The Breach News

PCPcat Operation Compromises 59,000 React Servers

Operation PCPcat: A Large-Scale Cyber Espionage Campaign Disrupts Web Infrastructure In a significant cyber espionage event labeled Operation PCPcat, over 59,000 servers have been compromised within a mere 48 hours, exposing vulnerabilities in modern web architectures. This operation predominantly targets platforms utilizing React frameworks, specifically Next.js and React Servers, leading…

Read MorePCPcat Operation Compromises 59,000 React Servers

New MIPS Variant of P2PInfect Botnet Targeting Routers and IoT Devices

Recent reports from cybersecurity experts have indicated the emergence of a sophisticated variant of the P2PInfect botnet, which has shown the ability to target both routers and Internet of Things (IoT) devices. This new iteration has been identified by Cado Security Labs as specifically tailored for Microprocessor without Interlocked Pipelined…

Read MoreNew MIPS Variant of P2PInfect Botnet Targeting Routers and IoT Devices

Targeted Phishing Attacks Compromise Over 150 Top Executives Across Companies

Recent reports indicate that multiple attack groups have successfully breached corporate email accounts belonging to at least 156 high-ranking executives across various firms located in Germany, the UK, Netherlands, Hong Kong, and Singapore. This campaign has been identified as **PerSwaysion**, which has utilized Microsoft’s file-sharing services—specifically Sway, SharePoint, and OneNote—to…

Read MoreTargeted Phishing Attacks Compromise Over 150 Top Executives Across Companies

22-Year-Old Hacker Confesses to Role in 2014 Yahoo Breach, Acknowledges Assistance to Russian Intelligence

Kazakhstan-Born Hacker Enters Guilty Plea in Massive Yahoo Data Breach Karim Baratov, a 22-year-old Canadian citizen originally from Kazakhstan, has pleaded guilty to charges stemming from a significant data breach that compromised all three billion Yahoo accounts in 2014. The U.S. Justice Department previously announced charges against Russian intelligence officers…

Read More22-Year-Old Hacker Confesses to Role in 2014 Yahoo Breach, Acknowledges Assistance to Russian Intelligence

CISA Urges OT Operators to Pause and Consider AI Impacts

Artificial Intelligence & Machine Learning, Critical Infrastructure Security, Next-Generation Technologies & Secure Development International Coalition Warns of Security Risks in Operational Technology’s Transition to AI Shaun Waterman • December 23, 2025 Image: DC Studio/Shutterstock The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and its international partners have issued a cautionary…

Read MoreCISA Urges OT Operators to Pause and Consider AI Impacts

Beyond Penalties: Rethinking Korea’s Response to Coupang’s Data Breach and Accountability Issues

Coupang Data Breach Highlights Cybersecurity Shortcomings and Regulatory Challenges A significant data breach at Coupang, one of South Korea’s largest e-commerce platforms, has raised critical concerns about the company’s approach to cybersecurity and its accountability in safeguarding customer information. This incident is noteworthy not just as a cybersecurity issue but…

Read MoreBeyond Penalties: Rethinking Korea’s Response to Coupang’s Data Breach and Accountability Issues

Hackers Compromise LineageOS, Ghost, and DigiCert Servers Exploiting SaltStack Vulnerability

Shortly after cybersecurity researchers raised warnings about two significant vulnerabilities in the SaltStack configuration framework, an ongoing campaign has already begun exploiting these flaws, targeting organizations such as LineageOS, Ghost, and DigiCert. The vulnerabilities, identified as CVE-2020-11651 and CVE-2020-11652, permit attackers to execute arbitrary code on remote servers operating within…

Read MoreHackers Compromise LineageOS, Ghost, and DigiCert Servers Exploiting SaltStack Vulnerability

Chinese Crypto Scammers on Telegram Are Driving the Growth of the Largest Darknet Markets Yet

The emergence of black markets for illegal goods, including drugs and weapons, began on the dark web over a decade ago, leveraging cryptocurrencies and anonymity tools like Tor. At that time, these innovations facilitated the execution of vast, untraceable online transactions valued in the billions. Fast forward to 2025, and…

Read MoreChinese Crypto Scammers on Telegram Are Driving the Growth of the Largest Darknet Markets Yet