The Breach News

Google and Cisco Report CRM Software Breaches Caused by Vishing Attacks

Cybercrime, Fraud Management & Cybercrime Voice Phishing Attacks Target Salesforce Users: A Persistent ShinyHunters Strategy Mathew J. Schwartz (euroinfosec) • August 6, 2025 Be cautious of voice phishing calls from the ShinyHunters cybercrime group. (Image: Shutterstock) In an alarming trend, technology giants Google and Cisco disclosed separate incidents of data…

Read MoreGoogle and Cisco Report CRM Software Breaches Caused by Vishing Attacks

Australian Scaleup Set to Deliver AI-Driven Data Protection to the Ministry of Defence

The UK Ministry of Defence (MoD) has partnered with Australian firm Castlepoint Systems to enhance its data security protocols. This collaboration will focus on overseeing complex datasets using Castlepoint’s artificial intelligence (AI) technology to mitigate the risk of data breaches, both accidental and malicious. The move follows a significant data…

Read MoreAustralian Scaleup Set to Deliver AI-Driven Data Protection to the Ministry of Defence

⚡ THN Weekly Update: Key Cybersecurity Threats, Tools, and Insights

Dec 16, 2024
Cyber Threats / Weekly Update

This week brought significant and concerning developments in cybersecurity. From subtle but impactful attacks on widely-used business tools to hidden vulnerabilities in common devices, there’s plenty that may have gone unnoticed. Cybercriminals are not only rehashing old tactics but also discovering new ones, targeting systems of all sizes. On a brighter note, law enforcement has made strides against dubious online markets, while major tech companies scramble to fix vulnerabilities before they escalate. If you’ve been too busy to stay informed, now’s the ideal time to catch up on what you might have missed.

⚡ Threat of the Week

Cleo Vulnerability Faces Active Exploitation
A severe vulnerability (CVE-2024-50623) in Cleo’s file transfer software—Harmony, VLTrader, and LexiCom—has come under active attack by cybercriminals, posing significant security threats to organizations globally. This flaw allows unauthorized remote code execution, heightening the urgency for organizations to address the issue.

THN Weekly Recap: Key Cybersecurity Threats, Tools, and Tips Published: December 16, 2024 The past week has revealed significant challenges in the cybersecurity landscape, highlighting the evolving tactics of cybercriminals. From subtle yet impactful attacks targeting widely-used business tools to the discovery of critical vulnerabilities in everyday devices, many urgent…

Read More

⚡ THN Weekly Update: Key Cybersecurity Threats, Tools, and Insights

Dec 16, 2024
Cyber Threats / Weekly Update

This week brought significant and concerning developments in cybersecurity. From subtle but impactful attacks on widely-used business tools to hidden vulnerabilities in common devices, there’s plenty that may have gone unnoticed. Cybercriminals are not only rehashing old tactics but also discovering new ones, targeting systems of all sizes. On a brighter note, law enforcement has made strides against dubious online markets, while major tech companies scramble to fix vulnerabilities before they escalate. If you’ve been too busy to stay informed, now’s the ideal time to catch up on what you might have missed.

⚡ Threat of the Week

Cleo Vulnerability Faces Active Exploitation
A severe vulnerability (CVE-2024-50623) in Cleo’s file transfer software—Harmony, VLTrader, and LexiCom—has come under active attack by cybercriminals, posing significant security threats to organizations globally. This flaw allows unauthorized remote code execution, heightening the urgency for organizations to address the issue.

CISA Reveals Final $100M Cybersecurity Grants Amid Rising State Challenges

Cybersecurity Spending, Government, Industry Specific $100M in State Cyber Grants Signals Reduced Federal Support Amid Increasing Demand Chris Riotta (@chrisriotta) • August 5, 2025 The Cybersecurity and Infrastructure Security Agency (CISA) has revealed a $100 million grant initiative designed to boost cybersecurity frameworks at the state and local levels. This…

Read MoreCISA Reveals Final $100M Cybersecurity Grants Amid Rising State Challenges

Ten Women File Lawsuit Against Tea App After Hacked Photos Are Leaked Online

The Tea app, designed to facilitate anonymous sharing of information among women regarding local men, has recently faced serious legal challenges following a significant data breach. This incident exposed a large volume of sensitive data, including thousands of selfies, ID photographs, and private conversations, leading to ten potential class action…

Read MoreTen Women File Lawsuit Against Tea App After Hacked Photos Are Leaked Online

Security Vulnerability: Hard-Coded Credentials in HPE Instant On Devices Enable Unauthorized Admin Access

Date: July 21, 2025
Category: Network Security / Vulnerability

Hewlett-Packard Enterprise (HPE) has issued critical security updates to rectify a significant vulnerability in Instant On Access Points. This flaw, identified as CVE-2025-37103, has a CVSS rating of 9.8 out of 10 and allows attackers to bypass authentication, potentially granting them administrative access to affected systems. According to the advisory, “Hard-coded login credentials were discovered in HPE Networking Instant On Access Points, enabling anyone aware of these credentials to circumvent standard device authentication.” Additionally, HPE has addressed another security issue involving authenticated command injection in the command-line interface (CVE-2025-37102, CVSS score: 7.2), which could allow remote attackers to execute arbitrary commands on the operating system with elevated privileges.

