The Breach News

Automotive Titan Stellantis Faces Significant Third-Party Data Breach

NEW You can now listen to Fox News articles! Stellantis, a prominent automotive manufacturer, has confirmed a significant data breach that compromised customer contact information. The intrusion occurred through a third-party platform utilized for customer services in North America. This incident aligns with a series of large-scale cyberattacks targeting cloud-based…

Read MoreAutomotive Titan Stellantis Faces Significant Third-Party Data Breach

Unsecured Tunneling Protocols Compromise 4.2 Million Devices, Affecting VPNs and Routers

Recent studies reveal significant security vulnerabilities across various tunneling protocols, potentially allowing malicious actors to execute diverse attacks. Researchers from Top10VPN, collaborating with KU Leuven’s Mathy Vanhoef, indicate that Internet hosts accepting tunneling packets without sender verification can be exploited for anonymous attacks, jeopardizing the security of network infrastructures. The…

Read MoreUnsecured Tunneling Protocols Compromise 4.2 Million Devices, Affecting VPNs and Routers

Hackers Exploit TCP Middlebox Reflection for Amplified DDoS Attacks

A new amplification technique in distributed denial-of-service (DDoS) attacks, termed TCP Middlebox Reflection, has been identified for the first time in real-world scenarios, a development following its theoretical introduction six months prior. According to a report from Akamai, the TCP Middlebox Reflection attack exploits vulnerabilities in firewalls and content filtering…

Read MoreHackers Exploit TCP Middlebox Reflection for Amplified DDoS Attacks

Hackers Take Advantage of RMM Tools to Distribute Malware

Cybercrime, Fraud Management & Cybercrime Surge in Attacks on RMM Tools in 2025: 51 Solutions Identified as Targets Brian Pereira (creed_digital) • October 7, 2025 Image: Shutterstock Remote Monitoring and Management (RMM) tools, originally adopted for widespread remote work during the COVID pandemic, are increasingly becoming instruments for cybercriminals. Once…

Read MoreHackers Take Advantage of RMM Tools to Distribute Malware

Renault Alerts UK Customers About Data Breach Involving Third-Party Supplier

Stolen Data May Fuel Targeted Phishing Campaigns, Experts Caution Renault has informed a number of UK customers that their personal information may have been compromised as a result of a cyberattack on one of its third-party suppliers. The car manufacturer’s notification follows an incident that has raised concerns about the…

Read MoreRenault Alerts UK Customers About Data Breach Involving Third-Party Supplier

Russia Publishes List of IPs and Domains Targeting Its Infrastructure with DDoS Attacks

Russia Releases Extensive List of Alleged Cyberattack Sources Amid Ongoing Conflict As the Russia-Ukraine conflict intensifies, the Russian government has unveiled a significant list of 17,576 IP addresses and 166 domains purportedly linked to a series of distributed denial-of-service (DDoS) attacks targeting its domestic infrastructure. Released on Thursday by the…

Read MoreRussia Publishes List of IPs and Domains Targeting Its Infrastructure with DDoS Attacks

The SEC’s New SaaS Cybersecurity Rules: Challenges for CISOs Explained

The U.S. Securities and Exchange Commission (SEC) is taking a firm stance on the cybersecurity posture of Software as a Service (SaaS) providers and their clients. Publicly traded companies, referred to as ‘registrants’, are now required to disclose cyber incidents and demonstrate their readiness to manage cybersecurity threats, including those…

Read MoreThe SEC’s New SaaS Cybersecurity Rules: Challenges for CISOs Explained