Category: CySecurity News – Latest Information Security and Hacking Incidents

New Phishing Scam Targets Amazon Prime Subscribers

  < p style=”text-align: justify;”> A new cyber attack is putting Amazon Prime subscribers at risk. Hackers are sending malicious emails warning users that their Prime membership is about to expire. These emails contain attachments with dangerous links that redirect…

Cyberattackers Exploit GhostGPT for Low-Cost Malware Development

  The landscape of cybersecurity has been greatly transformed by artificial intelligence, which has provided both transformative opportunities as well as emerging challenges. Moreover, AI-powered security tools have made it possible for organizations to detect and respond to threats much…

Cybercriminals Exploit PDFs in Novel Mishing Campaign

  In a recently uncovered phishing campaign, threat actors are employing malicious PDF files to target mobile device users in potentially more than fifty nations. Dubbed as the “PDF Mishing Attack,” the effort exposes new vulnerabilities in mobile platforms by…

Generative AI in Cybersecurity: A Double-Edged Sword

Generative AI (GenAI) is transforming the cybersecurity landscape, with 52% of CISOs prioritizing innovation using emerging technologies. However, a significant disconnect exists, as only 33% of board members view these technologies as a top priority. This gap underscores the challenge…

The Evolving Role of Multi-Factor Authentication in Cybersecurity

  < p style=”text-align: justify;”>In recent years, the cybersecurity landscape has faced an unprecedented wave of threats. State-sponsored cybercriminals and less experienced attackers armed with sophisticated tools from the dark web are relentlessly targeting weak links in global cybersecurity systems.…

Hackers Exploit WordPress Sites to Attack Mac and Windows Users

According to security experts, threat actors are abusing out-of-date versions of WordPress and plug-ins to modify thousands of sites to trap visitors into downloading and installing malware. In a conversation with cybersecurity news portal TechCrunch, Simon Wijckmans, founder and CEO…

Subaru Starlink Security Flaw Exposes Risks of Connected Cars

  As vehicles become increasingly connected to the internet, cybersecurity threats pose growing risks to drivers. A recent security flaw in Subaru’s Starlink system highlights the potential dangers, allowing hackers to remotely control vehicles and access sensitive data. This incident…

The Evolution of Data Protection: Moving Beyond Passwords

  < p style=”text-align: justify;”>As new threats emerge and defensive strategies evolve, the landscape of data protection is undergoing significant changes. With February 1 marking Change Your Password Day, it’s a timely reminder of the importance of strong password habits…

Three Ways To Prevent Insider Threat Driven Data Leaks

  The United States is poised to undergo a period of highly disruptive transformation. The incoming administration has promised to make significant changes, including forming a new body, the Department of Governmental Efficiency (DOGE), with the aim of substantially reducing…

Hackers Use IT Support Disguise to Infiltrate Systems

  Cybercriminals in Russia are using a scam to trick their victims into allowing them to install ransomware on their computers by pretending to be technical support via Microsoft Teams. Once they have convinced victims they have an IT problem,…

Cybercriminals Use Google Ads and URL Cloaking to Spread Malware

  Cybercriminals are increasingly using Google ads and sophisticated cloaking techniques to push malware onto unsuspecting users. The latest example involves a fake Homebrew website that tricked users into downloading an infostealer designed to steal sensitive data, including login credentials…

Malware Infections Surge from Fake VPN Downloads

  An attacker is reportedly injecting malware into infected devices using popular VPN applications to gain remote control of the devices they are attacking. Google’s Managed Defense team reported this disturbing finding, which sheds light on how malicious actors use…

IPany VPN Compromised in Supply Chain Attack Deploying Custom Malware

  South Korean VPN provider IPany fell victim to a supply chain attack orchestrated by the China-aligned hacking group “PlushDaemon.” The attackers compromised IPany’s VPN installer, embedding a custom malware named ‘SlowStepper’ into the installer file, affecting customers upon installation.…

Critical Flaws in VPN Protocols Leave Millions Vulnerable

  < p style=”text-align: justify;”> Virtual Private Networks (VPNs) are widely trusted for protecting online privacy, bypassing regional restrictions, and securing sensitive data. However, new research has uncovered serious flaws in some VPN protocols, exposing millions of systems to potential…

Best Tor Browser Substitute for Risk-Free Web Surfing

  Anonymous Browsing: Tools and Extensions for Enhanced Privacy < p style=”text-align: justify;”> Anonymous browsing is designed to conceal your IP address and location, making it appear as though you are in a different region. This feature is particularly useful…

A Closer Look at Torrenting and Its Applications

  Downloading through a peer-to-peer (P2P) network referred to as torrenting involves either using torrent files or magnet links to download files. Torrent files are index files that provide the necessary information to locate certain files, segments of files, or…

T-Mobile Enhances Cybersecurity with Yubikey Security Keys

  T-Mobile has taken a significant step in enhancing its cybersecurity by adopting Yubikey security keys for its employees. The company purchased over 200,000 security keys from Yubico, deploying them across all staff, vendors, and authorized retail partners. The rollout,…

VPN Services May Not Be as Secure as They Seem, Recent Research Finds

  VPNs are widely known for their benefits, including preventing location-based overcharging, safeguarding online privacy, and enabling access to geographically restricted content like foreign Netflix libraries. Historically, VPNs have been considered safe, but a new investigation by Top10VPN challenges this…

Why AI-Driven Cybercrime Is the Biggest Threat of 2025

  AI in Cybercrimes: Rising Threats and Challenges Kuala Lumpur: The increasing use of artificial intelligence (AI) in cybercrimes is becoming a grave issue, says Datuk Seri Ramli Mohamed Yoosuf, Director of Malaysia’s Commercial Crime Investigation Department (CCID). Speaking at…

