Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What the Tea App Breach Reveals About Mobile Security in 2025

In July 2025, Tea Dating Advice—an app designed to help women vet dating partners—was thrust into the spotlight after a catastrophic data breach. International publications, including BBC, NPR, and The New York Times, reported that over 72,000 user images and 1.1 million private messages were leaked, exposing deeply sensitive information about more than 1.6 million users. The breach affected users who joined before February 2024 due to a failure to migrate legacy data to secure storage.

Top VAPT Service Providers for ABHA

As of February 6, 2025, India has over 740 million Ayushman Bharat Health accounts(ABHA), and close to 500 million health records linked with ABHA. Moreover, this architecture caters to more than 1,59,000 healthcare facilities and the personal data of over 6,00,000 professionals (under the HPR), respectively, with five digital foundational pillars.

What Is a Data Breach and How to Prevent It?

Let’s be honest: few phrases can make your stomach drop faster than “your data has been compromised.” Whether you’re an individual trying to protect your passwords or a business managing millions of customer accounts, the fear of a data breach is real and growing. We live in a time where almost everything is online: our finances, our health records, our identities.

Toptal GitHub Breach Exposes Critical Gaps in Open-Source Security

In a stark reminder of the increasing risk to software supply chains, freelance talent platform Toptal is the latest high-profile organization impacted by a compromise of a GitHub account that led to the deployment of malicious npm packages with the capability to wipe developer machines and steal passwords. The breach, first disclosed last week, has shocked the developer community and exposed serious flaws in repository security, disclosure practices, and package ecosystem hygiene.

xonPlus Launches Real-Time Breach Alerting Platform for Enterprise Credential Exposure

xonPlus, a real-time digital risk alerting system, officially launches today to help security teams detect credential exposures before attackers exploit them. The platform detects data breaches and alerts teams and systems to respond instantly. Built by the team behind XposedOrNot, an open-source breach detection tool used by thousands, xonPlus gives organizations instant visibility when their email addresses or domains appear in breach dumps or dark web forums.

What You Need to Know about the Radiology Associates of Richmond Data Breach

Founded by Dr. Daniel Talley in 1905, the Radiology Associates of Richmond is one of America's oldest private radiology practices. RAR has since been at the forefront of advanced diagnostic, interventional services, and medical imaging. The institution spans seven hospitals and four outpatient centers in central Virginia. RAR has 62 board-certified radiologists, and the practice specializes in breast imaging, neuroradiology, and vascular interventions.

Inside the MOVEit Breach: How Cl0p and Nam3L3ss Expose Organizations to Ongoing Cyber Threats

In 2023, a critical vulnerability in MOVEit Transfer software (CVE-2023-34362) was weaponized by the Cl0p ransomware group, leading to a substantial leak of sensitive employee data from major global corporations. The flaw in MOVEit allowed attackers to bypass authentication and access secure files, resulting in a far-reaching data breach that impacted various sectors including finance, healthcare, government, and retail.

Beyond the Firewall: Why Advanced Cybersecurity is Non-Negotiable for Modern Business

In today's hyper-connected digital economy, data is the new currency. From customer information and financial records to intellectual property and strategic plans, a company's most valuable assets are stored, processed, and transmitted as bits and bytes. This digital transformation has unlocked unprecedented opportunities for growth and innovation, but it has also opened the door to a new and persistent threat: sophisticated cyberattacks.

EP 11 - The calm CISO: Strength under pressure

What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant.

What the Latest Mega Breaches Teach Us About Cybersecurity Board Reporting

‍ ‍ ‍Both the Marks & Spencer ransomware attack and the Qantas breach dominated headlines for weeks, each exposing serious lapses in how data and risk were managed at the organizational level. But within the cybersecurity community, the response took a different turn. Unlike with other commentary post-cyber incidents, the focus quickly moved away from compromised systems and toward something more structural. These weren’t framed as technical breakdowns.