Tag: breach
-
iPhone Hacking Toolkit Tied to Russian Espionage May Have Originated in the U.S.
A highly advanced iPhone hacking toolkit, originally developed for Western intelligence agencies, has leaked into the hands of Russian spies and Chinese cybercriminals. The exploit framework, known internally as >>Coruna,<< was likely created by Trenchant, the hacking and surveillance division of U.S. defense contractor L3Harris. This major breach demonstrates how strictly controlled military cyber weapons…
-
I replaced manual pen tests with automation. Here’s what I learned.
Tags: access, attack, breach, control, cvss, detection, exploit, infrastructure, intelligence, password, penetration-testing, ransomware, RedTeam, resilience, risk, service, siem, soc, tactics, tool, training, update, vulnerability, zero-dayThe remediation black hole: Perhaps most frustrating was what happened after we received findings. Our teams would work diligently to implement fixes, but we rarely had the budget or opportunity to bring testers back to validate remediation. We were left with uncertainty. This gap between identification and verification created a dangerous blind spot in our…
-
WA auditor general flags weak Microsoft 365 security controls across state entities
Western Australia’s Office of the Auditor General has uncovered weaknesses in M365 configurations across seven government agencies, leading to compromised accounts and data breaches First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639954/WA-auditor-flags-weak-Microsoft-365-security-controls-across-state-entities
-
Signal Confirms Sophisticated Phishing Scheme Caused Account Compromises
The secure messaging platform Signal recently confirmed active, targeted phishing campaigns resulting in severe account takeovers. These sophisticated attacks have successfully compromised the accounts of high-profile individuals, specifically targeting government officials and journalists. Despite these high-profile breaches, Signal explicitly clarified that its underlying infrastructure and end-to-end encryption protocols remain robust and completely uncompromised. The breaches…
-
Ericsson US Unit Reports Data Breach Tied To Third-Party Service Provider
Ericsson reached out to employees and customers in the U.S. whose data was breached via a service provider last April to offer security services. First seen on crn.com Jump to article: www.crn.com/news/security/2026/ericsson-u-s-unit-reports-data-breach-tied-to-third-party-service-provider
-
Ericsson US discloses data breach after service provider hack
Ericsson Inc., the U.S. subsidiary of Swedish networking and telecommunications giant Ericsson, says attackers have stolen data belonging to an undisclosed number of employees and customers after hacking one of its service providers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ericsson-us-discloses-data-breach-after-service-provider-hack/
-
Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data
Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/elastic-cloud-siem-manage-stolen/
-
An AI-Powered Poly-Crisis Is Here, and It Is Rewriting Cyber Postures. Are You Breach Ready Yet?
Unless you have been living under a rock over the past few days, you would have seen that AI-powered adversaries are significantly altering how we view cyberattacks and breaches. We are no longer just fighting human adversaries; we are fighting the “new hotness” in cybercrime: agentic AI. As first reported by Bloomberg, a hacker exploited……
-
Cognizant’s TriZetto Provider Solutions data breach impacted over 3.4 million patients
A breach at Cognizant’s TriZetto Provider Solutions exposed sensitive health data belonging to more than 3.4 million patients. A data breach at Cognizant’s TriZetto Provider Solutions exposed sensitive information belonging to more than 3.4 million patients. At this time, no ransomware group has claimed responsibility for the attack yet. TriZetto Provider Solutions is a healthcare…
-
TriZetto Provider Solutions Breach Hits 3.4 Million Patients
Billing services provider TriZetto Provider Solutions has begun notifying millions of patients about a data breach First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/trizetto-provider-solutions-breach/
-
Fake AI Extensions Breached Chat Histories in 20,000+ Enterprise Tenants
Microsoft has issued an alert after uncovering a wave of malicious Chromium-based browser extensions masquerading as legitimate AI assistant tools. The extensions, available on the Chrome Web Store and compatible with both Google Chrome and Microsoft Edge, secretly collected private browser data and AI chat content. Microsoft found that stolen data included full URLs, internal site…
-
“‹”‹How Chinese Hackers Reached America’s Surveillance Infrastructure
Chinese government-linked hackers have breached a network used by the Federal Bureau of Investigation to manage court-authorized surveillance operations. The intrusion, first detected on February 17, 2026, involved systems supporting the FBI’s Digital Collection System Network (DSCNet), infrastructure used to process wiretap and foreign intelligence surveillance requests. While the breach was initially handled quietly, the……
-
Termite ransomware breaches linked to ClickFix CastleRAT attacks
Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/termite-ransomware-breaches-linked-to-clickfix-castlerat-attacks/
-
HHS OCR Fines Firm $10K in Breach Affecting 15M
HIPAA Settlement Small Compared to Many Others. U.S. federal regulators fined a dental practice software vendor with a seemingly lowball financial penalty for a high-stakes 2020 hack affecting 15 million individuals that the company failed to report. Maryland-based MMG Fusion agreed to $10,000. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/hhs-ocr-fines-firm-10k-in-breach-affecting-15m-a-30938
