The Breach News

Inside Jeffrey Epstein’s Yahoo Inbox: Uncovered Details

Recent developments have emerged regarding the handling of sealed documents related to Jeffrey Epstein, sparking discussions around potential pardons. Within this context, Ghislaine Maxwell’s correspondence has positioned her as more than just Epstein’s associate; it highlights her extensive efforts to solidify her connections with influential figures. A freshly unsealed warrant…

Read MoreInside Jeffrey Epstein’s Yahoo Inbox: Uncovered Details

Sticky Werewolf Utilizes Undocumented Implant to Distribute Lumma Stealer in Russia and Belarus

Sticky Werewolf: A New Wave of Cyberattacks Targeting Russia and Belarus The cybersecurity landscape has recently seen the emergence of a new threat actor known as Sticky Werewolf. This group is linked to targeted cyber operations primarily aimed at organizations in Russia and Belarus, utilizing a newly identified implant designed…

Read MoreSticky Werewolf Utilizes Undocumented Implant to Distribute Lumma Stealer in Russia and Belarus

Massive Leak: 500GB of Source Code and Documents from China’s Great Firewall Exposed Online — Censorship Tool Sold to Three Nations

On September 11, a significant data breach emerged in the realm of Chinese censorship, as researchers unveiled an extensive leak of over 500GB of internal documents, source code, work logs, and communications related to the infamous Great Firewall. This leak, which includes essential operational runbooks and deployment repositories for the…

Read MoreMassive Leak: 500GB of Source Code and Documents from China’s Great Firewall Exposed Online — Censorship Tool Sold to Three Nations

Zero-Day Alert: Google Issues Chrome Patch for Exploit Linked to Russian Espionage Attacks

Google has issued urgent out-of-band security updates to rectify a critical vulnerability in its Chrome browser for Windows. This flaw, designated as CVE-2025-2783 (CVSS score: 8.3), has reportedly been exploited in real-world phishing attacks aimed primarily at organizations in Russia. Described as stemming from an “incorrect handle provided in unspecified…

Read MoreZero-Day Alert: Google Issues Chrome Patch for Exploit Linked to Russian Espionage Attacks

HybridPetya Ransomware Bypasses UEFI Secure Boot

Endpoint Security, Hardware / Chip-level Security Eset Uncovers New Malware Variant, HybridPetya Anviksha More (AnvikshaMore) • September 12, 2025 Image: Shutterstock Security researchers at Eset have recently identified a new variant of malware reminiscent of the notorious Petya/NotPetya, which they have named “HybridPetya.” This insight was shared on Friday, emphasizing…

Read MoreHybridPetya Ransomware Bypasses UEFI Secure Boot

Qrator Labs Successfully Mitigates L7 DDoS Attack from 5.76 Million-Device Botnet

In early September 2023, Qrator Labs identified and successfully mitigated one of the year’s most consequential Layer 7 DDoS attacks, executed by what is currently recognized as the largest botnet in existence. This attack targeted a government organization and exploited 5.76 million compromised Internet of Things (IoT) devices, among other…

Read MoreQrator Labs Successfully Mitigates L7 DDoS Attack from 5.76 Million-Device Botnet

Sussex Police Faces Over 400 Data Breaches Since 2022, Compensates Successful Claimants – SussexWorld

Sussex Police Reports Over 400 Data Breaches Since 2022, Compensation Claims Filed Sussex Police has revealed that they have experienced more than 400 data breaches since the beginning of 2022, resulting in financial compensation for several claims that were successfully filed by affected parties. This alarming trend raises critical questions…

Read MoreSussex Police Faces Over 400 Data Breaches Since 2022, Compensates Successful Claimants – SussexWorld

EncryptHub Exploits Windows Zero-Day Vulnerability to Deploy Rhadamanthys and StealC Malware

Recent revelations indicate that the threat actor identified as EncryptHub has effectively taken advantage of a recently patched security vulnerability in Microsoft Windows, designated as a zero-day flaw, to deploy a range of malicious software. This includes information-stealing tools like Rhadamanthys and StealC, alongside traditional backdoor implementations, raising significant alarm…

Read MoreEncryptHub Exploits Windows Zero-Day Vulnerability to Deploy Rhadamanthys and StealC Malware