The Breach Report
Recent Cyber Attacks & Data Breaches In 2024
Security experts provide analysis on the latest cyber attacks you need to know. We go beyond surface-level information to explain what happened, and how you can prevent falling victim to these attacks.
Featured Posts
Data Of More Than 200 Million Twitter Users Is Leaked
Jason Firch, MBA
May 1, 2024
Inside Slack’s GitHub Account Hack
Jason Firch, MBA
May 1, 2024
Cisco Suffers Cyber Attack By UNC2447, Lapsus$, & Yanluowang
Jason Firch, MBA
May 1, 2024
2.4 TB Data Leak Caused By Microsoft’s Misconfiguration
Jason Firch, MBA
May 1, 2024

Data Of 228 Million Deezer Users Stolen
Jason Firch, MBA
May 1, 2024

Saudi Aramco $50 Million Data Breach Explained
Jason Firch, MBA
May 9, 2024

Kubernetes Clusters Hacked: What You Need To Know
Jason Firch, MBA
May 10, 2024

TikTok Denies Cyber Attack: Did It Really Happen?
Jason Firch, MBA
May 1, 2024
Stay Up-To-Date On The Latest Attacks
Be the first to know when our experts release new insights on the top attacks.
You're on the list! Just one more step...
Check your email to confirm your subscription.

Accellion Data Breach: What Happened & Who Was Impacted?
Jason Firch, MBA
May 14, 2024

Pulse Secure VPN Breach: What Happened & What Are The Implications?
Jason Firch, MBA
May 9, 2024

Kaseya VSA Ransomware Attack Explained
Jason Firch, MBA
May 9, 2024

How An International Cybercrime Center Will Mitigate Threats
Jason Firch, MBA
May 8, 2024

Avoslocker Ransomware (Expert Analysis)
Jason Firch, MBA
May 8, 2024

Cloudflare And Twilio Targets Of A Sophisticated Smishing Attack
Jason Firch, MBA
May 8, 2024

NIST Updates Guidance For Healthcare Security
Jason Firch, MBA
May 8, 2024

HC3 Warns Of MailChimp’s Breach To Healthcare Providers
Jason Firch, MBA
May 8, 2024

FlueBot Android Malware Spreading Aggressively
Jason Firch, MBA
May 7, 2024

Follina Windows Zero-Day Vulnerability
Jason Firch, MBA
May 7, 2024

Nimbuspwn Vulnerability Discovered By Microsoft
Jason Firch, MBA
May 7, 2024

Hertzbleed Attack Impacting Intel & AMD CPUs
Jason Firch, MBA
May 7, 2024
Why You Shouldn’t Respond To Phishing Emails
Joshua Selvidge
December 30, 2024
Incident Response Best Practices For 2025
Joshua Selvidge
December 30, 2024
14 Types Of Security Incidents (& How To Prevent Them)
Joshua Selvidge
November 20, 2024
NIST 800-171 Incident Response Plan & Reporting Requirements
Joshua Selvidge
November 10, 2024
7 Proven Security Incident Response Steps For Any Breach
Joshua Selvidge
November 9, 2024
Stay Up-To-Date On The Latest Attacks
Be the first to know when our experts release new insights on the top attacks.
You're on the list! Just one more step...
Check your email to confirm your subscription.