Spain’s Ministry of Science, Innovation and Universities has temporarily disabled parts of its digital infrastructure following what it described as a technical problem. The disruption has affected several online services used by citizens, universities, researchers, and businesses for official…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Infy Hackers Strike Again With New C2 Servers After Iran’s Internet Shutdown Ends
Infy group’s new attack tactic An Iranian hacking group known as Infy (aka Prince of Persia) has advanced its attack tactics to hide its operations. The group also made a new C2 infrastructure while there was a wave of internet…
A Quiet Breach of a Familiar Tool, Notepad++
For six months last year the update system of Notepad++, one of the world’s most widely used Windows text editors, was quietly subverted by hackers linked by investigators to the Chinese state. The attackers used their access not to disrupt…
AISURU/Kimwolf Botnet Behind Record 31.4 Tbps DDoS Attack, Cloudflare Reveals
A massive distributed denial-of-service (DDoS) assault reaching an unprecedented peak of 31.4 terabits per second (Tbps) has been attributed to the AISURU/Kimwolf botnet. The attack, which lasted just 35 seconds, is now being described as one of the largest…
AI Hijacks AWS Cloud in 8 Minutes via Exposed Keys
An AI-assisted cyberattack hijacked a company’s AWS cloud infrastructure in just eight minutes after attackers discovered exposed test credentials in a public S3 bucket, demonstrating how configuration errors can fuel lightning-fast breaches in the era of automated threats. This…
Threat Actors Leverage Hugging Face to Spread Android Malware at Scale
Initially appearing as a routine security warning for mobile devices, this warning has evolved into a carefully engineered malware distribution pipeline. Researchers at Bitdefender have identified an Android campaign utilizing counterfeit security applications that serve as the first stage…
Orchid Security Launches Tool to Monitor Identity Behavior Across Business Applications
Modern organizations rely on a wide range of software systems to run daily operations. While identity and access management tools were originally designed to control users and directory services, much of today’s identity activity no longer sits inside those…
Experts Find Malicious Browser Extensions, Chrome, Safari, and Edge Affected
Threat actors exploit extensions Cybersecurity experts found 17 extensions for Chrome, Edge, and Firefox browsers which track user’s internet activity and install backdoors for access. The extensions were downloaded over 840,000 times. The campaign is not new. LayerX claimed that…
China-Linked Hackers Step Up Quiet Spying Across South-East Asia
Threat actors linked to China have been blamed for a new wave of cyber-espionage campaigns targeting government and law-enforcement agencies across South-East Asia during 2025, according several media reports. Researchers at Check Point Research said they are tracking a previously…
Smart Homes Under Threat: How to Reduce the Risk of IoT Device Hacking
Most households today use some form of internet of things (IoT) technology, whether it’s a smartphone, tablet, smart plugs, or a network of cameras and sensors. Learning that nearly 120,000 home security cameras were compromised in South Korea and…
Microsoft Unveils Backdoor Scanner for Open-Weight AI Models
Microsoft has introduced a new lightweight scanner designed to detect hidden backdoors in open‑weight large language models (LLMs), aiming to boost trust in artificial intelligence systems. The tool, built by the company’s AI Security team, focuses on subtle behavioral…
Makina Finance Loses $4M in ETH After Flash Loan Price Manipulation Exploit
One moment it was operating normally – then suddenly, price feeds went haywire. About 1,299 ETH vanished during what looked like routine activity. That sum now exceeds four million dollars in value. The trigger? A flash loan attack targeting…
Foxit Publishes Security Patches for PDF Editor Cloud XSS Bugs
In response to findings that exposed weaknesses in the way user-supplied data was processed within interactive components, Foxit Software has issued a set of security fixes intended to address newly identified cross-site scripting vulnerabilities. Due to the flaws in…
Tribal Health Clinics in California Report Patient Data Exposure
Patients receiving care at several tribal healthcare clinics in California have been warned that a cyber incident led to the exposure of both personal identification details and private medical information. The clinics are operated by a regional health organization…
Researchers Disclose Patched Flaw in Docker AI Assistant that Enabled Code Execution
Researchers have disclosed details of a previously fixed security flaw in Ask Gordon, an artificial intelligence assistant integrated into Docker Desktop and the Docker command-line interface, that could have been exploited to execute code and steal sensitive data. The vulnerability,…
Federal Agencies Worldwide Hunt for Black Basta Ransomware Leader
International operation to catch Ransomware leader International law enforcement agencies have increased their search for individuals linked to the Black Basta ransomware campaign. Agencies confirmed that the suspected leader of the Russia-based Ransomware-as-a-service (RaaS) group has been put in the…
Why Cloud Outages Turn Identity Systems into a Critical Business Risk
Recent large-scale cloud outages have become increasingly visible. Incidents involving major providers like AWS, Azure, and Cloudflare have disrupted vast portions of the internet, knocking critical websites and services offline. Because so many digital platforms are interconnected, these failures…
Orchid Security Debuts Continuous Identity Observability Platform
Over the past two decades, organizations have steadily expanded their identity security portfolios, layering IAM, IGA, and PAM to deploy access control at scale. However, identity-driven breaches continue to grow in both frequency and impact despite this sustained investment.…
Iconics SCADA Flaw Enables Privileged File Abuse and Windows DoS
A newly disclosed flaw in Mitsubishi Electric’s Iconics Suite SCADA platform, tracked as CVE-2025-0921, exposes critical industrial environments to denial-of-service attacks by abusing privileged file system operations in Windows-based engineering workstations. Rated with a CVSS score of 6.5, the…
PDFSider Malware Used in Fortune 100 Finance Ransomware Attack
A Fortune 100 finance company was targeted by ransomware actors using a new Windows malware strain called PDFSider, built to quietly deliver malicious code during intrusions. Rather than relying on brute force, the attackers used social engineering, posing as…