Skip to content
Header Image
BreachWave- Cybersecurity News
  • Threat Intelligence
  • Vulnerabilities
  • Cybercrime News
    • Governance Risk Compliance
  • Incident Response
  • Cloud Security
  • AI Security

Category: Cyber security

  • Home
  • Cyber security
SonicWall SonicOS Flaw Allows Firewalls to Crash
Cloud Security Cyber security

SonicWall SonicOS Flaw Allows Firewalls to Crash

A high severity vulnerability in the SonicWall SonicOS firmware has been identified and publicly disclosed. Network administrators are being urged to apply updates immediately due to the risk of remote…
by admin November 21, 2025November 21, 2025
Salesforce Investigates Customer Data Theft Through Third Party Integration
Business Cyber security

Salesforce Investigates Customer Data Theft Through Third Party Integration

Salesforce has launched an investigation into customer data exposure that appears to be linked to a third party integration involving Gainsight applications. The incident did not originate from a flaw…
by Research Team November 21, 2025November 21, 2025
Fortinet Warns of New FortiWeb Zero-Day Exploited in Attacks
AI Security Cyber security

Fortinet Warns of New FortiWeb Zero-Day Exploited in Attacks

Fortinet has released security updates to fix a newly discovered zero-day vulnerability in FortiWeb appliances. The flaw, tracked as CVE‑2025‑58034, allows authenticated attackers to execute unauthorized code via crafted HTTP…
by SOC Analyst November 20, 2025November 21, 2025
Sneaky 2FA Phishing Kit Uses Browser-in-the-Browser Tactic
Cyber security

Sneaky 2FA Phishing Kit Uses Browser-in-the-Browser Tactic

A new phishing-as-a-service (PhaaS) kit known as Sneaky 2FA has been observed deploying an advanced “Browser-in-the-Browser” (BitB) attack technique. The Hacker News+2Push Security+2 This evolution in phishing attacks presents heightened…
by Research Team November 20, 2025November 21, 2025
Meet ShinySp1d3r: A New Ransomware-As-A-Service Platform
Business Cyber security Cybercrime News Global

Meet ShinySp1d3r: A New Ransomware-As-A-Service Platform

A newly emerging ransomware-as-a-service (RaaS) platform named ShinySp1d3r has been uncovered. It is being developed by threat actors associated with the groups known as ShinyHunters and Scattered Spider. Who is…
by Research Team November 20, 2025
Critical Vulnerability in 7 Zip Under Active Exploitation
Cyber security Cybercrime News

Critical Vulnerability in 7 Zip Under Active Exploitation

A serious security flaw in 7 Zip has recently come under active exploitation in the wild. The vulnerability is tracked as CVE-2025-11001 and carries a CVSS score of 7.0, indicating…
by admin November 20, 2025November 20, 2025
Cloudflare Outage on November 18 2025 – What Went Wrong and Why It Matters
Business Cloud Security Cyber security Global

Cloudflare Outage on November 18 2025 – What Went Wrong and Why It Matters

On November 18 2025 a major global internet disruption originated from Cloudflare that affected websites applications and digital services worldwide. The issue began around 11 20 UTC when Cloudflare’s network…
by admin November 20, 2025November 20, 2025
Application Containment and Why It Is Essential for Modern Cybersecurity
Business Cloud Security Cyber security

Application Containment and Why It Is Essential for Modern Cybersecurity

Application containment is a rapidly evolving area in cybersecurity that addresses a key weakness in traditional defenses. Rather than waiting for threats to be detected and then responded to, containment…
by admin November 20, 2025November 20, 2025
Microsoft Azure Hit by Record 15 Tbps DDoS Attack from Aisuru Botnet
Cloud Security Cyber security Cybercrime News

Microsoft Azure Hit by Record 15 Tbps DDoS Attack from Aisuru Botnet

In a startling development for cloud warfare and cybersecurity resilience, Microsoft’s Azure platform faced an unprecedented distributed denial-of-service (DDoS) attack. The assault was launched by the Aisuru botnet, leveraging hundreds…
by admin November 18, 2025November 18, 2025
Five Key Reasons Attackers Are Targeting LinkedIn And Other Professional Networking Platforms
Cyber security Cybercrime News Global

Five Key Reasons Attackers Are Targeting LinkedIn And Other Professional Networking Platforms

Phishing is no longer limited to email. Attackers now use professional networking platforms such as LinkedIn to reach employees in ways that bypass traditional security layers. These platforms mix personal…
by admin November 18, 2025November 18, 2025

Posts pagination

1 2 Next

Recent Posts

  • SonicWall SonicOS Flaw Allows Firewalls to Crash
  • Salesforce Investigates Customer Data Theft Through Third Party Integration
  • Fortinet Warns of New FortiWeb Zero-Day Exploited in Attacks
  • Sneaky 2FA Phishing Kit Uses Browser-in-the-Browser Tactic
  • Meet ShinySp1d3r: A New Ransomware-As-A-Service Platform

Categories

  • AI Security
  • Business
  • Cloud Security
  • Cyber security
  • Cybercrime News
  • Global
  • Governance Risk Compliance
  • How To Guides
  • Incident Response
  • SOC Automation
  • Threat Intelligence
  • Tool Reviews
About BreachWave

At Breachwave every story is written with a commitment to depth and clarity. The goal is to break down complex incidents malware discoveries industry shifts and emerging risks into content that is easy to understand yet rich with insight. Cybersecurity can feel overwhelming and the purpose of this platform is to make it accessible without losing the technical detail that matters.

Gallery

Recent Posts

  • SonicWall SonicOS Flaw Allows Firewalls to Crash
  • Salesforce Investigates Customer Data Theft Through Third Party Integration
  • Fortinet Warns of New FortiWeb Zero-Day Exploited in Attacks
  • Sneaky 2FA Phishing Kit Uses Browser-in-the-Browser Tactic

Categories

  • AI Security
  • Business
  • Cloud Security
  • Cyber security
  • Cybercrime News
  • Global
  • Governance Risk Compliance
  • How To Guides
  • Incident Response
  • SOC Automation
  • Threat Intelligence
  • Tool Reviews