As artificial intelligence becomes more common in business settings, experts are warning that these tools could be the next major target for online criminals. Some of the biggest software companies, like Microsoft and SAP, have recently started using AI…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Fake Microsoft Office Add-Ins Targeting Crypto Transactions
The attackers are leveraging SourceForge to distribute fraudulent Microsoft add-ins that install malware on victims’ PCs to mine and siphon crypto. SourceForge.net is a legitimate software hosting and distribution platform that also offers version control, issue tracking, and dedicated…
Building Smarter AI Through Targeted Training
In recent years, artificial intelligence and machine learning have been in high demand across a broad range of industries. As a consequence, the cost and complexity of constructing and maintaining these models have increased significantly. Artificial intelligence and machine…
WhatsApp Windows Vulnerability CVE-2025-30401 Could Let Hackers Deliver Malware via Fake Images
Meta has issued a high-priority warning about a critical vulnerability in the Windows version of WhatsApp, tracked as CVE-2025-30401, which could be exploited to deliver malware under the guise of image files. This flaw affects WhatsApp versions prior to…
New Virus Spreading Through YouTube Puts Windows Users at Risk
A new type of digital threat is quietly spreading online, and it’s mainly affecting people who use Windows computers. This threat, called Neptune RAT, is a kind of harmful software that allows hackers to take over someone’s system from…
US regulator OCC Claims Email Hack Exposed Sensitive Bank Details
The US Office of the Comptroller of the Currency (OCC), a key banking regulator, officially classified a significant breach of its email system as a “major information security incident” after learning that malicious actors accessed highly sensitive bank supervisory…
Cybercriminals Target QuickBooks Users with Phishing Attacks via Google Ads Ahead of Tax Deadline
With the April 15 U.S. tax deadline looming, millions of users are logging in to manage their finances online—unfortunately, cybercriminals are watching too. Leveraging this surge in digital activity, attackers are exploiting trusted platforms like Google to deceive users…
FBI Operated ElonmuskWHM: Undercover Money Laundering Site That Handled $90M in Crypto
In a bold and controversial move, the FBI operated a money laundering platform on the dark web under the alias “ElonmuskWHM,” aiming to infiltrate the criminal ecosystem it served. According to an investigation by 404 Media, the FBI’s undercover…
Hackers Demand $4 Million After Alleged NASCAR Data Breach.
The motorsports industry has recently been faced with troubling news that NASCAR may have become the latest high-profile target for a ransomware attack as a result of the recent hackread.com report. According to the organization’s internal systems being breached…
Malicious PyPi Package ‘disgrasya’ Exploits WooCommerce Stores for Card Fraud, Downloaded Over 34,000 Times
A newly uncovered malicious Python package on PyPi, named ‘disgrasya’, has raised serious concerns after it was discovered exploiting WooCommerce-powered e-commerce sites to validate stolen credit card information. Before its removal, the package had been downloaded more than 34,000…
Researchers Unearth a Massive Data Leak Within Apollo Hospitals
For security analysts Akshay and Viral, a casual check of a healthcare system’s security quickly turned into a huge finding. The duo discovered a major data leak at Apollo Hospitals, one of India’s leading hospital networks. The breach first…
Cybercriminal Group’s Website Taken Over by Unknown Hacker
A criminal group known for using ransomware was recently caught off guard when its own website was tampered with. The website, which the gang normally uses to publish stolen data from their victims, was replaced with a short message…
Europcar GitLab Breach Exposes Sensitive User Data and Configuration Files
A cybersecurity breach allegedly targeting Europcar has brought attention to vulnerabilities in corporate development platforms. A threat actor operating under the alias “Europcar” recently claimed on an underground forum that they had gained unauthorized access to the car rental…
New Sec-Gemini v1 from Google Outperforms Cybersecurity Rivals
A cutting-edge artificial intelligence model developed by Google called Sec-Gemini v1, a version of Sec-Gemini that integrates advanced language processing, real-time threat intelligence, and enhanced cybersecurity operations, has just been released. With the help of Google’s proprietary Gemini large…
Karnataka Sets Up India’s First Cyber Command Centre to Tackle Online Crimes
Karnataka has taken a big step to fight the rising number of online crimes. It has launched the country’s first Cyber Command Centre. This new centre will handle all matters related to cyber safety and crime under one roof.…
Why Personal Identity Should Remain Independent of Social Platforms
Digital services are now as important as other public utilities such as electricity and water in today’s interconnected world. It is very important for society to expect a similar level of consistency and quality when it comes to these…
Generative AI Fuels Identity Theft, Aadhaar Card Fraud, and Misinformation in India
A disturbing trend is emerging in India’s digital landscape as generative AI tools are increasingly misused to forge identities and spread misinformation. One user, Piku, revealed that an AI platform generated a convincing Aadhaar card using only a name,…
WinRAR Bug Circumvents Windows Mark of Web Security Notifications.
