The Breach News

Researchers Unravel Encrypted Registry Keys of Qakbot Banking Trojan

Recent insights from cybersecurity researchers have provided a deeper understanding of the Qakbot banking trojan’s methods for embedding encrypted configuration data into the Windows Registry. This malware, also known by other aliases including QBot, QuackBot, and Pinkslipbot, has been present since 2007, initially designed for information theft but evolving to…

Read MoreResearchers Unravel Encrypted Registry Keys of Qakbot Banking Trojan

Play Ransomware Takes a Commercial Turn: Now Available as a Service for Cybercriminals

Recent investigations by Adlumin have uncovered that the Play ransomware strain is now available as a ransomware-as-a-service (RaaS) model, significantly altering the landscape of cyber threats. This shift allows various cybercriminals to utilize the ransomware by following detailed, step-by-step instructions provided with their purchase. According to Adlumin’s report, the marked…

Read MorePlay Ransomware Takes a Commercial Turn: Now Available as a Service for Cybercriminals

Chinese Actor Sets Sights on Russian IT Provider

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Symantec Identifies Potential Supply Chain Attack Anviksha More (AnvikshaMore) • October 15, 2025 The border crossing between China and Russia, near Manzhouli. (Image: B.Panupong/Shutterstock) Recent findings from cybersecurity firm Symantec reveal that suspected hackers linked to the Chinese government have breached the…

Read MoreChinese Actor Sets Sights on Russian IT Provider

Capita Hit with $19 Million Fine Following 2023 Cyber Breach – Communications Today

UK’s Capita Fined $19 Million for 2023 Cyber Breach In a significant enforcement action this week, British multinational outsourcing and professional services company Capita has been issued a large fine totaling $19 million due to a cyber breach that occurred earlier in 2023. This incident has raised alarms about the…

Read MoreCapita Hit with $19 Million Fine Following 2023 Cyber Breach – Communications Today

Reimagining ActiveState: Unveiling Our Comprehensive OS Platform

ActiveState Unveils Enhanced Platform to Address Open Source Security Challenges ActiveState, a prominent player in the open source management space, has announced the launch of a new end-to-end platform designed to tackle the complexities of managing open source software within large enterprises. With nearly a decade’s experience in supporting organizations…

Read MoreReimagining ActiveState: Unveiling Our Comprehensive OS Platform

North Korean Hackers Steal Millions from Global Cryptocurrency Startups

Recent intelligence reveals that operators linked to the Lazarus group’s BlueNoroff sub-group have orchestrated a series of cyberattacks targeting small and medium-sized enterprises across the globe. The objective of these attacks is to siphon cryptocurrency assets, marking a significant maneuver by this recognized North Korean state-sponsored actor. Kaspersky, a prominent…

Read MoreNorth Korean Hackers Steal Millions from Global Cryptocurrency Startups

Top 3 VPNs for iPhone (2025): Thoroughly Tested and Reviewed

Alternative iPhone VPNs Evaluated Surfshark: Surfshark emerged as a notable contender among VPN services. Its Starter plan includes useful features, notably a masked email generator, alongside standard offerings such as ad and tracker blocking and unlimited simultaneous connections. However, the service exhibited slightly slower speeds, averaging around a 20% reduction,…

Read MoreTop 3 VPNs for iPhone (2025): Thoroughly Tested and Reviewed

AI Solutions: The New Frontier of Shadow IT

Ambitious Employees Tout New AI Tools, Overlook Significant SaaS Security Risks As organizations increasingly adopt AI technologies, IT security teams, including Chief Information Security Officers (CISOs), face challenges reminiscent of earlier shadow IT concerns related to Software as a Service (SaaS). Employees are discreetly integrating AI applications into their workflows…

Read MoreAI Solutions: The New Frontier of Shadow IT

Getting Ready for the Transition to Post-Quantum Cryptography

Encryption & Key Management, Security Operations, Video Zulfikar Ramzan of Point Wild Emphasizes the Importance of Cryptography in the Face of Quantum Challenges Akshaya Asokan (asokan_akshaya) • October 15, 2025 Zulfikar Ramzan, Chief Technology Officer, Point Wild Cybersecurity firms are increasingly advocating for a heightened focus on resilience, particularly in…

Read MoreGetting Ready for the Transition to Post-Quantum Cryptography