Category: CySecurity News – Latest Information Security and Hacking Incidents

The Upcoming Tech Revolution Foreseen by Sundar Pichai

  It was at the 2025 World Government Summit in Dubai on 15th-17th November that Sundar Pichai, CEO of Google and its parent company Alphabet, engaged in a virtual fireside conversation with the Moroccan Minister of State for Artificial Intelligence,…

Android Phishing Apps: A Growing Cybersecurity Threat in 2024

  Cybercriminals are evolving their tactics, shifting from traditional email-based phishing scams to more sophisticated Android phishing apps. According to the 2025 State of Malware report by Malwarebytes, over 22,800 phishing apps were detected on Android devices in 2024 alone.…

zkLend DeFi Platform Hacked, Loses $9.5 Million

  A major hacking incident has hit zkLend, a decentralized lending platform that operates on the Starknet blockchain. The attacker managed to steal about $9.5 million worth of cryptocurrency by exploiting a vulnerability in the system. According to blockchain security…

Google Fixes YouTube Security Flaw That Exposed User Emails

  A critical security vulnerability in YouTube allowed attackers to uncover the email addresses of any account on the platform. Cybersecurity researchers discovered the flaw and reported it to Google, which promptly fixed the issue. While no known attacks exploited…

Addressing the Security Risks Posed by IoT Devices

  There has been a marked change in daily life as a result of the proliferation of IoT devices, and Transforma Insights estimates that 14 billion such devices are connected globally, indicating that this type of technology has profound effects.…

China-backed APT40 Hacking Outfit Implicated for Samoa Cyberattacks

  Samoa’s national cybersecurity office issued an urgent advisory after the Chinese state-sponsored cyber outfit APT40 escalated its attacks on government and critical infrastructure networks across the Pacific.  Samoa’s Computer Emergency Response Team, or SamCERT, has warned that APT40 is…

Data Reveals Identity-Based Attacks Now Dominate Cybercrime

  Cyberattacks are undergoing a significant transformation, shifting away from malware-driven methods toward identity exploitation. According to the CrowdStrike 2024 Global Threat Report, three out of four cyberattacks now leverage valid credentials instead of malicious software. This change is fueled…

National Security Faces Risks from Cybercrime Expansion

  The incidence of cyberattacks globally increased by 125% in 2021 compared to 2020, posing a serious threat to businesses and individuals alike. Phishing continues to be the most prevalent form of cybercrime worldwide and is expected to continue this…

Ransomware Tactics Evolve as Hackers Shift Focus to Data Theft

  Ransomware groups are adapting their strategies to outsmart stronger cybersecurity defenses and increasing law enforcement pressure, according to the Huntress 2025 Cyber Threat Report. The findings reveal that attackers are moving beyond traditional encryption-based ransomware, instead focusing on data…

AI Self-Replication: Scientists Warn of Critical “Red Line”

  Scientists have raised concerns after artificial intelligence (AI) crossed a major threshold — self-replication. A new study from researchers at Fudan University in China reveals that two popular large language models (LLMs) successfully created functional copies of themselves, raising…

Two Russian Hackers Arrested for Large-Scale Ransomware Attacks

  Authorities in the United States have charged two Russian nationals with carrying out widespread cyberattacks using Phobos ransomware. The suspects, Roman Berezhnoy (33) and Egor Nikolaevich Glebov (39), were arrested in Thailand for allegedly orchestrating more than a thousand…

Cybercriminals Intensify Attacks on Password Managers

  Cybercriminals are increasingly setting their sights on password managers as a way to infiltrate critical digital accounts. According to Picus Security’s Red Report 2025, which analyzed over a million malware samples from the past year, a quarter (25%) of…

SMS Toll Scam Tricks Victims Into Activating Phishing Links

  SMS phishing scams targeting tollway users have been spreading across the U.S., with fraudsters impersonating tolling agencies to steal personal information. These scams typically involve sending text messages claiming the recipient has an unpaid toll balance. Victims are then…

Understanding the Importance of 5G Edge Security

  As technology advances, the volume of data being generated daily has reached unprecedented levels. In 2024 alone, people are expected to create over 147 zettabytes of data. This rapid growth presents major challenges for businesses in terms of processing,…

Global Crackdown on Phobos Ransomware, Two Arrested

  A major international police operation has resulted in the arrest of two individuals suspected of carrying out ransomware attacks worldwide. The operation also led to the takedown of dark web platforms associated with a notorious cybercrime group.   Suspects Arrested…

FBI Alerts Users of Surge in Gmail AI Phishing Attacks

  Phishing scams have been around for many years, but they are now more sophisticated than ever due to the introduction of artificial intelligence (AI).  As reported in the Hoxhunt Phishing Trends Report, AI-based phishing attacks have increased dramatically since…

2FA Under Attack as Astaroth Phishing Kit Spreads

  Astaroth is the latest phishing tool discovered by cybercriminals. It has advanced capabilities that allow it to circumvent security measures such as two-factor authentication (2FA) when used against it. In January 2025, Astaroth made its public debut across multiple…

LegionLoader Malware Resurfaces with Evasive Infection Tactics

  Researchers at TEHTRIS Threat Intelligence have uncovered a new wave of LegionLoader, a malware downloader also known as Satacom, CurlyGate, and RobotDropper. This sophisticated threat has been rapidly gaining momentum, with over 2,000 samples identified in recent weeks.  According…

The Rising Problem of Banking Scams in East India

Currently, India is battling with a fake banking applications spoofing genuine institutions to loot credentials and money. The scale of the campaign is massive, impacting around 900 different malware samples linked to more than 1000 different contact numbers used to…