A security flaw in the WinRAR file archiver solution might be used to circumvent the Mark of the Web (MotW) security warning and execute arbitrary code on a Windows computer. The vulnerability is known as CVE-2025-31334 and impacts all…
Ethical Hacking: The Cyber Shield Organizations Need
Ethical hacking may sound paradoxical, but it’s one of the most vital tools in modern cyber defence. Known as white hat hackers, these professionals are hired by companies to simulate cyberattacks, uncover vulnerabilities, and help fix them before malicious…
Meta Launches New Llama 4 AI Models
Meta has introduced a fresh set of artificial intelligence models under the name Llama 4. This release includes three new versions: Scout, Maverick, and Behemoth. Each one has been designed to better understand and respond to a mix of…
The Rise of Cyber Warfare and Its Global Implications
In Western society, the likelihood of cyberattacks is arguably higher now than it has ever been. The National Cyber Security Centre (NCSC) advised UK organisations to strengthen their cyber security when Russia launched its attack on Ukraine in early…
How GenAI Is Revolutionizing HR Analytics for CHROs and Business Leaders
Generative AI (GenAI) is redefining how HR leaders interact with data, removing the steep learning curve traditionally associated with people analytics tools. When faced with a spike in hourly employee turnover, Sameer Raut, Vice President of HRIS at Sunstate…
Cybercrime Group Changes Plans: Drops Ransomware, Focuses on Data Theft
A cybercriminal group known for ransomware attacks has decided to stop using those methods and instead focus only on stealing information and demanding money in return. The group, called Hunters International, has rebranded and is now running a new…
New WhatsApp Feature Allows Users to Control Media Auto-Saving
As part of WhatsApp’s ongoing efforts to ensure the safety of its users, a new feature will strengthen the confidential nature of chat histories. The enhancement is part of the platform’s overall initiative aimed at increasing privacy safeguards and…
NSA Warns of Fast Flux DNS Evasion Employed by Cybercrime Outfits
The FBI, the Cybersecurity and Infrastructure Security Agency, and a group of international partners have warned that cyber threat groups are utilising a technique known as “fast flux” to conceal the whereabouts of malicious servers, which poses a substantial…
Chinese Cyber Espionage Suspected in New Ivanti VPN Malware Attack
A newly discovered cyberattack campaign targeting Ivanti VPN devices is suspected to be linked to a Chinese cyberespionage group. Security researchers believe the attackers exploited a critical vulnerability in Ivanti Connect Secure, which was patched by the Utah-based company…
ToddyCat Hackers Exploit ESET Vulnerability to Deploy Stealth Malware TCESB
A cyber-espionage group known as ToddyCat, believed to have ties to China, has been observed exploiting a security flaw in ESET’s software to deliver a new and previously undocumented malware strain called TCESB, according to fresh findings by cybersecurity…
Lazarus Gang Targets Job Seekers to Install Malware
North Korean hackers responsible for Contagious Interview are trapping job seekers in the cryptocurrency sector by using the popular ClickFix social-engineering attack strategy. They aimed to deploy a Go-based backdoor— earlier undocumented— known as GolangGhost on Windows and macOS systems. …
Dark Web Site DogeQuest Targets Tesla Owners Using Data from ParkMobile Breach
A disturbing dark web website known as DogeQuest has surfaced, targeting Tesla owners and associates of Elon Musk by publishing their personal information. The data used on the site appears to have been sourced largely from a 2021 breach…
Ensuring AI Delivers Value to Business by Making Privacy a Priority
Many organizations are adopting Artificial Intelligence (AI) as a capability, but the focus is shifting from capability to responsibility. In the future, PwC anticipates that AI will be worth $15.7 trillion to the global economy, an unquestionable transformational potential.…
The Growing Danger of Hidden Ransomware Attacks
Cyberattacks are changing. In the past, hackers would lock your files and show a big message asking for money. Now, a new type of attack is becoming more common. It’s called “quiet ransomware,” and it can steal your private…
Hospital Equipments Can be Used as Murder Weapons, Swiss Experts Warn
Swiss specialists have issued a grave warning that cyber attackers could use hospital devices to commit murder. In an alarming new research from Zurich-based cybersecurity firm Scip AG, specialists showed how they were simply able to hijack medical devices…