Critical Security Flaw Discovered in HPE Instant On Devices, Granting Admin Access On July 21, 2025, Hewlett-Packard Enterprise (HPE) announced the release of crucial security patches aimed at rectifying a significant vulnerability in its Instant On Access Points. This flaw presents an opportunity for attackers to bypass authentication measures, thereby…

Read More

Security Vulnerability: Hard-Coded Credentials in HPE Instant On Devices Enable Unauthorized Admin Access

Date: July 21, 2025
Category: Network Security / Vulnerability

Hewlett-Packard Enterprise (HPE) has issued critical security updates to rectify a significant vulnerability in Instant On Access Points. This flaw, identified as CVE-2025-37103, has a CVSS rating of 9.8 out of 10 and allows attackers to bypass authentication, potentially granting them administrative access to affected systems. According to the advisory, “Hard-coded login credentials were discovered in HPE Networking Instant On Access Points, enabling anyone aware of these credentials to circumvent standard device authentication.” Additionally, HPE has addressed another security issue involving authenticated command injection in the command-line interface (CVE-2025-37102, CVSS score: 7.2), which could allow remote attackers to execute arbitrary commands on the operating system with elevated privileges.

⚡ THN Weekly Update: Key Cybersecurity Threats, Tools, and Tips

Dec 23, 2024
Cybersecurity / Weekly Update

The digital landscape is relentless, as this week has shown. From the apprehension of ransomware developers to state-sponsored hackers unveiling novel tactics, it’s evident that cybercriminals are continually evolving their methods. They exploit everyday tools for malicious purposes, embed spyware in trusted applications, and uncover new vulnerabilities in outdated security systems. These incidents are not mere coincidences—they highlight the ingenuity and adaptability of cyber threats. In this edition, we’ll explore the most significant cybersecurity events from the past week and provide essential insights to help you stay protected and proactive. Let’s dive in.

⚡ Threat of the Week

Charges Filed Against LockBit Developer Rostislav Panev — Rostislav Panev, a 51-year-old dual Russian and Israeli citizen, has been charged in the U.S. for allegedly serving as a developer for the now-disrupted LockBit ransomware-as-a-service (RaaS) operation, which is believed to have generated approximately $230,000 between June 2022 and February 2024. Panev was…

THN Weekly Cybersecurity Overview: Key Threats, Tools, and Insights December 23, 2024 Cybersecurity / Weekly Overview The digital landscape remains unrelenting, offering criminals continuous opportunities for exploitation. This past week has underscored the ever-evolving nature of cyber threats, highlighting a range of incidents from the capture of ransomware developers to…

Read More

⚡ THN Weekly Update: Key Cybersecurity Threats, Tools, and Tips

Dec 23, 2024
Cybersecurity / Weekly Update

The digital landscape is relentless, as this week has shown. From the apprehension of ransomware developers to state-sponsored hackers unveiling novel tactics, it’s evident that cybercriminals are continually evolving their methods. They exploit everyday tools for malicious purposes, embed spyware in trusted applications, and uncover new vulnerabilities in outdated security systems. These incidents are not mere coincidences—they highlight the ingenuity and adaptability of cyber threats. In this edition, we’ll explore the most significant cybersecurity events from the past week and provide essential insights to help you stay protected and proactive. Let’s dive in.

⚡ Threat of the Week

Charges Filed Against LockBit Developer Rostislav Panev — Rostislav Panev, a 51-year-old dual Russian and Israeli citizen, has been charged in the U.S. for allegedly serving as a developer for the now-disrupted LockBit ransomware-as-a-service (RaaS) operation, which is believed to have generated approximately $230,000 between June 2022 and February 2024. Panev was…

Nvidia Addresses Three Vulnerabilities in Triton Software

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Chip Manufacturer Addresses Critical Server Vulnerabilities Greg Sirico • August 5, 2025 Image: Nvidia/Shutterstock Nvidia, a leading manufacturer in the semiconductor industry, has released patches for its open-source platform that facilitates running AI models at scale. This update follows critical…

Read MoreNvidia Addresses Three Vulnerabilities in Triton Software