The Breach News

Hardware Hackers Encourage Vendor Collaboration for Enhanced Security

Endpoint Security, Hardware / Chip-level Security Experts Highlight Advantages of Bug Bounties and Researcher Engagement Mathew J. Schwartz (@euroinfosec) • November 21, 2025 Image: Shutterstock While hardware once stood as a cornerstone of trustworthy systems, ongoing concerns over compromised supply chains and security vulnerabilities have significantly diminished that trust. As…

Read MoreHardware Hackers Encourage Vendor Collaboration for Enhanced Security

CrowdStrike Terminates Employee Following Suspected Data Breach Tied to Cybercriminal Organization

CrowdStrike, a leading player in the cybersecurity sector, recently terminated the employment of an insider alleged to have leaked confidential information. The action was taken after a cybercriminal group claimed to have accessed CrowdStrike’s internal systems. This breach occurred amid rising concerns over insider threats within the cybersecurity landscape. On…

Read MoreCrowdStrike Terminates Employee Following Suspected Data Breach Tied to Cybercriminal Organization

Urgent: Hidden Backdoor Discovered in XZ Utils Library, Affects Major Linux Distributions

Red Hat Issues Urgent Security Alert Following Backdoor Discovery in XZ Utils On Friday, Red Hat issued an urgent security alert, revealing a critical security vulnerability involving two versions of the widely-used data compression library known as XZ Utils, previously LZMA Utils. This vulnerability allows malicious actors to gain unauthorized…

Read MoreUrgent: Hidden Backdoor Discovered in XZ Utils Library, Affects Major Linux Distributions

Hackers Target European Banking Authority in Microsoft Exchange Breach

On Sunday, the European Banking Authority (EBA) reported a cyberattack that compromised its Microsoft Exchange Servers. As a precautionary step, the agency took its email systems offline temporarily. This incident raises significant concerns as it may have allowed unauthorized access to personal data stored in emails. The EBA, located in…

Read MoreHackers Target European Banking Authority in Microsoft Exchange Breach

How to Determine if Your Asus Router is Among Those Hacked by State-Sponsored Chinese Hackers

Thousands of Asus routers have been compromised, falling under the control of a suspected state-sponsored group from China. This recent wave of hacking has primarily targeted seven specific models of Asus routers, all of which no longer receive security updates from the manufacturer, according to researchers at SecurityScorecard. The operation,…

Read MoreHow to Determine if Your Asus Router is Among Those Hacked by State-Sponsored Chinese Hackers

U.S. Accuses Four Chinese Military Hackers in Equifax Data Breach Case

The United States Department of Justice has officially charged four members of the Chinese military for their alleged role in the significant Equifax data breach, resulting in the exposure of sensitive personal and financial information of nearly 150 million Americans. In a press conference spearheaded by Attorney General William Barr…

Read MoreU.S. Accuses Four Chinese Military Hackers in Equifax Data Breach Case

Chinese APT24 Unveils Custom Malware and Innovative Stealth Tactics

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime, Government Three-Year Espionage Campaign Targets Taiwanese Firms Akshaya Asokan (asokan_akshaya) • November 21, 2025 (Image: Shutterstock) Security researchers have uncovered a multi-year espionage operation attributed to a hacking group with suspected ties to the Chinese government. This sustained campaign, lasting three years,…

Read MoreChinese APT24 Unveils Custom Malware and Innovative Stealth Tactics

Salesforce Disassociates from Gainsight-Published Applications

Salesforce Detects Unauthorized Activity Linked to Gainsight Applications On November 21, Salesforce informed its customers of unusual activity tied to applications developed by Gainsight, which are directly managed by users. The detection of this atypical behavior raised concerns regarding potential unauthorized access to sensitive Salesforce data through its connection with…

Read MoreSalesforce Disassociates from Gainsight-Published Applications

Vulnerability in XZ Utils for Linux Systems Allows Remote Code Execution

Significant Supply Chain Attack Discovered in XZ Utils, Posing Serious Risks to Linux Users A profound security threat has emerged following the discovery of malicious code inserted into XZ Utils, an open-source library used extensively in numerous major Linux distributions. This vulnerability, identified as CVE-2024-3094 and given a critical CVSS…

Read MoreVulnerability in XZ Utils for Linux Systems Allows Remote Code Execution