CISA Highlights Major Vulnerabilities in Critical Infrastructure Systems
The Cybersecurity and Infrastructure Security Agency (CISA) has released two significant advisories focused on Industrial Control Systems (ICS), urging swift action from organizations operating within vital infrastructure sectors. These advisories—ICSA-25-091-01 and ICSA-24-331-04—highlight newly discovered vulnerabilities that could pose severe…
Hacker’s Dual Identity: Cybercriminal vs Bug Bounty Hunter
EncryptHub is an infamous threat actor responsible for breaches at 618 organizations. The hacker reported two Windows zero-day flaws to Microsoft, exposing a conflicted figure that blurs the lines between cybercrime and security research. The reported flaws are CVE-2025-24061 (Mark…
Payment Fraud on the Rise: How Businesses Are Fighting Back with AI
The threat of payment fraud is growing rapidly, fueled by the widespread use of digital transactions and evolving cyber tactics. At its core, payment fraud refers to the unauthorized use of someone’s financial information to make illicit transactions. Criminals are…
Cisco CVE-2024-20439: Exploitation Attempts Target Smart Licensing Utility Backdoor
A critical vulnerability tracked as CVE-2024-20439 has placed Cisco’s Smart Licensing Utility (CSLU) in the spotlight after cybersecurity researchers observed active exploitation attempts. The flaw, which involves an undocumented static administrative credential, could allow unauthenticated attackers to remotely access…
WhatsApp for Windows Exposed to Security Risk Through Spoofing Vulnerability
Whatsapp for Windows has been recently revealed to have a critical security vulnerability known as CVE-2025-30401. This vulnerability has raised serious concerns within the cybersecurity community since it has been identified. The high severity of this vulnerability affects desktop…
Smishing Surge Expected in 2025 Driven by Sophisticated Phishing-as-a-Service Platform
Security researchers are sounding the alarm on a looming global wave of smishing attacks, warning that a powerful phishing-as-a-service (PhaaS) platform named Lucid—run by Chinese-speaking threat actors—is enabling cybercriminals to scale operations across 88 countries. According to threat intelligence firm…
6 Cybersecurity Mistakes That Put Businesses at Risk
In today’s digital-first economy, technology is a vital part of every business, from small local operations to international corporations. However, the growing reliance on tech also brings significant risks. With over half of global businesses reportedly suffering financial losses…
Yoojo Exposes Millions of Sensitive Files Due to Misconfigured Database
Yoojo, a European service marketplace, accidentally left a cloud storage bucket unprotected online, exposing around 14.5 million files, including highly sensitive user data. The data breach was uncovered by Cybernews researchers, who immediately informed the company. Following the alert,…
Russians Seize Malware-Infected Ukrainian Drones
Ukrainian forces are installing malware into their drones as a new tactic in their ongoing war with Russia. This development adds a cyber warfare layer to a battlefield that has already been impacted by drone technology, Forbes reported. Russian…
Hacker Claims Oracle Cloud Breach, Threatens to Leak Data
A hacker who goes by the name “Rose87168” is claiming to have broken into Oracle Cloud systems and is now threatening to release or sell the data unless their demands are met. According to security researchers, this person says…
Malware Campaign Uses Fake CAPTCHAs, Tricks Online Users
Researchers at Netskope Threat Labs have found a new malicious campaign that uses tricky tactics to distribute the Legion Loader malware. The campaign uses fake CAPTCHAs and CloudFlare Turnstile to trap targets into downloading malware that leads to the installation…
DragonForce Asserts Dominance Over RansomHub Ransomware Network
A series of targeted attacks involving DragonForce, a ransomware group that has reportedly been operating in the Middle East and North Africa region (MENA) are reported to have been launched against companies in the Kingdom of Saudi Arabia (KSA)…
Massive Data Breach Hits Elon Musk’s X Platform
A potentially massive data breach has reportedly compromised Elon Musk’s social media platform X, previously known as Twitter, raising significant privacy concerns for millions of users. Cybersecurity researchers from SafetyDetectives discovered a troubling post over the weekend on BreachForums,…
Apple and Google App Stores Host VPN Apps Linked to China, Face Outrage
