The Breach News

CISA Includes Citrix ShareFile Vulnerability in KEV Catalog Following Real-World Exploits

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has listed a significant security vulnerability in the Citrix ShareFile storage zones controller in its Known Exploited Vulnerabilities (KEV) catalog, following credible assessments of active exploitation in the wild. This vulnerability, designated as CVE-2023-24489, holds a critical CVSS score of 9.8 and…

Read MoreCISA Includes Citrix ShareFile Vulnerability in KEV Catalog Following Real-World Exploits

Hacker Sentenced to 8 Months in Prison for Leaking Celebrities’ Private Photos

George Garofano Sentenced for High-Profile Celebrity Hack In a significant development within the cybersecurity landscape, George Garofano has been sentenced to eight months in prison for hacking into over 250 Apple iCloud accounts belonging to notable celebrities, including Jennifer Lawrence and Kim Kardashian. This sentencing follows his guilty plea to…

Read MoreHacker Sentenced to 8 Months in Prison for Leaking Celebrities’ Private Photos

Hundreds of Millions of Audio Devices Require Urgent Patch to Thwart Wireless Hacking and Tracking

Concerns Arise Over Fast Pair Vulnerabilities Found in Bluetooth Devices Recent investigations have uncovered significant vulnerabilities associated with Google’s Fast Pair technology, which could put connected devices at risk. Researchers at KU Leuven have identified flaws in the implementation of this widely adopted Bluetooth feature, raising alarms about the potential…

Read MoreHundreds of Millions of Audio Devices Require Urgent Patch to Thwart Wireless Hacking and Tracking

Major Lawsuit Aims at Alleged ‘Sham’ Providers in Data HIE

HIPAA/HITECH, Litigation, Standards, Regulations & Compliance Lawsuit Claims Competitor Permits ‘Shell Firms’ to Exploit National Data Exchanges Marianne Kolbasuk McGee (HealthInfoSec) • January 16, 2026 Epic Systems is accusing competitor Health Gorilla of allowing deceptive entities to access sensitive patient data through national health information exchange networks. (Image: Epic, Health…

Read MoreMajor Lawsuit Aims at Alleged ‘Sham’ Providers in Data HIE

Varonis Systems Raises Alarm on Over-Privileged Chatbots and Data Breach Risks – Traders Union

Varonis Systems Issues Warning on Risks Posed by Over-Privileged Chatbots In a recent alert, Varonis Systems raised significant concerns regarding the potential for data breaches linked to the misuse of over-privileged chatbots. As businesses increasingly adopt artificial intelligence to streamline operations and enhance customer engagement, the implications of these systems…

Read MoreVaronis Systems Raises Alarm on Over-Privileged Chatbots and Data Breach Risks – Traders Union

New iOS 16 Vulnerability Allows Hidden Cellular Access While in Fake Airplane Mode

Recent findings from cybersecurity researchers have unveiled a sophisticated post-exploit technique on iOS 16 that could allow attackers to maintain covert access to Apple devices, even when users believe their devices are disconnected. This method leverages a deceptive form of Airplane Mode, manipulating the user interface to mislead victims while…

Read MoreNew iOS 16 Vulnerability Allows Hidden Cellular Access While in Fake Airplane Mode

Thousands of MikroTik Routers Compromised for Network Traffic Eavesdropping

Widespread Compromise of MikroTik Routers Exposes Vulnerabilities Recent reports have unveiled an alarming situation involving a significant number of MikroTik routers that have fallen victim to cyber exploitation. Last month, we noted a major crypto-mining malware operation responsible for the hijacking of over 200,000 MikroTik devices, utilizing a vulnerability linked…

Read MoreThousands of MikroTik Routers Compromised for Network Traffic Eavesdropping