The Breach News

Lazarus Group Integrates New BeaverTail Variant into Developer Tools

On December 18, 2025, cybersecurity firm Darktrace unveiled new findings regarding a perilous variant of BeaverTail malware, classified as a JavaScript-based information stealer. This malware, associated with North Korea’s infamous Lazarus Group, is part of a growing wave of cyber-attacks directed at the financial and cryptocurrency sectors. The research, disseminated…

Read MoreLazarus Group Integrates New BeaverTail Variant into Developer Tools

Urgent Zero-Day Vulnerability in Apache OfBiz ERP Poses Security Risk to Businesses

Zero-Day Vulnerability Discovered in Apache OfBiz ERP System A serious zero-day vulnerability has been identified in Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. This flaw poses significant risks as it could potentially allow attackers to bypass essential authentication safeguards. The vulnerability is classified as CVE-2023-51467, linked specifically to…

Read MoreUrgent Zero-Day Vulnerability in Apache OfBiz ERP Poses Security Risk to Businesses

The Hyper-Realistic AI Face Swapping Platform Fueling Romance Scams

AI Face-Swapping App Linked to Cybercrime in Southeast Asia The artificial intelligence application Haotian, designed for face-swapping capabilities, has emerged as a major player in the realm of online fraud. This Chinese-language app has reportedly generated millions of dollars by providing its technology through platforms like Telegram, facilitating integration with…

Read MoreThe Hyper-Realistic AI Face Swapping Platform Fueling Romance Scams

5 Essential Cybersecurity Steps for Every SMB

Fraud Management & Cybercrime, Governance & Risk Management, Multi-factor & Risk-based Authentication Practical Steps to Enhance Security and Resilience Sean D. Mack • December 17, 2025 Image: Shutterstock Leaders of small and mid-sized enterprises (SMEs) frequently assert, “We’re too small to be a target.” This misconception endangers their organizations, especially…

Read More5 Essential Cybersecurity Steps for Every SMB