The Breach News

APT Hackers Spread Android Trojan Through Syrian e-Government Portal

A sophisticated threat actor has been identified in a recent campaign utilizing Android malware disseminated through the Syrian e-Government Web Portal. This marks a significant evolution in the actor’s toolkit, reflecting an enhanced capability to exploit vulnerabilities for malicious purposes. According to researchers from Trend Micro—Zhengyu Dong, Fyodor Yarochkin, and…

Read MoreAPT Hackers Spread Android Trojan Through Syrian e-Government Portal

India’s Newest Airline, Akasa Air, Exposes Passengers’ Personal Information

Akasa Air, the latest entrant in India’s aviation sector, has reported a significant data breach attributed to a technical configuration flaw. The incident exposed sensitive personal information of customers, raising serious concerns about cybersecurity within the rapidly growing airline. Security researcher Ashutosh Barot uncovered the vulnerability during the airline’s inaugural…

Read MoreIndia’s Newest Airline, Akasa Air, Exposes Passengers’ Personal Information

Healey Advocates for Required Reporting of Municipal Cyberattacks; Two Cape Towns Targeted in January – Cape Cod Times

Healey Advocates for Mandatory Reporting of Cyberattacks Amid January Incidents in Cape Cod In a recent development underscoring the escalating threat of cyberattacks on municipal entities, Massachusetts Governor Maura Healey has called for the implementation of mandatory reporting requirements for such incidents. This initiative follows significant cyber breaches that impacted…

Read MoreHealey Advocates for Required Reporting of Municipal Cyberattacks; Two Cape Towns Targeted in January – Cape Cod Times

Researchers Uncover ‘Deceptive Delight’ Technique for Bypassing AI Models

Cybersecurity Researchers Uncover New Jailbreak Technique for AI Models Recent findings by cybersecurity experts at Palo Alto Networks’ Unit 42 have revealed a novel adversarial approach known as “Deceptive Delight,” capable of bypassing the safety measures of large language models (LLMs) during interactive dialogues. By interspersing harmful instructions within benign…

Read MoreResearchers Uncover ‘Deceptive Delight’ Technique for Bypassing AI Models

Hackers Posed as Aerobics Instructors for Years to Target Aerospace Workers

Iranian Cyber Espionage Group Targets Aerospace Defense Sector with Social Engineering Tactics An Iranian cyber espionage group has been implicated in a sophisticated attack designed to plant malware on the systems of an employee at an aerospace defense contractor. This operation, which has transpired over several years, underscores the evolving…

Read MoreHackers Posed as Aerobics Instructors for Years to Target Aerospace Workers

Australia’s Scam Prevention Framework: The Burst Bubble

Fraud Management & Cybercrime, Fraud Risk Management Treasury Yet to Release Sector-Specific Controls and Reimbursement Mechanisms Suparna Goswami (gsuparna) • October 29, 2025 Image: Evanto Elements In a significant move earlier this year, Australia implemented a pioneering scam prevention law designed to position the nation as an unwelcoming environment for…

Read MoreAustralia’s Scam Prevention Framework: The Burst Bubble