The Breach News

First Choice Dental Data Breach: $1.2 Million Settlement — Patients May Claim Up to $6,000! Here’s How.

Urgent: Dental Patients Have Less Than Two Weeks to Claim from $1.2 Million Settlement Dental patients impacted by a significant data breach at First Choice Dental have until January 28, 2026, to submit claims for compensation stemming from the incident. The settlement, totaling $1.2 million, comes after unauthorized access to…

Read MoreFirst Choice Dental Data Breach: $1.2 Million Settlement — Patients May Claim Up to $6,000! Here’s How.

Norwegian Entities Under Attack: Exploiting Ivanti EPMM Vulnerability

Recent intelligence reports have revealed that advanced persistent threat (APT) actors have been actively exploiting a critical vulnerability in the Ivanti Endpoint Manager Mobile (EPMM) since at least April 2023. These attacks have specifically targeted entities in Norway, including governmental networks, prompting urgent advisories from cybersecurity authorities. This information was…

Read MoreNorwegian Entities Under Attack: Exploiting Ivanti EPMM Vulnerability

Researchers Create Stealthy Malware Enhanced by Artificial Intelligence

Artificial Intelligence (AI) has emerged as a double-edged sword in cybersecurity. While it presents a promising avenue for identifying and mitigating malware threats before they can impact organizations, it can also be exploited by cyber adversaries to develop a new class of malware that can bypass state-of-the-art defenses. Such sophisticated…

Read MoreResearchers Create Stealthy Malware Enhanced by Artificial Intelligence

Hackers Target Apple Employees with $23,000 Bounty for Corporate Login Information

The landscape of cybersecurity continues to evolve, with internal threats emerging as a significant concern for organizations. A recent event exemplifies this: cybercriminals are reportedly targeting Apple employees in Ireland, enticing them with offers of €20,000 (approximately $23,000) in exchange for their login credentials. This initiative, part of an intricate…

Read MoreHackers Target Apple Employees with $23,000 Bounty for Corporate Login Information

Two Business Associate Data Breaches Impact Tens of Thousands of Patients – The HIPAA Journal

Significant Data Breaches Impact Tens of Thousands of Patients In a troubling development within the healthcare sector, two separate data breaches involving business associates have resulted in the exposure of sensitive patient information, affecting tens of thousands of individuals. The incidents highlight ongoing vulnerabilities in data security practices across the…

Read MoreTwo Business Associate Data Breaches Impact Tens of Thousands of Patients – The HIPAA Journal

Phishers Take Advantage of Salesforce’s Email Services Zero-Day in Targeted Facebook Attack

A sophisticated phishing campaign targeting Facebook users has been detected, exploiting a critical zero-day vulnerability within Salesforce’s email services. This exploit enables malicious actors to craft highly tailored phishing messages utilizing Salesforce’s domain and infrastructure, significantly increasing the chances of success. Researchers at Guardio Labs, Oleg Zaytsev and Nati Tal,…

Read MorePhishers Take Advantage of Salesforce’s Email Services Zero-Day in Targeted Facebook Attack

Cybercriminals Can Breach Your Network Simply by Sending a Fax

Recent research has unveiled alarming vulnerabilities concerning fax machines that could be exploited by remote attackers using nothing more than a fax number. Check Point researchers have pinpointed two critical remote code execution (RCE) vulnerabilities embedded within the communication protocols of millions of fax machines worldwide. Contrary to the perception…

Read MoreCybercriminals Can Breach Your Network Simply by Sending a Fax

Mastang Panda Exploits Venezuela News to Distribute LOTUSLITE Malware

Researchers at the Acronis Threat Research Unit (TRU) have uncovered a troubling trend where hackers are exploiting current news headlines to target U.S. government entities. Eschewing complex exploits, these cybercriminals utilize a more straightforward method: leveraging public curiosity about current events. In a report by Ilia Dafchev and Subhajeet Singha,…

Read MoreMastang Panda Exploits Venezuela News to Distribute LOTUSLITE Malware