The Breach News

Red Hat Data Breach Intensifies as ShinyHunters Enters Extortion Efforts

Red Hat, a prominent player in the enterprise software sector, is currently facing extortion threats from a hacking group known as ShinyHunters. The group has made headlines after leaking portions of stolen Customer Engagement Reports (CERs) on a data leak platform. These reports contain sensitive information that could jeopardize the…

Read MoreRed Hat Data Breach Intensifies as ShinyHunters Enters Extortion Efforts

Oracle Unveils January 2025 Patch to Fix 318 Vulnerabilities in Key Products

Oracle has announced an urgent advisory urging its customers to implement the January 2025 Critical Patch Update (CPU) to resolve 318 newly identified security vulnerabilities across its product suite. This substantial release underscores the growing challenges in maintaining software security amid escalating threats. Among the vulnerabilities disclosed, the most critical…

Read MoreOracle Unveils January 2025 Patch to Fix 318 Vulnerabilities in Key Products

Russian Hackers Use Phishing Attacks to Target Ukrainians and European Allies, Says Google

The ongoing digital conflict linked to Russia’s invasion of Ukraine has escalated, with various threat actors, including Fancy Bear, Ghostwriter, and Mustang Panda, engaging in phishing campaigns targeting not only Ukraine but also Poland and other European nations. These cyber threats come as the geopolitical landscape remains tense, highlighting the…

Read MoreRussian Hackers Use Phishing Attacks to Target Ukrainians and European Allies, Says Google

Ex-CIA Engineer Receives 40-Year Sentence for Disclosing Classified Information

A former software engineer with the U.S. Central Intelligence Agency (CIA) has received a 40-year prison sentence from the Southern District of New York (SDNY) for transferring classified documents to WikiLeaks as well as possessing child pornography. Joshua Adam Schulte, aged 35, was initially charged in June 2018 and subsequently…

Read MoreEx-CIA Engineer Receives 40-Year Sentence for Disclosing Classified Information

Hackers Exploit Zero-Day Vulnerability in cnPilot Routers to Deploy AIRASHI DDoS Botnet

Cybersecurity experts have reported that attackers are taking advantage of an undisclosed zero-day vulnerability in Cambium Networks cnPilot routers to deploy a new variant of the AISURU botnet, known as AIRASHI. This botnet is primarily orchestrating distributed denial-of-service (DDoS) attacks, which have reportedly been ongoing since June 2024. Research conducted…

Read MoreHackers Exploit Zero-Day Vulnerability in cnPilot Routers to Deploy AIRASHI DDoS Botnet

Hackers Exploit Mitel Devices to Enhance DDoS Attacks by 4 Billion Percent

Recent cybersecurity research has unveiled the utilization of a potent reflection/amplification attack method by malicious actors to execute prolonged distributed denial-of-service (DDoS) attacks, sustaining these assaults for as long as 14 hours and achieving an unprecedented amplification ratio of 4,294,967,296 to 1. This attack vector, known as TP240PhoneHome (CVE-2022-26143), has…

Read MoreHackers Exploit Mitel Devices to Enhance DDoS Attacks by 4 Billion Percent