Category: Data Breaches

Your blog category

  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes

    New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes

    Cybersecurity researchers have discovered a novel attack technique called TokenBreak that can be used to bypass a large language model’s (LLM) safety and content moderation guardrails with just a single character change.
    “The TokenBreak attack targets a text classification model’s tokenization strategy to induce false negatives, leaving end targets vulnerable to attacks that the implemented

  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction

    Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction

    A novel attack technique named EchoLeak has been characterized as a “zero-click” artificial intelligence (AI) vulnerability that allows bad actors to exfiltrate sensitive data from Microsoft 365 Copilot’s context sans any user interaction.
    The critical-rated vulnerability has been assigned the CVE identifier CVE-2025-32711 (CVSS score: 9.3). It requires no customer action and has been already

  • Non-Human Identities: How to Address the Expanding Security Risk

    Non-Human Identities: How to Address the Expanding Security Risk

    Human identities management and control is pretty well done with its set of dedicated tools, frameworks, and best practices. This is a very different world when it comes to Non-human identities also referred to as machine identities. GitGuardian’s end-to-end NHI security platform is here to close the gap.
    Enterprises are Losing Track of Their Machine Identities
    Machine identities–service

  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

    ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

    ConnectWise has disclosed that it’s planning to rotate the digital code signing certificates used to sign ScreenConnect, ConnectWise Automate, and ConnectWise remote monitoring and management (RMM) executables due to security concerns.
    The company said it’s doing so “due to concerns raised by a third-party researcher about how ScreenConnect handled certain configuration data in earlier versions.

  • Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool

    Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool

    Cybersecurity researchers have uncovered a new account takeover (ATO) campaign that leverages an open-source penetration testing framework called TeamFiltration to breach Microsoft Entra ID (formerly Azure Active Directory) user accounts.
    The activity, codenamed UNK_SneakyStrike by Proofpoint, has targeted over 80,000 user accounts across hundreds of organizations’ cloud tenants since a surge in

  • Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

    Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

    Former members tied to the Black Basta ransomware operation have been observed sticking to their tried-and-tested approach of email bombing and Microsoft Teams phishing to establish persistent access to target networks.
    “Recently, attackers have introduced Python script execution alongside these techniques, using cURL requests to fetch and deploy malicious payloads,” ReliaQuest said in a report

  • Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps

    Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps

    Adobe on Tuesday pushed security updates to address a total of 254 security flaws impacting its software products, a majority of which affect Experience Manager (AEM).
    Of the 254 flaws, 225 reside in AEM, impacting AEM Cloud Service (CS) as well as all versions prior to and including 6.5.22. The issues have been resolved in AEM Cloud Service Release 2025.5 and version 6.5.23.
    “Successful

  • Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

    Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

    Cybersecurity researchers have uncovered over 20 configuration-related risks affecting Salesforce Industry Cloud (aka Salesforce Industries), exposing sensitive data to unauthorized internal and external parties.
    The weaknesses affect various components like FlexCards, Data Mappers, Integration Procedures (IProcs), Data Packs, OmniOut, and OmniScript Saved Sessions.
    “Low-code platforms such as

  • FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

    FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

    The financially motivated threat actor known as FIN6 has been observed leveraging fake resumes hosted on Amazon Web Services (AWS) infrastructure to deliver a malware family called More_eggs.
    “By posing as job seekers and initiating conversations through platforms like LinkedIn and Indeed, the group builds rapport with recruiters before delivering phishing messages that lead to malware,” the

  • Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users

    Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users

    Cybersecurity researchers have shed light on a previously undocumented Rust-based information stealer called Myth Stealer that’s being propagated via fraudulent gaming websites.
    “Upon execution, the malware displays a fake window to appear legitimate while simultaneously decrypting and executing malicious code in the background,” Trellix security researchers Niranjan Hegde, Vasantha Lakshmanan