The Breach News

Intel Officials Alert Police to Unpreparedness of US Cities for Hostile Drones

Concerns Grow Over Drone Threats as DHS Seeks Expanded Countermeasures Recent revelations from a Department of Homeland Security (DHS) memo highlight increasing unease regarding the ability to monitor and control drones that may pose risks to public safety. The internal document, acquired by WIRED, indicates that DHS officials are less…

Read MoreIntel Officials Alert Police to Unpreparedness of US Cities for Hostile Drones

Clop Ransomware Bypasses Cleo File Transfer Software to Steal Data

The Clop Ransomware group, suspected to have ties to Russian intelligence, has successfully exploited a vulnerability in Cleo File Transfer software, allowing them to bypass the company’s servers during a security update. This incident has raised substantial concerns about the security of companies that depend on Cleo’s solutions for secure…

Read MoreClop Ransomware Bypasses Cleo File Transfer Software to Steal Data

10 Significant Ransomware Attacks and Data Breaches of 2024

In 2024, a notable increase in cyberattacks targeting U.S. critical infrastructure has been observed, particularly focusing on network devices and software-as-a-service (SaaS) systems. This surge reflects a concerning trend where threat actors exploit vulnerabilities to compromise essential services, thus heightening security risks for businesses and government entities alike. Among the…

Read More10 Significant Ransomware Attacks and Data Breaches of 2024

Cl0p Ransomware Targets Cleo Vulnerability, Poses Risk of Data Breaches

Cl0p Ransomware Exploits Vulnerability in Cleo’s File Transfer Software The Cl0p ransomware group has proclaimed the exploitation of a serious vulnerability within Cleo’s managed file transfer (MFT) software, specifically targeting their Cleo Harmony, VLTrader, and LexiCom products. This latest incident illustrates a pattern that mirrors previous breaches, such as the…

Read MoreCl0p Ransomware Targets Cleo Vulnerability, Poses Risk of Data Breaches

CISA Calls for Improved Collaboration in Incident Response Planning

Governance & Risk Management, Government, Industry Specific Proposed National Response Plan Enhances Inter-Sector Collaboration Strategies Chris Riotta (@chrisriotta) • December 16, 2024 The public has until Jan. 15, 2025, to submit feedback on the proposed updates to the National Cyber Incident Response Plan. The federal government announced on Monday its…

Read MoreCISA Calls for Improved Collaboration in Incident Response Planning

Key Insights into Healthcare Cybersecurity Trends for 2024

In 2024, the landscape of healthcare cybersecurity faced unprecedented challenges, marked by a surge in cyberattacks that significantly threatened patient safety and data privacy. Heading into 2025, however, there are glimmers of hope, including the implementation of enhanced security controls and new regulatory measures aimed at bolstering defenses against these…

Read MoreKey Insights into Healthcare Cybersecurity Trends for 2024

Hackers Can Manipulate Digital License Plates to Shift Toll and Ticket Payments to Others

In a recent revelation regarding the vulnerabilities associated with digital license plates, security expert Rodriguez has warned that should the proprietary tool he developed be compromised or sold, individuals could potentially exploit it to jailbreak their own plates. Rodriguez emphasizes that such a process would require minimal technical skill, likening…

Read MoreHackers Can Manipulate Digital License Plates to Shift Toll and Ticket Payments to Others

Winnti-Style Glutton Backdoor Aims at Cybercriminals

Cybercrime, Fraud Management & Cybercrime Malware Exploits Cybercrime Ecosystem for Profit Prajeet Nair (@prajeetspeaks) • December 16, 2024 “Glutton” malware is stealing from cybercriminals. (Image: Shutterstock) Recent revelations highlight how hackers are employing a variant of a backdoor traditionally associated with a Chinese threat actor suspected to have connections to…

Read MoreWinnti-Style Glutton Backdoor Aims at Cybercriminals