Google (GOOGL) and Apple (AAPL) are under harsh scrutiny after a recent report disclosed that their app stores host VPN applications associated with a Chinese cybersecurity firm, Qihoo 360. The U.S government has blacklisted the firm. The Financial Times reports…
Triada Malware Embedded in Counterfeit Android Devices Poses Global Security Risk
There has been a significant increase in counterfeit Android smartphones in recent years. Recently, cybersecurity investigations have revealed a concern about counterfeit Android smartphones. These unauthorized replicas of popular mobile devices, which are being widely circulated and are pre-loaded…
Google sets new rules to improve internet safety through better website security
Google is taking major steps to make browsing the web safer. As the company behind Chrome, the most widely used internet browser, Google’s decisions shape how people all over the world experience the internet. Now, the company has announced…
Fake Zoom Download Sites Spreading BlackSuit Ransomware, Experts Warn
A new cyberattack campaign is targeting Zoom users by disguising ransomware as the popular video conferencing tool, according to Cybernews. Researchers from DFIR have uncovered a scheme by the BlackSuit ransomware gang, which uses deceptive websites to distribute malicious…
North Korean Hackers Use 11 Malicious npm Packages to Propagate BeaverTail Malware
The North Korean threat actors behind the ongoing Contagious Interview campaign are expanding their tentacles on the npm ecosystem by distributing more malicious packages including the BeaverTail malware and a new remote access trojan (RAT) loader. “These latest samples…
Russia Accused of Carrying Out Over 50 Secret Operations Across Europe
In the last few years since the war in Ukraine began, several European countries have experienced unusual and suspicious activities. These events include online attacks, spying, fires, and efforts to spread false information. Investigations suggest that many of these…
Hackers Exploit WordPress Logins, Secretly Run Codes
Threat actors are exploiting the WordPress mu-plugins (“Must-Use Plugins”) directory to secretly execute malicious code on each page while avoiding detection. The technique was first observed by security researchers at Sucuri in February 2025, but adoption rates are on the…
What Are USB Kill Sticks and How They Can Destroy Your Devices
Most people think of USB drives as simple tools for storing and transferring files. But not all USB sticks are as harmless as they appear. Some, known as “USB Kill Sticks” or “USB Killers,” are specifically designed to damage…
Check Point Downplays Hacker’s Claims Amid Alleged Data Breach
A hacker using the alias “CoreInjection” has claimed responsibility for stealing what they describe as a “highly sensitive” dataset from cybersecurity firm Check Point. According to several media reports, the alleged stolen data includes user login credentials, employee contracts,…
Smishing Triad Broadens Fraud Campaign to Include Toll Payment Services
Tolling agencies throughout the United States are battling an escalating cybersecurity threat that is causing deceptive text message scams, which are often called smishing, to escalate. As a result of these fraudulent campaigns, unsuspecting motorists are lured into clicking…
APIsec Secures Exposed Customer Data After Unprotected Database Found Online
API security firm APIsec has confirmed it secured an exposed internal database that was left accessible on the internet without a password for several days, potentially exposing sensitive customer information. The database, which was discovered by cybersecurity research firm…
Turned Into a Ghibli Character? So Did Your Private Info
A popular trend is taking over social media, where users are sharing cartoon-like pictures of themselves inspired by the art style of Studio Ghibli. These fun, animated portraits are often created using tools powered by artificial intelligence, like ChatGPT-4o.…
Oracle Finally Acknowledges Cloud Hack
Oracle is reportedly trying to downplay the impact of the attack while quietly acknowledging to clients that some of its cloud services have been compromised. A hacker dubbed online as ‘rose87168’ recently offered to sell millions of lines of…
Phishing Scams Are Getting Smarter – And More Subtle : Here’s All You Need to Know
Cybercriminals are evolving. Those dramatic emails warning about expired subscriptions, tax threats, or computer hacks are slowly being replaced by subtler, less alarming messages. New research suggests scammers are moving away from attention-grabbing tactics because people are finally catching…
Hackers Can Spy on Screens Using HDMI Radiation and AI Models
