The Breach News

Chinese Hackers Target US Agency with Chopper Attack

Recent cyber activity has revealed significant vulnerabilities and breaches affecting U.S. federal agencies and corporations, highlighting the ongoing threats in the cybersecurity landscape. The Cybersecurity and Infrastructure Security Agency (CISA) reported that hackers exploited a known vulnerability in an open-source geospatial data server, leading to the deployment of a web…

Read MoreChinese Hackers Target US Agency with Chopper Attack

Critical OpenSSH Vulnerabilities Allow Man-in-the-Middle and DoS Attacks — Update Immediately

Recent discoveries by the Qualys Threat Research Unit have unveiled two significant security vulnerabilities within the OpenSSH suite, an essential tool for secure networking. These vulnerabilities, if exploited, could enable attackers to perform a man-in-the-middle (MitM) attack and instigate a denial-of-service (DoS) attack, threatening the security and availability of affected…

Read MoreCritical OpenSSH Vulnerabilities Allow Man-in-the-Middle and DoS Attacks — Update Immediately

FBI Recovers $500,000 in Ransomware Payments and Cryptocurrency from North Korean Hackers

The U.S. Department of Justice (DoJ) has successfully seized $500,000 in Bitcoin connected to a group of North Korean hackers who employed a ransomware variant known as Maui to extort digital payments from various organizations. This operation illustrates an increasing trend in cyber extortion tactics aimed at multiple sectors, including…

Read MoreFBI Recovers $500,000 in Ransomware Payments and Cryptocurrency from North Korean Hackers

Feds Secure Cisco Firewalls to Combat ‘Arcane Door’ Threat

Network Firewalls, Network Access Control, Security Operations CISA Issues Emergency Directive Following Ongoing Exploits of Cisco Devices Chris Riotta (@chrisriotta) • September 25, 2025 Image: Anucha Cheechang/Shutterstock The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding an ongoing cyberattack campaign that targets Cisco firewalls, exploiting zero-day vulnerabilities…

Read MoreFeds Secure Cisco Firewalls to Combat ‘Arcane Door’ Threat

Inc Ransomware Group Claims to Have Stolen 5.7 TB from Pennsylvania Attorney General’s Office

The Inc ransomware group has claimed responsibility for a significant data breach at the Pennsylvania Attorney General’s office that occurred in August 2025. Cybersecurity researchers from Comparitech report that the group asserts it has exfiltrated approximately 5.7 terabytes of data from the office. In a demonstration of their claims, the…

Read MoreInc Ransomware Group Claims to Have Stolen 5.7 TB from Pennsylvania Attorney General’s Office

Even Top Companies Face Breaches — Discover the Reasons and Prevention Strategies

Recent cybersecurity incidents underscore a harsh reality: even the most well-equipped organizations are susceptible to breaches. Despite investing in advanced security tools, comprehensive training for staff, and implementing robust defense mechanisms, many firms continue to fall victim to cyber attacks. The question arises: what factors contribute to these breaches? Attackers…

Read MoreEven Top Companies Face Breaches — Discover the Reasons and Prevention Strategies

NCSC Statement on Nursery Data Incident Reports – National Cyber Security Centre

NCSC Issues Statement on Nursery Data Breach Incident In a recent development, the National Cyber Security Centre (NCSC) has released a statement regarding a significant data incident that impacted a nursery organization. This breach has raised alarms among cybersecurity experts, particularly due to the sensitive nature of the data involved…

Read MoreNCSC Statement on Nursery Data Incident Reports – National Cyber Security Centre

CISA Includes Palo Alto Networks and SonicWall Vulnerabilities in Exploited Threats List

CISA Recognizes New Vulnerabilities Affecting Palo Alto Networks and SonicWall On Tuesday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) disclosed the addition of two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, highlighting significant concerns regarding data security. These vulnerabilities impact the Palo Alto Networks PAN-OS and SonicWall SonicOS…

Read MoreCISA Includes Palo Alto Networks and SonicWall Vulnerabilities in Exploited Threats List

New Linux Malware Framework Enables Attackers to Install Rootkits on Targeted Systems

The emergence of a sophisticated new Linux malware named the “Lightning Framework” has raised significant alarms within the cybersecurity community. Researchers from Intezer have classified this threat as a “Swiss Army Knife” due to its modular design and ability to implement rootkits, suggesting a high level of complexity in its…

Read MoreNew Linux Malware Framework Enables Attackers to Install Rootkits on Targeted Systems