The Breach News

CISA Issues Alert on Active Exploitation of Vulnerabilities in Zyxel, ProjectSend, and CyberPanel

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has officially included several vulnerabilities affecting Zyxel, ProjectSend, North Grid Proself, and CyberPanel in its Known Exploited Vulnerabilities (KEV) catalog. This decision follows evidence of these vulnerabilities being actively exploited in the wild, raising alarms for businesses utilizing these products. Among the…

Read MoreCISA Issues Alert on Active Exploitation of Vulnerabilities in Zyxel, ProjectSend, and CyberPanel

Microsoft Takes Control of 42 Malicious Websites Operated by Chinese Hackers

Microsoft recently disclosed the successful seizure of 42 malicious domains linked to a China-based cyber espionage group, targeting organizations in the United States and 28 other nations. This operation followed a legal warrant issued by a federal court in Virginia, affirming the need to counteract these threats. The group, referred…

Read MoreMicrosoft Takes Control of 42 Malicious Websites Operated by Chinese Hackers

Insights from the Massive AWS Outage on the State of the Internet

A significant outage affecting Amazon Web Services’ US-EAST-1 region, located in northern Virginia, resulted in extensive disruptions to numerous websites and online platforms globally on Monday morning. Amazon’s primary e-commerce site, alongside services such as Ring doorbells and the Alexa smart assistant, experienced substantial interruptions. Other affected platforms included Meta’s…

Read MoreInsights from the Massive AWS Outage on the State of the Internet

F5 Security Breach, Linux Rootkits, Pixnapping Threats, EtherHiding, and More

Recent revelations in cybersecurity highlight the increasing prevalence of long-term breaches, which often go unnoticed until substantial damage is done. A striking example is the incident involving F5, a significant player in the application delivery and security space. On August 9, 2025, F5 announced that unidentified threat actors had infiltrated…

Read MoreF5 Security Breach, Linux Rootkits, Pixnapping Threats, EtherHiding, and More

Cybersecurity Agencies Issue Warning on IDOR Vulnerabilities Used in Data Breaches

Recent advisories issued by cybersecurity agencies in both Australia and the United States have exposed critical vulnerabilities present in web applications that could be exploited by cybercriminals, risking data breaches and the theft of sensitive information. The joint advisory particularly underscores the threat posed by Insecure Direct Object Reference (IDOR)…

Read MoreCybersecurity Agencies Issue Warning on IDOR Vulnerabilities Used in Data Breaches