You may feel safe behind your screen, but it turns out that privacy might be more of an illusion than a fact. New research reveals that hackers have found an alarming way to peek at what’s happening on your…
Massive Data Breach at Samsung Exposes 270000 Records
During the analysis of the Samsung Germany data breach, a wide range of sensitive information was found to be compromised, including customer names, addresses, email addresses, order history, and internal communications, among other sensitive data. Those findings were contained…
Revolution or Hype? Meet the AI Agent That’s Automating Invoicing for Thousands
French startup Twin has introduced its very first AI-powered automation tool to help business owners who use Qonto. Qonto is a digital banking platform that offers financial services to companies across Europe. Many Qonto users spend hours each month…
Vulnerabilities Alert: Solar Power Grids Worldwide Under Threat of Cyber Attacks
Global solar power industry under threat The rise in the use of solar power worldwide has revealed gaps in cybersecurity in cloud computing devices, inverters, and monitoring platforms. As these become prone to critical vulnerabilities, it creates an unsafe ecosystem…
AI Powers Airbnb’s Code Migration, But Human Oversight Still Key, Say Tech Giants
In a bold demonstration of AI’s growing role in software development, Airbnb has successfully completed a large-scale code migration project using large language models (LLMs), dramatically reducing the timeline from an estimated 1.5 years to just six weeks. The…
Ukrzaliznytsia Cyberattack Disrupts Online Ticket Sales but Train Services Remain Unaffected
Ukraine’s national railway operator, Ukrzaliznytsia, has fallen victim to a large-scale cyberattack, severely disrupting its online ticket sales and forcing passengers to rely on physical ticket booths. The attack, which began on March 23, has caused significant delays, long…
BitcoinOS to Introduce Alpha Mainnet for Digital Ownership Platform
BitcoinOS and Sovryn founder Edan Yago is creating a mechanism to turn Bitcoin into a digital ownership platform. Growing up in South Africa and coming from a family of Holocaust survivors, Yago’s early experiences sneaking gold coins out of…
Threat Actors Compromised by Security Firms Working to Protect Victims
An outstanding example of counter-cybercrime has been the successful penetration of the digital infrastructure associated with the ransomware group BlackLock. Threat intelligence professionals succeeded in successfully infiltrating this infrastructure. As a result of this operation, researchers were able to…
600 Phishing Campaigns Emerged After Bybit Heist, Biggest Crypto Scam in History
Recently, the cryptocurrency suffered the largest cyberattack to date. The Bybit exchange was hit by the “largest cryptocurrency heist in history, with approximately $1.5 billion in Ethereum tokens stolen in a matter of hours,” Forbes said. After the Bybit hack,…
StreamElements Confirms Data Exposure via Former Third-Party Provider
Cloud-based streaming tools provider StreamElements has acknowledged a data breach stemming from a third-party service it previously collaborated with after a threat actor leaked customer data samples on a hacking forum. While StreamElements confirmed its own infrastructure remains uncompromised, the…
China’s FamousSparrow APT Hits United States Via SparrowDoor Malware
A China-linked cyberespionage gang known as ‘FamousSparrow’ was caught utilising a new modular version of its signature backdoor ‘SparrowDoor’ against a US-based trade organisation. Security experts at ESET spotted the activities and new malware version, uncovering evidence that the…
Orion Brings Fully Homomorphic Encryption to Deep Learning for AI Privacy
As data privacy becomes an increasing concern, a new artificial intelligence (AI) encryption breakthrough could transform how sensitive information is handled. Researchers Austin Ebel, Karthik Garimella, and Assistant Professor Brandon Reagen have developed Orion, a framework that integrates fully…
DeepSeek Revives China’s Tech Industry, Challenging Western Giants
As a result of DeepSeek’s emergence, the global landscape for artificial intelligence (AI) has been profoundly affected, going way beyond initial media coverage. AI-driven businesses, semiconductor manufacturing, data centres and energy infrastructure all benefit from its advancements, which are…
Alibaba Launches Latest Open-source AI Model from Qwen Series for ‘Cost-effective AI agents’
Last week, Alibaba Cloud launched its latest AI model in its “Qwen series,” as large language model (LLM) competition in China continues to intensify after the launch of famous “DeepSeek” AI. The latest “Qwen2.5-Omni-7B” is a multimodal model- it can…
