The Breach News

Hackers Exploit TCP Middlebox Reflection for Amplified DDoS Attacks

A new amplification technique in distributed denial-of-service (DDoS) attacks, termed TCP Middlebox Reflection, has been identified for the first time in real-world scenarios, a development following its theoretical introduction six months prior. According to a report from Akamai, the TCP Middlebox Reflection attack exploits vulnerabilities in firewalls and content filtering…

Read MoreHackers Exploit TCP Middlebox Reflection for Amplified DDoS Attacks

Hackers Take Advantage of RMM Tools to Distribute Malware

Cybercrime, Fraud Management & Cybercrime Surge in Attacks on RMM Tools in 2025: 51 Solutions Identified as Targets Brian Pereira (creed_digital) • October 7, 2025 Image: Shutterstock Remote Monitoring and Management (RMM) tools, originally adopted for widespread remote work during the COVID pandemic, are increasingly becoming instruments for cybercriminals. Once…

Read MoreHackers Take Advantage of RMM Tools to Distribute Malware

Renault Alerts UK Customers About Data Breach Involving Third-Party Supplier

Stolen Data May Fuel Targeted Phishing Campaigns, Experts Caution Renault has informed a number of UK customers that their personal information may have been compromised as a result of a cyberattack on one of its third-party suppliers. The car manufacturer’s notification follows an incident that has raised concerns about the…

Read MoreRenault Alerts UK Customers About Data Breach Involving Third-Party Supplier

Russia Publishes List of IPs and Domains Targeting Its Infrastructure with DDoS Attacks

Russia Releases Extensive List of Alleged Cyberattack Sources Amid Ongoing Conflict As the Russia-Ukraine conflict intensifies, the Russian government has unveiled a significant list of 17,576 IP addresses and 166 domains purportedly linked to a series of distributed denial-of-service (DDoS) attacks targeting its domestic infrastructure. Released on Thursday by the…

Read MoreRussia Publishes List of IPs and Domains Targeting Its Infrastructure with DDoS Attacks

The SEC’s New SaaS Cybersecurity Rules: Challenges for CISOs Explained

The U.S. Securities and Exchange Commission (SEC) is taking a firm stance on the cybersecurity posture of Software as a Service (SaaS) providers and their clients. Publicly traded companies, referred to as ‘registrants’, are now required to disclose cyber incidents and demonstrate their readiness to manage cybersecurity threats, including those…

Read MoreThe SEC’s New SaaS Cybersecurity Rules: Challenges for CISOs Explained

Western Sydney University Declares Emails About ‘Revoked’ Degrees as ‘Fraudulent’

Cybersecurity Incident at Western Sydney University: Fraudulent Emails Impacting Graduates Western Sydney University (WSU) has issued an apology to current and former students following the distribution of fraudulent emails that falsely claimed their degrees had been revoked. In a detailed communication attributed to the Policy Compliance Board of Trustees, the…

Read MoreWestern Sydney University Declares Emails About ‘Revoked’ Degrees as ‘Fraudulent’

Mirai Variant Murdoc Botnet Targets AVTECH IP Cameras and Huawei Routers

Cybersecurity experts have recently identified an extensive campaign designed to exploit vulnerabilities in AVTECH IP cameras and Huawei HG532 routers. This initiative has been largely successful in integrating these devices into a variant of the Mirai botnet known as the Murdoc Botnet. The ongoing operations reflect a significant escalation in…

Read MoreMirai Variant Murdoc Botnet Targets AVTECH IP Cameras and Huawei Routers