The Breach News

Chinese Hackers Attack Taiwan and U.S. NGOs Using MgBot and MACMA Malware

A Beijing-linked state-sponsored hacking group known as Daggerfly has targeted organizations in Taiwan and a U.S. non-governmental organization (NGO) operating in China, deploying an upgraded suite of malware tools in its most recent campaign. This sophisticated operation highlights the group’s engagement in internal espionage activities, as reported today by Symantec’s…

Read MoreChinese Hackers Attack Taiwan and U.S. NGOs Using MgBot and MACMA Malware

Russian APT Unleashes New ‘Kapeka’ Backdoor in Attacks Across Eastern Europe

A newly identified backdoor malware known as Kapeka has been linked to ongoing cyberattacks targeting Eastern European nations, particularly Estonia and Ukraine, since at least mid-2022. This flexible backdoor is believed to be associated with the Russian advanced persistent threat (APT) group Sandworm, a faction also referred to as APT44…

Read MoreRussian APT Unleashes New ‘Kapeka’ Backdoor in Attacks Across Eastern Europe

New Telekopye Scam Toolkit Aims at Booking.com and Airbnb Customers

ESET Research has uncovered a troubling expansion of the Telekopye scam network, which now targets popular accommodation booking services such as Booking.com and Airbnb. This development marks a significant shift in the landscape of online scams, where fraudulent activities have increasingly targeted unsuspecting travelers during peak booking seasons. In July…

Read MoreNew Telekopye Scam Toolkit Aims at Booking.com and Airbnb Customers

Hackers Unveil 1.4 Billion User Accounts from Tencent Online

Massive Data Breach Exposes 1.4 Billion User Accounts Linked to Tencent In a significant cybersecurity incident, threat actor Fenice has reportedly leaked a staggering 1.4 billion user accounts purportedly associated with Tencent, a prominent Chinese technology and internet services company. The breach, which has drawn parallels to the infamous “Mother…

Read MoreHackers Unveil 1.4 Billion User Accounts from Tencent Online

Analysis: The NI Police Data Breach Threat Remains Unmanageable

In a significant data breach, the Police Service of Northern Ireland (PSNI) has accidentally exposed sensitive personal information of over 10,000 officers and civilian staff. The disclosed data includes names, ranks, and work locations, creating severe implications for security amid heightened terrorist threats in the region. The breach occurred in…

Read MoreAnalysis: The NI Police Data Breach Threat Remains Unmanageable

Business Losses from Vulnerable APIs and Bot Attacks Reach $186 Billion Per Year

Organizations are experiencing staggering financial losses, estimated between $94 billion and $186 billion annually, due to the vulnerabilities present in Application Programming Interfaces (APIs) and the automated exploits conducted by malicious bots. This alarming statistic is highlighted in a report titled “The Economic Impact of API and Bot Attacks,” published…

Read MoreBusiness Losses from Vulnerable APIs and Bot Attacks Reach $186 Billion Per Year

CISA Includes Twilio Authy and Internet Explorer Vulnerabilities in Exploited Vulnerabilities List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) catalog, adding two significant security vulnerabilities linked to active exploitation. These vulnerabilities highlight persistent risks for organizations, particularly those within the federal sphere, and underscore the importance of timely mitigation strategies. The first vulnerability,…

Read MoreCISA Includes Twilio Authy and Internet Explorer Vulnerabilities in Exploited Vulnerabilities List

ToddyCat Hacker Group Employs Sophisticated Tools for Large-Scale Data Theft

The Russian hacker group known as ToddyCat has drawn significant attention for employing an array of sophisticated tools to maintain access to compromised environments and extract sensitive information. Recently, Russian cybersecurity firm Kaspersky has classified this threat actor as a data harvester conducting operations primarily against governmental organizations—some associated with…

Read MoreToddyCat Hacker Group Employs Sophisticated Tools for Large-Scale Data Theft