New Android Banking Trojan ‘Crocodilus’ Emerges as Sophisticated Threat in Spain and Turkey
A newly identified Android banking malware named Crocodilus is making waves in the cybersecurity world, with experts warning about its advanced capabilities and targeted attacks in Spain and Turkey. Discovered by Dutch mobile security firm ThreatFabric, the malware represents…
Alibaba Launches Lates Open-source AI Model from Qwen Series for ‘Cost-effective AI agents’
Last week, Alibaba Cloud launched its latest AI model in its “Qwen series,” as large language model (LLM) competition in China continues to intensify after the launch of famous “DeepSeek” AI. The latest “Qwen2.5-Omni-7B” is a multimodal model- it can…
Experts Suggest Evolving Cyber Attacks Not Ending Anytime Soon
In a series of unfortunate events, experts suggest the advancement of cybercrime isn’t ending anytime soon. Every day, the digital landscape evolves, thanks to innovations and technological advancements. Despite this growth, it suffers from a few roadblocks, cybercrime being a…
Sydney Tools Data Leak Exposes Millions of Customer and Employee Records
A major data leak from Sydney Tools, an Australian retailer specializing in power tools, hand tools, and industrial equipment, has potentially exposed the personal information of millions of customers and employees. The breach, discovered by cybersecurity researchers at Cybernews,…
Lucid Faces Increasing Risks from Phishing-as-a-Service
Phishing-as-a-service (PaaS) platforms like Lucid have emerged as significant cyber threats because they are highly sophisticated, have been used in large-scale phishing campaigns in 88 countries, and have been compromised by 169 entities. As part of this platform, sophisticated…
Malicious Actors Employ Atlantis AIO to Target 140+ Platforms
A new cybercrime platform dubbed ‘Atlantis AIO’ provides automatic credential stuffing against 140 internet platforms, including email, e-commerce, banking, and VPNs. Atlantis AIO includes pre-configured modules for performing brute force assaults, bypassing CAPTCHAs, automating account recovery operations, and monetising…
Hackers Target ‘Counter Strike-2’ Players Via Fake Steam Login Pop-ups
Browser-in-the-browser attacks are simple yet sophisticated phishing scams. Hackers emulate trusted services via fake pop-up windows that look like the actual (real) login pages. While there have been a lot of reports describing browser-in-the-browser tactics, it is very difficult to…
Experts Warn Trump Officials Using Signal for War Plans Risk Massive Leaks
Reports that senior Trump administration officials discussed classified military operations using the encrypted texting app Signal have raised serious security concerns. Although Signal provides encryption, lawmakers and cybersecurity specialists have warned that it is still susceptible to hacking and…
Sanctioned Russian Crypto Exchange Garantex Allegedly Rebrands as Grinex
International efforts to dismantle illicit financial networks are facing new challenges, as the recently sanctioned Russian cryptocurrency exchange Garantex appears to have rebranded and resumed operations under a new name—Grinex. Reports from blockchain analytics firm Global Ledger suggest that…
Cyber Threats Surge Across Africa’s Financial Sector, Urging Stronger Cybersecurity Defenses
In 2024, the financial landscape in Africa has been rocked by a series of high-impact cyberattacks, underscoring the urgent need for enhanced digital defenses across the Banking, Financial Services, and Insurance (BFSI) sector. From Uganda to Zimbabwe and South…
Cyberattack Exposes Confidential Defence Data, Raising Security Concerns
A massive collection of classified defence documents has reportedly been stolen by hackers and put up for sale. The stolen information includes blueprints for a weapon, details about an upcoming Air Force facility, procurement strategies, and India’s defence partnerships…
HaveIBeenPwned Founder Compromised in Phishing Incident
The cybersecurity expert Troy Hunt, who founded the data breach notification platform Have I Been Pwned, recently revealed that he had been the victim of a phishing attack that was intended to compromise his subscriber list for the attacker…
Corporate Espionage Group ‘RedCurl’ Expands Tactics with Hyper-V Ransomware
RedCurl, a cyber threat group active since 2018 and known for stealthy corporate espionage, has now shifted its approach by deploying ransomware targeting Hyper-V virtual machines. Initially identified by Group-IB, RedCurl primarily targeted corporate organizations globally, later expanding its…
Developers Face a Challenge with Fake Hiring That Steals Private Data
