The Breach News

How Digital Transformation Makes Cannabis Businesses Vulnerable to Cyber Attacks – MJBizDaily

Digital Transformation Poses New Cybersecurity Risks for Cannabis Businesses Recent developments in the cannabis industry underscore a growing vulnerability as digital transformation accelerates. A recent report highlights how these advancements have inadvertently created more entry points for cybercriminals, exposing cannabis businesses to potential hacking incidents. As reliance on digital tools…

Read MoreHow Digital Transformation Makes Cannabis Businesses Vulnerable to Cyber Attacks – MJBizDaily

AWS Addresses Critical ‘FlowFixation’ Vulnerability in Airflow Service to Prevent Session Hijacking

Cybersecurity experts have recently disclosed a significant, now-resolved vulnerability in Amazon Web Services (AWS) Managed Workflows for Apache Airflow (MWAA) that could have enabled attackers to hijack user sessions and execute remote code on affected instances. This vulnerability, coined FlowFixation by the cybersecurity firm Tenable, poses alarming implications for AWS…

Read MoreAWS Addresses Critical ‘FlowFixation’ Vulnerability in Airflow Service to Prevent Session Hijacking

Hackers Leverage Accellion Zero-Day Vulnerabilities in Recent Data Theft and Extortion Incidents

Cybersecurity Incident: Accellion File Transfer Appliance Targeted by UNC2546 Cybersecurity researchers reported a significant data theft and extortion campaign linked to a series of attacks targeting Accellion File Transfer Appliance (FTA) servers. The cybercrime group identified as UNC2546 has been active in executing these attacks over the last two months.…

Read MoreHackers Leverage Accellion Zero-Day Vulnerabilities in Recent Data Theft and Extortion Incidents

Company Discovers Years-Long Breach After Hacker Overfills Server Storage

A critical breach of cybersecurity measures can have devastating implications for organizations, especially when it involves a failure to detect intrusions. InfoTrax Systems, a technology firm based in Utah, serves as a stark example. The company fell victim to multiple breaches—over 20 instances—between May 2014 and March 2016, revealing significant…

Read MoreCompany Discovers Years-Long Breach After Hacker Overfills Server Storage

Sweet Security Secures $75M for Integrated AI and Cloud Protection

Agentic AI, Artificial Intelligence & Machine Learning, Cloud Security Israeli Startup Plans to Enhance AI Agent Security Within Cloud Platforms Michael Novinson (MichaelNovinson) • November 24, 2025 Eyal Fisher, co-founder and chief product officer, Sweet Security (Image: Sweet Security) Sweet Security, an Israeli startup established by former Chief Information Security…

Read MoreSweet Security Secures $75M for Integrated AI and Cloud Protection

Common Breaches Affecting Everyone (And How to Prevent Them)

Recent headlines have been inundated with alarming reports of zero-day vulnerabilities and state-sponsored cyberattacks. However, the stark reality reveals a more mundane threat landscape. Ross Haleliuk from Venture in Security highlights the human tendency to prioritize sensational events while downplaying everyday risks, which often lead to significant damage. For instance,…

Read MoreCommon Breaches Affecting Everyone (And How to Prevent Them)

New “GoFetch” Vulnerability in Apple M-Series Chips Exposes Sensitive Encryption Keys

A significant security vulnerability has been identified in Apple’s M-series chips, enabling potential attackers to extract cryptographic keys integral to secure data operations. Known as GoFetch, this flaw relates to a microarchitectural side-channel attack that exploits the data memory-dependent prefetcher (DMP), specifically targeting constant-time cryptography implementations to covertly access sensitive…

Read MoreNew “GoFetch” Vulnerability in Apple M-Series Chips Exposes Sensitive Encryption Keys

A Comprehensive Guide to the Growing Threat of Ransomware

In today’s rapidly changing cybersecurity landscape, ransomware remains a particularly daunting challenge. It has evolved to become increasingly destructive, persistent, and difficult to combat, showing no indications of abating. Organizations that fall prey to ransomware attacks often experience extensive data loss, operational disruptions, costly recovery processes, potential legal ramifications, and…

Read MoreA Comprehensive Guide to the Growing Threat of Ransomware

T-Mobile Experiences Data Breach Impacting Prepaid Wireless Users

T-Mobile Data Breach Exposes Prepaid Customer Information T-Mobile, the prominent US telecommunications provider, has announced a data breach that has potentially compromised personal information of its prepaid service customers. Those affected are urged to take immediate action by updating or creating their account PINs or passcodes to bolster their security…

Read MoreT-Mobile Experiences Data Breach Impacting Prepaid Wireless Users