The Future of Data Security Lies in Quantum-Safe Encryption

  Cybersecurity experts and analysts have expressed growing concerns over the potential threat posed by quantum computing to modern cryptographic systems. Unlike conventional computers that rely on electronic circuits, quantum computers leverage the principles of quantum mechanics, which could enable…

DeepSeek-R1 AI Under Fire for Severe Security Risks

  DeepSeek-R1, an AI model developed in China, is facing intense scrutiny following a study by cybersecurity firm Enkrypt AI, which found it to be 11 times more vulnerable to cybercriminal exploitation compared to other AI models. The research highlights…

Hackers Steal Login Details via Fake Microsoft ADFS login pages

A help desk phishing campaign attacked a company’s Microsoft Active Directory Federation Services (ADFS) via fake login pages and stole credentials by escaping multi-factor authentication (MFA) safety. The campaign attacked healthcare, government, and education organizations, targeting around 150 victims, according…

Fake Wedding Invitation Malware Targets Android Users

  Malicious actors are propagating a recently discovered Android malware called Tria by sending phoney wedding invitations to consumers in Brunei and Malaysia.  According to a report published by the Russian cybersecurity firm Kaspersky, the attackers have been using private…

Grubhub Data Breach Exposes Customer and Driver Information

  Food delivery service Grubhub has suffered a security breach that exposed sensitive information belonging to customers, drivers, and merchants. The breach, caused by unauthorized access through a third-party service provider, compromised personal details, hashed passwords, and partial credit card…

Kimsuky Hackers Deploy forceCopy Malware in Spear-Phishing Attacks

  North Korea-linked hacking group Kimsuky has been identified conducting targeted spear-phishing campaigns to distribute an information stealer known as forceCopy, according to the latest findings from the AhnLab Security Intelligence Center (ASEC). The cyberattacks begin with phishing emails that…

Hackers Use Forked Stealer to Breach Russian Businesses

  As of January 2025, there were multiple attacks on Russian organizations across several industries, including finance, retail, information technology, government, transportation, and logistics, all of which have been targeted by BI.ZONE. The threat actors have used NOVA stealer, a…

Dangers of AI Phishing Scam and How to Spot Them

Supercharged AI phishing campaigns are extremely challenging to notice. Attackers use AI phishing scams with better grammar, structure, and spelling, to appear legit and trick the user. In this blog, we learn how to spot AI scams and avoid becoming…

RSA Encryption Breached by Quantum Computing Advancement

  A large proportion of the modern digital world involves everyday transactions taking place on the internet, from simple purchases to the exchange of highly sensitive corporate data that is highly confidential. In this era of rapid technological advancement, quantum…

Quishing On The Rise: Strategies to Avert QR Code Phishing

  QR codes are already ubiquitous: from restaurant menus to public transportation schedules, everyone wants you to scan theirs. This normalisation of scanning random QR codes is being exploited, resulting in a new cybersecurity threat known as Quishing.  What is…

EU Bans AI Systems Deemed ‘Unacceptable Risk’

  As outlined in the European Union’s (EU) Artificial Intelligence Act (AI Act), which was first presented in 2023, the AI Act establishes a common regulatory and legal framework for the development and application of artificial intelligence. In April 2021,…

DeepSeek’s Data Use Raises Regulatory Concerns

  There have been numerous scandals surrounding this artificial intelligence company which had astonished the world by seemingly rivaling the successful chatbot ChatGPT at a fraction of the cost. However, now, regulators and privacy advocates have raised questions about the…

Cybercriminals Entice Insiders with Ransomware Recruitment Ads

  Cybercriminals are adopting a new strategy in their ransomware demands—embedding advertisements to recruit insiders willing to leak company data. Threat intelligence researchers at GroupSense recently shared their findings with Dark Reading, highlighting this emerging tactic. According to their analysis,…

Two-Month Cyber Breach at Mizuno USA Under Investigation

  Unauthorized access to Mizuno USA’s network has resulted in a compromise of sensitive customer information, which has caused Mizuno USA to notify its customers about the breach. In a letter to affected individuals, the sports gear manufacturer shared information…

DeepSeek’s Rise: A Game-Changer in the AI Industry

< p style=”text-align: justify;”>January 27 marked a pivotal day for the artificial intelligence (AI) industry, with two major developments reshaping its future. First, Nvidia, the global leader in AI chips, suffered a historic loss of $589 billion in market value…

How Google Enhances AI Security with Red Teaming

  Google continues to strengthen its cybersecurity framework, particularly in safeguarding AI systems from threats such as prompt injection attacks on Gemini. By leveraging automated red team hacking bots, the company is proactively identifying and mitigating vulnerabilities. Google employs an…

Smiths Group Reports Cybersecurity Incident: Systems Breached

  < p style=”text-align: justify;”>Smiths Group, a London-listed engineering firm operating in energy, security, aerospace, and defence, has reported a cybersecurity incident involving unauthorised access to its systems. The company has taken immediate steps to mitigate potential disruptions and contain…

Cryptojacking: The Silent Cybersecurity Threat Surging in 2023

< p style=”text-align: justify;”>Cryptojacking, the unauthorized exploitation of an organization’s computing resources to mine cryptocurrency, has emerged as a significant yet often overlooked cybersecurity threat. Unlike ransomware, which overtly disrupts operations, cryptojacking operates covertly, leading to substantial financial and operational…

New Phishing Scam Targets Amazon Prime Subscribers

  < p style=”text-align: justify;”> A new cyber attack is putting Amazon Prime subscribers at risk. Hackers are sending malicious emails warning users that their Prime membership is about to expire. These emails contain attachments with dangerous links that redirect…