Cyble threat intelligence researchers discovered a GitHub repository posing as a hiring coding challenge, tricking developers into downloading a backdoor that steals private data. The campaign employs a variety of novel approaches, including leveraging a social media profile for…
VanHelsing Ransomware Strikes Windows ARM and ESXi Platforms
As part of an ongoing analysis of ransomware-as-a-service operations, a new operation known as VanHelsing has been identified. This operation demonstrates a sophisticated multi-platform capability, posing a significant cybersecurity threat. This new strain of ransomware is designed to be…
Connor Moucka Extradited to U.S. for Snowflake Data Breaches Targeting 165 Companies
Connor Moucka, a Canadian citizen accused of orchestrating large-scale data breaches affecting 165 companies using Snowflake’s cloud storage services, has agreed to be extradited to the United States to face multiple federal charges. The breaches, which targeted high-profile companies…
Malware-Laden Game Removed from Steam as Security Concerns Grow
Steam, a leading digital distribution platform for PC games, recently removed Sniper: Phantom’s Resolution after users discovered it contained malware designed to steal sensitive data. The installer, disguised as a legitimate Windows process, executed evasive techniques, including launching and…
Google Deletes User Data by Mistake – Who’s Affected and What to Do
Google has recently confirmed that a technical problem caused the loss of user data from Google Maps Timeline, leaving some users unable to recover their saved location history. The issue has frustrated many, especially those who relied on Timeline…
North Korea Establishes Research Center 227 to Strengthen Cyber Warfare Capabilities
North Korea has reportedly launched a new cyber research unit, Research Center 227, as part of its efforts to enhance hacking capabilities and intelligence operations. According to Daily NK, this center is expected to function continuously, providing real-time support…
AI and Privacy – Issues and Challenges
Artificial intelligence is changing cybersecurity and digital privacy. It promises better security but also raises concerns about ethical boundaries, data exploitation, and spying. From facial recognition software to predictive crime prevention, customers are left wondering where to draw the…
Gmail Upgrade Announced by Google with Three Billion Users Affected
The Google team has officially announced the launch of a major update to Gmail, which will enhance functionality, improve the user experience, and strengthen security. It is anticipated that this update to one of the world’s most commonly used…
Frankenstein Scam: Here’s How to Safeguard Yourself Against Synthetic Identity Fraud
Identity theft is not always as straightforward as acquiring one person’s information; stolen identities can be put together from several sources. This rising crime, known as synthetic identity fraud or “Frankenstein fraud,” involves combining someone’s Social Security number with…
Ransomware Found in VSCode Extensions Raises Concerns Over Microsoft’s Security Review
Cybersecurity experts have discovered ransomware hidden within two Visual Studio Code (VSCode) Marketplace extensions, raising concerns about Microsoft’s ability to detect malicious software in its platform. The compromised extensions, named “ahban.shiba” and “ahban.cychelloworld,” were downloaded by users before security…
Attackers Exploit Click Tolerance to Deliver Malware to Users
The Multi-Factor Authentication (MFA) system has been a crucial component of modern cybersecurity for several years now. It is intended to enhance security by requiring additional forms of verification in addition to traditional passwords. MFA strengthens access control by…
WhatsApp Fixes Security Flaw Exploited by Spyware
WhatsApp recently fixed a major security loophole that was being used to install spyware on users’ devices. The issue, known as a zero-click, zero-day vulnerability, allowed hackers to access phones without the user needing to click on anything. Security…
Ascom Confirms Cyberattack as HellCat Hackers Exploit Jira Servers
Swiss telecommunications company Ascom has disclosed a cyberattack on its IT infrastructure, confirming that the hacker group HellCat exploited compromised credentials to target Jira servers worldwide. In an official statement, Ascom revealed that its technical ticketing system was breached…
Oracle Denies Claim of Server Breach
Following a threat actor’s claim to be selling 6 million data records allegedly stolen from Oracle Cloud’s federated SSO login servers, Oracle denies that it was compromised. “There has been no breach of Oracle Cloud. The published credentials are…