The Breach News

Understanding How eFail Attacks Exploit PGP and S/MIME Encrypted Emails

Security researchers have urgently disclosed a set of vulnerabilities affecting email clients that utilize two prominent email encryption standards, PGP and S This disclosure follows the inadvertent leak of their forthcoming research paper, which was initially scheduled for release tomorrow. PGP and S/MIME serve as widely adopted end-to-end encryption protocols,…

Read MoreUnderstanding How eFail Attacks Exploit PGP and S/MIME Encrypted Emails

Ashley Madison 2.0: Hackers Release 20GB Data Leak, Featuring CEO Emails

Major Data Exposure: Ashley Madison Suffers Extensive Breach In a significant cybersecurity incident, the hacking collective known as the Impact Team has struck again, releasing a vast cache of sensitive information linked to Ashley Madison, a well-known dating service for those seeking extramarital affairs. This latest breach includes nearly 20GB…

Read MoreAshley Madison 2.0: Hackers Release 20GB Data Leak, Featuring CEO Emails

Social Engineering Attackers Target Okta’s Single Sign-On System

Fraud Management & Cybercrime, Identity & Access Management, Security Operations ShinyHunters Campaign Utilizes Voice Phishing to Circumvent MFA and Compromise Corporate Data Mathew J. Schwartz (euroinfosec) • January 28, 2026 Image: Oleksandr Yashchuk/Shutterstock Security experts are advising customers of identity provider Okta utilizing its single-sign-on (SSO) services to remain vigilant…

Read MoreSocial Engineering Attackers Target Okta’s Single Sign-On System

⚠️ Warning! Hackers Targeting Severe Vulnerability in VMware Aria Operations Networks

VMware has announced that a critical command injection vulnerability, designated as CVE-2023-20887, in Aria Operations for Networks (formerly known as vRealize Network Insight), is currently being exploited in the wild. This breach allows attackers with network access to perform command injection attacks, potentially leading to remote code execution. The vulnerability…

Read More⚠️ Warning! Hackers Targeting Severe Vulnerability in VMware Aria Operations Networks

Nethammer: Leveraging the DRAM Rowhammer Vulnerability via Network Requests

Recent advancements in cyber-attack methodologies have seen the emergence of a novel network-based variant of the notorious Rowhammer attack, referred to as “Nethammer.” This approach exploits vulnerabilities in dynamic random access memory (DRAM) through network cards, and it capitalizes on remote direct memory access (RDMA) channels to manipulate memory states…

Read MoreNethammer: Leveraging the DRAM Rowhammer Vulnerability via Network Requests

Ashley Madison Hackers Strike Again with 300GB Data Dump – Hold On, Cheaters! This Isn’t Over Yet!

Cybersecurity Breach at Ashley Madison: Major Data Leak Exposed Recently, Ashley Madison, the notorious dating service known for facilitating extramarital affairs, faced a significant cybersecurity breach that has raised alarms across the tech industry. Over a month ago, a group of hackers known as the Impact Team compromised Ashley Madison…

Read MoreAshley Madison Hackers Strike Again with 300GB Data Dump – Hold On, Cheaters! This Isn’t Over Yet!