprecedented 3.8 Tbps DDoS Attack

Data Breach Lawsuits Anticipated to Surge in 2025, Making Fines Just the Beginning for Enterprises

Forrester’s latest report indicates that the financial consequences of data breaches are poised to expand significantly, forecasting that in 2025 the costs associated with class action lawsuits will exceed regulatory fines by 50% for organizations affected by cybersecurity incidents. As companies continue to grapple with the ramifications of cyberattacks, financial…

Read MoreData Breach Lawsuits Anticipated to Surge in 2025, Making Fines Just the Beginning for Enterprises

Google Alerts Users to Active Exploitation of Chrome Security Vulnerability CVE-2024-7965

Google Chrome Security Flaw Actively Exploited in the Wild Google recently disclosed that a significant security vulnerability patched in a software update to its Chrome browser has been identified as actively exploited in the wild. This flaw, designated CVE-2024-7965, was encapsulated within the V8 JavaScript and WebAssembly engine and was…

Read MoreGoogle Alerts Users to Active Exploitation of Chrome Security Vulnerability CVE-2024-7965

Robbery and Extortion

Emerging Threats Highlighted in 2024 Attack Intelligence Report The "2024 Attack Intelligence Report" by Rapid7 delivers critical insights into the evolving landscape of cybersecurity threats. This comprehensive report outlines alarming trends regarding vulnerabilities exploited in the past year, particularly emphasizing the dominance of zero-day vulnerabilities. Of the more than thirty…

Read MoreRobbery and Extortion