The Breach News

Exclusive: KT Subcontractor Exposes Customer Data, Blame Redirected by KT – Chosun Ilbo

KT Subcontractor Data Leak Sparks Controversy In a concerning development in the cybersecurity landscape, a subcontractor affiliated with South Korea’s KT Corporation has reportedly leaked sensitive customer data. The breach has led to significant scrutiny of KT’s security measures, as the company attempts to deflect responsibility for the incident. The…

Read MoreExclusive: KT Subcontractor Exposes Customer Data, Blame Redirected by KT – Chosun Ilbo

Linux Variant of DinodasRAT Identified in Cyber Attacks Worldwide

A newly identified Linux variant of a multi-platform backdoor known as DinodasRAT has emerged, actively targeting regions including China, Taiwan, Turkey, and Uzbekistan, according to recent findings by Kaspersky. DinodasRAT, also recognized as XDealer, is a C++-based malware specifically designed to extract various sensitive data from compromised systems. This variant…

Read MoreLinux Variant of DinodasRAT Identified in Cyber Attacks Worldwide

Microsoft Exchange Cyber Attack: Current Insights and Updates

On Friday, Microsoft issued a grave warning regarding the active exploitation of vulnerabilities in unpatched Microsoft Exchange Servers affecting numerous organizations globally. The cyberattack campaigns reportedly compromise tens of thousands of businesses and government bodies across the United States, Europe, and Asia. The company’s security team reported a significant escalation…

Read MoreMicrosoft Exchange Cyber Attack: Current Insights and Updates

Download: 2020 Survey Results on Security Breach Protection Insights

In the ever-evolving landscape of cybersecurity, decision-makers face multifaceted challenges in breach protection strategies for 2020. A survey titled The State of Breach Protection 2020 gathered insights from 1,536 cybersecurity professionals, shedding light on best practices and emerging trends. Security executives are currently navigating a complex threat environment, grappling with…

Read MoreDownload: 2020 Survey Results on Security Breach Protection Insights

Is Your Medical Device Secure? Ensure Proper Contract Language

Endpoint Security, Governance & Risk Management, Healthcare HSCC’s Updated Model Contract Aims for Shared Cyber Risk Among Providers and Device Manufacturers Marianne Kolbasuk McGee (HealthInfoSec) • November 21, 2025 The HSCC’s revised model contract for medical device cybersecurity is designed to aid healthcare entities and manufacturers in negotiating shared risks…

Read MoreIs Your Medical Device Secure? Ensure Proper Contract Language

Harvard Cyberattack: Data Breach Exposes Records of Alumni, Donors, Students, and Faculty—The Full Story, Affected Individuals, and Harvard’s Response

Harvard Cyberattack: Data Breach Exposes Sensitive Records A recent cyberattack at Harvard University has compromised the personal records of alumni, donors, students, and faculty members, following a sophisticated phone-based phishing scheme. The breach has raised extensive concerns regarding the university’s cybersecurity measures, as it is reported to have accessed critical…

Read More

Harvard Cyberattack: Data Breach Exposes Records of Alumni, Donors, Students, and Faculty—The Full Story, Affected Individuals, and Harvard’s Response

Critical New Linux Vulnerability May Expose User Passwords and Enable Clipboard Hijacking

Recent reports have unveiled a significant vulnerability concerning the “wall” command within the util-linux package, which presents risks for users across various Linux distributions. This flaw has the potential to be exploited by a malicious actor to either leak user passwords or manipulate the clipboard. The vulnerability, identified as CVE-2024-28085…

Read MoreCritical New Linux Vulnerability May Expose User Passwords and Enable Clipboard Hijacking

Iranian Hackers Employ Remote Utilities Software for Espionage Activities

Recent cybersecurity investigations have revealed that hackers believed to be affiliated with Iran are intensively targeting academic institutions, government bodies, and tourism organizations throughout the Middle East and its neighboring countries. This campaign appears to be focused on espionage and data theft. Trend Micro has named this operation “Earth Vetala,”…

Read MoreIranian Hackers Employ Remote Utilities Software for Espionage Activities