The Breach News

Mirai-Inspired Gorilla Botnet Targets 300,000 Devices in 100 Countries

New Gorilla Botnet Launches Widespread DDoS Attacks Across Over 100 Countries A significant cybersecurity threat has emerged with the introduction of the Gorilla Botnet, which is executing extensive distributed denial-of-service (DDoS) attacks targeting more than 300,000 systems globally. According to cybersecurity firm NSFOCUS, this botnet, operational since September 2024, is…

Read MoreMirai-Inspired Gorilla Botnet Targets 300,000 Devices in 100 Countries

Morrisons Confronts Major Payout Following Loss in Data Leak Legal Battle

Morrisons, a UK supermarket chain, is facing significant financial repercussions following a legal decision that allows thousands of affected employees to pursue compensation claims. This ruling stems from a data breach incident in 2014, during which a senior internal auditor, Andrew Skelton, unlawfully disclosed sensitive payroll information pertaining to about…

Read MoreMorrisons Confronts Major Payout Following Loss in Data Leak Legal Battle

New Vulnerabilities in Microsoft macOS Apps Could Enable Hackers to Gain Unrestricted Access

Eight vulnerabilities have recently been discovered in Microsoft applications tailored for macOS, potentially enabling attackers to exploit these weaknesses for elevated privileges and unauthorized access to sensitive user data. This circumvention directly undermines the operating system’s permissions framework, specifically the Transparency, Consent, and Control (TCC) model designed by Apple. Security…

Read MoreNew Vulnerabilities in Microsoft macOS Apps Could Enable Hackers to Gain Unrestricted Access

Internet Archive Compromised Once More Due to Stolen Access Tokens

The Internet Archive has been the victim of a significant data breach, notably compromising its Zendesk email support platform. Following persistent warnings that exposed GitLab authentication tokens had been exploited, threat actors gained unauthorized access to sensitive data. Reports from various users surfaced last night as they began receiving notifications…

Read MoreInternet Archive Compromised Once More Due to Stolen Access Tokens

Microsoft Discovers Serious Vulnerabilities in Rockwell Automation PanelView Plus

Security Flaws Discovered in Rockwell Automation’s PanelView Plus Could Lead to Remote Attacks Recent disclosures have unveiled two critical security vulnerabilities in Rockwell Automation’s PanelView Plus systems, which could potentially allow remote, unauthenticated attackers to execute arbitrary code or trigger denial-of-service (DoS) conditions. This revelation, made by Microsoft security teams,…

Read MoreMicrosoft Discovers Serious Vulnerabilities in Rockwell Automation PanelView Plus

U.S. Department of Justice Takes Down Warzone RAT Network and Arrests Major Operators

The U.S. Justice Department (DoJ) announced a significant operation on Friday involving the seizure of online infrastructure linked to the distribution of a remote access trojan (RAT) known as Warzone RAT. This infrastructure comprised several domains, including a notable one, www.warzone[.]ws. These sites reportedly facilitated the sale of malware, enabling…

Read MoreU.S. Department of Justice Takes Down Warzone RAT Network and Arrests Major Operators

Stealthy Malware Has Infected Thousands of Linux Systems Since 2021

A recent incident highlighted on the CentOS subreddit reveals a growing threat to server security, as an administrator reported systems infected with a cryptocurrency hijacker known as perfcc and perfctl. The administrator became aware of the compromise following alerts from their monitoring setup indicating 100% CPU usage, which raised immediate…

Read MoreStealthy Malware Has Infected Thousands of Linux Systems Since 2021

Hacker Impersonates Israeli Security Vendor to Distribute Wiper Malware

Cybercriminals posing as a leading cybersecurity firm in Israel have executed a series of sophisticated wiper attacks targeting professionals within the local cybersecurity community. Reports indicate that these attackers successfully circumvented substantial security defenses, launching their malicious campaigns under the guise of legitimacy. The cybersecurity firm, Eset, confirmed that its…

Read MoreHacker Impersonates Israeli Security Vendor to Distribute Wiper Malware