The Breach News

Apple Launches iOS Update for Older iPhones to Address Actively Exploited Security Flaw

Apple Inc. has recently rolled out critical security updates for legacy iPhone, iPad, and iPod touch devices, focusing on patching a significant vulnerability that has been found to be actively exploited. This flaw, designated as CVE-2022-32893, has garnered a CVSS score of 8.8 and represents an out-of-bounds write issue in…

Read MoreApple Launches iOS Update for Older iPhones to Address Actively Exploited Security Flaw

Universal ZTNA: Ensuring Secure Access and SASE in the Pursuit of Comprehensive Federal Digital Trust Webinar.

Exploring Universal Zero Trust Network Access for Enhanced Federal Digital Trust In an era where data security is paramount, an upcoming ISMG webinar, sponsored by Cisco, promises to delve into Universal Zero Trust Network Access (ZTNA) and its significance in fostering digital trust within federal operations. Scheduled for a 60-minute…

Read MoreUniversal ZTNA: Ensuring Secure Access and SASE in the Pursuit of Comprehensive Federal Digital Trust Webinar.

How Long for Hackers to Breach Modern Hashing Algorithms?

Understanding Modern Password Security and Attack Techniques As user accounts face escalating threats, passwords continue to serve as the frontline defense against unauthorized access. Recent trends in password security reveal a shift towards prioritizing password length over complexity, as outlined in the National Institute of Standards and Technology (NIST) guidelines.…

Read MoreHow Long for Hackers to Breach Modern Hashing Algorithms?

Webinar: Discover How ASPM Shifts Application Security from Reactive to Proactive

In today’s rapidly evolving cyber landscape, many organizations find themselves grappling with outdated security tools that fail to provide comprehensive protection. This common challenge leaves systems vulnerable to sophisticated threats, prompting a need for more effective strategies. To address these issues, Application Security Posture Management (ASPM) emerges as a promising…

Read MoreWebinar: Discover How ASPM Shifts Application Security from Reactive to Proactive

Infrastructure Utilized in Cisco Hack Also Aimed at Workforce Management Solutions

In early 2022, an attack infrastructure targeting Cisco was also utilized in an attempted breach of an unnamed workforce management solutions holding company. This attempted intrusion occurred just one month prior to the Cisco incident, highlighting a strategy employed by cybercriminals to exploit vulnerabilities in various sectors. According to cybersecurity…

Read MoreInfrastructure Utilized in Cisco Hack Also Aimed at Workforce Management Solutions

Cyberattack Disrupts Operations at Key European Airports

Third-Party Risk Management, Critical Infrastructure Security, Governance & Risk Management Cyberattack Disrupts Flights Across Major European Airports Akshaya Asokan (asokan_akshaya) • September 20, 2025 Image: Shutterstock A significant cyberattack on Friday night has resulted in widespread flight cancellations and delays at major European airports, including London’s Heathrow, as services provided…

Read MoreCyberattack Disrupts Operations at Key European Airports

Potential Catastrophe Averted: Microsoft’s Entra ID Vulnerabilities Uncovered

Significant Vulnerability Exposes Microsoft Identity Systems to Potential Exploitation A critical vulnerability recently uncovered within Microsoft’s identity management framework poses a serious risk, allowing for potential complete compromise of customers’ tenants. Michael Bargury, the Chief Technology Officer of Zenity, a security company, highlighted that although Microsoft has implemented various security…

Read MorePotential Catastrophe Averted: Microsoft’s Entra ID Vulnerabilities Uncovered

Understanding How Interlock Ransomware Targets Healthcare Organizations

Ransomware incidents have surged dramatically within the healthcare sector, revealing critical vulnerabilities that threaten millions. Notably, UnitedHealth has reported that 190 million Americans suffered personal and healthcare data breaches due to a ransomware attack on Change Healthcare, nearly doubling earlier estimates. This incident underscores how ransomware can effectively compromise essential…

Read MoreUnderstanding How Interlock Ransomware Targets Healthcare Organizations