The Breach News

Serious Vulnerabilities in WGS-804HPT Switches Allow for Remote Code Execution and Network Exploitation

Planet Technology’s WGS-804HPT Switches Vulnerable to Remote Code Execution Cybersecurity experts have unveiled three critical vulnerabilities in Planet Technology’s WGS-804HPT industrial switches, which could be exploited to facilitate pre-authentication remote code execution. These switches are integral to numerous building and home automation systems, serving a variety of networking functions. Tomer…

Read MoreSerious Vulnerabilities in WGS-804HPT Switches Allow for Remote Code Execution and Network Exploitation

HP Enterprise Targeted by Russian Hackers Connected to DNC Breach

Russian Hackers Breach Hewlett Packard Enterprise’s Email System Hewlett Packard Enterprise (HPE) has reported a significant security breach, with indications that hackers linked to the Kremlin gained unauthorized access to its cloud email environment. The intruders are believed to have extracted mailbox data, targeting a subset of accounts within the…

Read MoreHP Enterprise Targeted by Russian Hackers Connected to DNC Breach

Automotive Titan Stellantis Faces Significant Third-Party Data Breach

NEW You can now listen to Fox News articles! Stellantis, a prominent automotive manufacturer, has confirmed a significant data breach that compromised customer contact information. The intrusion occurred through a third-party platform utilized for customer services in North America. This incident aligns with a series of large-scale cyberattacks targeting cloud-based…

Read MoreAutomotive Titan Stellantis Faces Significant Third-Party Data Breach

Unsecured Tunneling Protocols Compromise 4.2 Million Devices, Affecting VPNs and Routers

Recent studies reveal significant security vulnerabilities across various tunneling protocols, potentially allowing malicious actors to execute diverse attacks. Researchers from Top10VPN, collaborating with KU Leuven’s Mathy Vanhoef, indicate that Internet hosts accepting tunneling packets without sender verification can be exploited for anonymous attacks, jeopardizing the security of network infrastructures. The…

Read MoreUnsecured Tunneling Protocols Compromise 4.2 Million Devices, Affecting VPNs and Routers

Hackers Exploit TCP Middlebox Reflection for Amplified DDoS Attacks

A new amplification technique in distributed denial-of-service (DDoS) attacks, termed TCP Middlebox Reflection, has been identified for the first time in real-world scenarios, a development following its theoretical introduction six months prior. According to a report from Akamai, the TCP Middlebox Reflection attack exploits vulnerabilities in firewalls and content filtering…

Read MoreHackers Exploit TCP Middlebox Reflection for Amplified DDoS Attacks

Hackers Take Advantage of RMM Tools to Distribute Malware

Cybercrime, Fraud Management & Cybercrime Surge in Attacks on RMM Tools in 2025: 51 Solutions Identified as Targets Brian Pereira (creed_digital) • October 7, 2025 Image: Shutterstock Remote Monitoring and Management (RMM) tools, originally adopted for widespread remote work during the COVID pandemic, are increasingly becoming instruments for cybercriminals. Once…

Read MoreHackers Take Advantage of RMM Tools to Distribute Malware

Renault Alerts UK Customers About Data Breach Involving Third-Party Supplier

Stolen Data May Fuel Targeted Phishing Campaigns, Experts Caution Renault has informed a number of UK customers that their personal information may have been compromised as a result of a cyberattack on one of its third-party suppliers. The car manufacturer’s notification follows an incident that has raised concerns about the…

Read MoreRenault Alerts UK Customers About Data Breach Involving Third-Party Supplier