Category: Data Breaches

Your blog category

  • Crash Tests for Security: Why BAS Is Proof of Defense, Not Assumptions

    Crash Tests for Security: Why BAS Is Proof of Defense, Not Assumptions

    Car makers don’t trust blueprints. They smash prototypes into walls. Again and again. In controlled conditions.
    Because design specs don’t prove survival. Crash tests do. They separate theory from reality. Cybersecurity is no different. Dashboards overflow with “critical” exposure alerts. Compliance reports tick every box. 
    But none of that proves what matters most to a CISO:

    The

  • Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure

    Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure

    Cybersecurity company watchTowr Labs has disclosed that it has “credible evidence” of active exploitation of the recently disclosed security flaw in Fortra GoAnywhere Managed File Transfer (MFT) software as early as September 10, 2025, a whole week before it was publicly disclosed.
    “This is not ‘just’ a CVSS 10.0 flaw in a solution long favored by APT groups and ransomware operators – it is a

  • New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module

    New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module

    Cybersecurity researchers have discovered an updated version of a known Apple macOS malware called XCSSET that has been observed in limited attacks.
    “This new variant of XCSSET brings key changes related to browser targeting, clipboard hijacking, and persistence mechanisms,” the Microsoft Threat Intelligence team said in a Thursday report.
    “It employs sophisticated encryption and obfuscation

  • Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware

    Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware

    The U.K. National Cyber Security Centre (NCSC) has revealed that threat actors have exploited the recently disclosed security flaws impacting Cisco firewalls as part of zero-day attacks to deliver previously undocumented malware families like RayInitiator and LINE VIPER.
    “The RayInitiator and LINE VIPER malware represent a significant evolution on that used in the previous campaign, both in

  • Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection

    Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection

    Cybersecurity researchers have disclosed a critical flaw impacting Salesforce Agentforce, a platform for building artificial intelligence (AI) agents, that could allow attackers to potentially exfiltrate sensitive data from its customer relationship management (CRM) tool by means of an indirect prompt injection.
    The vulnerability has been codenamed ForcedLeak (CVSS score: 9.4) by Noma Security,

  • North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers

    North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers

    The North Korea-linked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented backdoor called AkdoorTea, along with tools like TsunamiKit and Tropidoor.
    Slovak cybersecurity firm ESET, which is tracking the activity under the name DeceptiveDevelopment, said the campaign targets software developers across all operating systems, Windows,

  • CTEM’s Core: Prioritization and Validation

    CTEM’s Core: Prioritization and Validation

    Despite a coordinated investment of time, effort, planning, and resources, even the most up-to-date cybersecurity systems continue to fail. Every day. Why? 
    It’s not because security teams can’t see enough. Quite the contrary. Every security tool spits out thousands of findings. Patch this. Block that. Investigate this. It’s a tsunami of red dots that not even the most crackerjack team on

  • Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More

    Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More

    /* ===== Container ===== */
    .td-wrap {}

    /* ===== Section ===== */
    .td-section {
    }
    .td-title { margin: 16px 0 4px; font-size: 32px; line-height: 1.2; font-weight: 800; }
    .td-subtitle { margin: 0 0 24px; color: #64748b; font-size: 16px; }

    /* ===== Timeline ===== */
    .td-timeline { position: relative; margin: 0 !important;padding: 0!important; list-style: none; }
    /* spine */
    .td-timeline:before {

  • Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds

    Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds

    The latest Gcore Radar report analyzing attack data from Q1–Q2 2025, reveals a 41% year-on-year increase in total attack volume. The largest attack peaked at 2.2 Tbps, surpassing the 2 Tbps record in late 2024. Attacks are growing not only in scale but in sophistication, with longer durations, multi-layered strategies, and a shift in target industries. Technology now overtakes gaming as the most

  • Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike

    Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike

    A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning Africa, Asia, North America, South America, and Oceania has been assessed to be a Chinese state-sponsored threat actor.
    Recorded Future, which was tracking the activity under the moniker TAG-100, has now graduated it to a hacking group dubbed RedNovember.