Category: Data Breaches

Your blog category

  • Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign

    Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign

    The Evolving Healthcare Cybersecurity Landscape 
    Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments increasingly targeted and the convergence of IT and medical systems creating an expanded attack surface, traditional security approaches are proving inadequate. According to recent statistics, the healthcare sector

  • 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure

    159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure

    As many as 159 CVE identifiers have been flagged as exploited in the wild in the first quarter of 2025, up from 151 in Q4 2024.
    “We continue to see vulnerabilities being exploited at a fast pace with 28.3% of vulnerabilities being exploited within 1-day of their CVE disclosure,” VulnCheck said in a report shared with The Hacker News.
    This translates to 45 security flaws that have been weaponized

  • Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

    Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

    The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with generative artificial intelligence (GenAI) capabilities.
    “This addition lowers the technical barrier for creating phishing pages, enabling less tech-savvy criminals to deploy customized scams in minutes,” Netcraft said in a fresh report shared with The Hacker News.

  • DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack

    DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack

    Multiple threat activity clusters with ties to North Korea (aka Democratic People’s Republic of Korea or DPRK) have been linked to attacks targeting organizations and individuals in the Web3 and cryptocurrency space.
    “The focus on Web3 and cryptocurrency appears to be primarily financially motivated due to the heavy sanctions that have been placed on North Korea,” Google-owned Mandiant said in

  • Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign

    Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign

    The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part of a job-themed social engineering campaign aimed at Israel in October 2024.
    Google-owned Mandiant described UNC2428 as a threat actor aligned with Iran that engages in cyber espionage-related operations. The intrusion set is said to have distributed the malware through a “complex

  • Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices

    Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices

    Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distributes Android spyware under the guise of the Alpine Quest mapping software.
    “The attackers hide this trojan inside modified Alpine Quest mapping software and distribute it in various ways, including through one of the Russian Android app catalogs,” Doctor Web said in an

  • Three Reasons Why the Browser is Best for Stopping Phishing Attacks

    Three Reasons Why the Browser is Best for Stopping Phishing Attacks

    Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software exploits, phishing arguably poses a bigger threat than ever before. 
    Attackers are increasingly leveraging identity-based techniques over software exploits, with phishing and stolen credentials (a byproduct of phishing) now the primary

  • Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp

    Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp

    Multiple suspected Russia-linked threat actors are “aggressively” targeting individuals and organizations with ties to Ukraine and human rights with an aim to gain unauthorized access to Microsoft 365 accounts since early March 2025.
    The highly targeted social engineering operations, per Volexity, are a shift from previously documented attacks that leveraged a technique known as device code

  • Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

    Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

    Cybersecurity researchers have detailed a malware campaign that’s targeting Docker environments with a previously undocumented technique to mine cryptocurrency.
    The activity cluster, per Darktrace and Cado Security, represents a shift from other cryptojacking campaigns that directly deploy miners like XMRig to illicitly profit off the compute resources.
    This involves deploying a malware strain

  • GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages

    GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages

    Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker to elevate their privileges in the Cloud Composer workflow orchestration service that’s based on Apache Airflow.
    “This vulnerability lets attackers with edit permissions in Cloud Composer to escalate their access to the default Cloud Build service account, which