-
HHS OCR Fines Firm $10K in Breach Affecting 15 Million
HIPAA Settlement Small Compared to Many Others. U.S. federal regulators fined a dental practice software vendor with a seemingly lowball financial penalty for a high-stakes 2020 hack affecting 15 million individuals that the company failed to report. Maryland-based MMG Fusion agreed to $10,000. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/hhs-ocr-fines-firm-10k-in-breach-affecting-15-million-a-30938
-
AI Exploits, Cloud Breaches, and Identity Gaps Define This Week’s Cybersecurity Landscape
Weekly summary of Cybersecurity Insider newsletters from the week of March 01, 2026. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/weekly-roundup/ai-exploits-cloud-breaches-and-identity-gaps-define-this-weeks-cybersecurity-landscape/
-
FBI is Investigating the ‘Sophisticated’ Hack of Its Surveillance System
The FBI, CISA, and NSA reportedly are investigating the hack by an unnamed “sophisticated” actor of a FBI surveillance system that holds sensitive information. The breach carries the hallmarks of Chinese nation-state groups and comes amid concerns about attacks in the wake of the war against Iran and the shrinking of the federal cybersecurity apparatus.…
-
Cognizant TriZetto breach exposes health data of 3.4 million patients
TriZetto Provider Solutions, a healthcare IT company that develops software and services used by health insurers and healthcare providers, has suffered a data breach that exposed the sensitive information of over 3.4 million people. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cognizant-trizetto-breach-exposes-health-data-of-34-million-patients/
-
Analysis: Blast Radius for Third-Party Breaches Bigger Than Reported
An analysis of 136 unique major breaches involving third-parties affecting 710 companies, published this week by Black Kite, finds approximately 26,000 additional organizations were impacted, affecting as many as 433 million individuals. Ferhat Dikbiyik, chief research and intelligence officer for Black Kite, said the analysis shines a spotlight on the fact that the actual blast..…
-
CyberProof 2026 Report Warns of Rising Identity and AI Cyberattacks
The CyberProof 2026 report warns that cybercriminals are increasingly using stolen identities and AI to launch faster, more scalable attacks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/cyberproof-2026-report-warns-of-rising-identity-and-ai-cyberattacks/
-
Only 30 minutes per quarter on cyber risk: Why CISO-board conversations are falling short
Boards want more forward-looking insights: The report also suggests that board-CISO communication doesn’t dive as deeply into details as it should in these days of ever more sophisticated, AI-driven cyberattacks.The majority of board directors (82%) say their security leaders’ reporting on regulatory trends was satisfactory or excellent, and that they had strong visibility into program…
-
LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability
LexisNexis confirmed a data breach after hackers leaked stolen files, with attackers claiming they exploited the React2Shell vulnerability. The post LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-lexisnexis-breach-3-9m-records-react-vulnerability/
-
LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability
LexisNexis confirmed a data breach after hackers leaked stolen files, with attackers claiming they exploited the React2Shell vulnerability. The post LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-lexisnexis-breach-3-9m-records-react-vulnerability/
-
North Korean agents using AI to trick western firms into hiring them, Microsoft says
Firm says AI tools are masking identities of false applicants, who then funnel wages from remote IT jobs to North KoreaFake IT workers deployed by North Korea are using AI technology, including voice-changing tools, to trick western companies into hiring them, Microsoft has said.The US tech firm said a signature Pyongyang money-raising ruse is being…
-
Breaches Up, Number of Victims Down, Impact Stronger
The number of data breach victims may have dropped last year, but that’s only because bad actors are getting better at what they do, prioritizing quality over quantity. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/breaches-up-number-of-victims-down-impact-stronger/
-
TriZetto confirms 3.4M people’s health and personal data was stolen during breach
Health tech giant TriZetto has confirmed that more than 3.4 million people had personal and health information stolen in a 2024 cyberattack, which the company failed to detect for almost a year. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/06/trizetto-confirms-3-4m-peoples-health-and-personal-data-was-stolen-during-breach/
-
The Silent Supply Chain: Why Your Fourth-Party Vendor is Your Biggest Blindspot
The CDK Global breach exposed how niche vendors can cripple entire industries. Move beyond questionnaires to continuous, AI-driven monitoring of third-, fourth- and nth”‘party dependencies, dynamic prioritization, and threat”‘informed supply”‘chain risk management. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/the-silent-supply-chain-why-your-fourth-party-vendor-is-your-biggest-blindspot/
-
Transport for London says 2024 breach affected 7M customers, not 5,000
Authority says attackers accessed systems holding data tied to millions of Oyster and contactless users First seen on theregister.com Jump to article: www.theregister.com/2026/03/06/tfl_2024_breach_numbers/