Why MFA Failures Signal Greater Cybersecurity Challenges

  In the current cybersecurity era, multi-factor authentication (MFA) is widely recommended and often mandated across several sectors, making it one of the most popular security measures that are available. As stated by the Cybersecurity and Infrastructure Security Agency (CISA),…

A Looming Threat to Crypto Keys: The Risk of a Quantum Hack

  The Quantum Computing Threat to Cryptocurrency Security < p style=”text-align: justify;”> The immense computational power that quantum computing offers raises significant concerns, particularly around its potential to compromise private keys that secure digital interactions. Among the most pressing fears…

FortiGate Vulnerability Exposes 15,000 Devices to Risks

  Fortinet Firewall Data Breach: 15,000 Devices Compromised by Belsen Group < p style=”text-align: justify;”> On January 14, 2025, it was reported that the configuration data of over 15,000 Fortinet FortiGate firewalls was leaked on the dark web. The hacker…

EU Mandates Tougher Cybersecurity for Banking Sector

  European Banks Strengthen Cybersecurity Amid Strict Regulations European banks are being compelled to enhance their cybersecurity systems to comply with stringent regulations aimed at safeguarding critical infrastructure against cyber threats. The rise of digital tools in the financial sector…

Willow Data Exposure Puts Over 240,000 Customer Records at Risk

  Data Breach at Willow Exposes Over 240,000 Customer Records < p style=”text-align: justify;”> A significant data exposure incident involving the Chicago-based financial technology firm Willow has left the personal details of more than 240,000 customers vulnerable. Willow, which offers…

AVSLabs at Cybersec Asia 2025: Securing the Digital World

AVSLabs is excited to take part in Cybersec Asia 2025, a major cybersecurity event happening on January 22-23, 2025, at the Queen Sirikit National Convention Center (QSNCC) in Bangkok, Thailand. This event brings together top industry leaders and professionals to…

Telegram’s TON Blockchain Embarks on US Growth Mission

  A foundation, closely associated with Telegram, called the Open Network (TON), is pursuing ambitious expansion in the United States. A strategic move like this comes amid the expectation that Donald Trump’s upcoming administration will be able to offer a…

Common AI Promt Mistakes And How To Avoid Them

  If you are running a business in 2025, you’re probably already using generative AI in some capacity. GenAI tools and chatbots, such as ChatGPT and Google Gemini, have become indispensable in a variety of cases, ranging from content production…

PowerSchool Data Breach Exposes Millions

  An American education technology company, PowerSchool, is the latest giant to fall a victim of hacking and data breaches, which probably compromised millions of records of students and teachers in North America. As one of the leading providers of…

Cyber Breaches: Why Organizations Need to Work On the Clock

  Cyberattacks are fast becoming a reality check for businesses worldwide, inflicting massive financial and operational losses. Besides the immediate loss of funds, cyber attacks also have an impact on an organization’s reputation, hence losing out in competition. The most…

Encryption Key Breach Sparks Concerns Over Cybersecurity

  Cybersecurity experts have raised alarms over a surge in cyberattacks targeting freemail users, driven by artificial intelligence (AI). Hackers are leveraging AI to craft sophisticated phishing scams and fraudulent notifications that are harder to detect. These deceptive messages often…

Hackers Exploit Microsoft Teams for Phishing and Malware Attacks

  < p style=”text-align: justify;”>Cybercriminals are increasingly targeting Microsoft Teams, utilizing the platform for sophisticated phishing, vishing, and ransomware campaigns. Exploiting Teams’ widespread use, attackers employ social engineering tactics to deceive users and extract sensitive data. Methods range from fake…

Global Apps Exploited to Harvest Sensitive Location Data

  Rogue actors within the advertising industry are reportedly exploiting major global apps to collect sensitive user location data on a massive scale. This data is then funneled to a location data firm whose subsidiary has previously sold global tracking…

Malicious GitHub PoC Exploit Spreads Infostealer Malware

  A malicious GitHub repository disguises a proof-of-concept (PoC) exploit for CVE-2024-49113, also known as “LDAPNightmare,” delivering infostealer malware that sends sensitive data to an external FTP server. Disguised as a legitimate PoC, the exploit tricks users into executing malware.…

New Version of Banshee Malware Targets macOS Users

  According to the latest study published this week, a new variant of the info-stealing malware known as “Banshee” has been targeting macOS users’ passwords, cryptocurrency wallets, browser credentials, and other data for at least the past four months. Check…

Ensuring Governance and Control Over Shadow AI

  AI has become almost ubiquitous in software development, as a GitHub survey shows, 92 per cent of developers in the United States use artificial intelligence as part of their everyday coding. This has led many individuals to participate in…

GDPR Violation by EU: A Case of Self-Accountability

  There was a groundbreaking decision by the European Union General Court on Wednesday that the EU Commission will be held liable for damages incurred by a German citizen for not adhering to its own data protection legislation.  As a…

How Trust Can Drive Web3 Adoption and Growth

  Web3 technology promises to transform the internet, making it decentralized, secure, and transparent. However, many people hesitate to adopt it due to a lack of trust in the technology. Building this trust requires clear explanations, user-friendly experiences, and a…

ICAO Investigates Potential Data Breach Amid Cybersecurity Concerns

  The International Civil Aviation Organization (ICAO), a United Nations agency tasked with creating global aviation standards, has disclosed an investigation into a potential cybersecurity incident. Established in 1944, ICAO works with 193 member states to develop and implement aviation-related…

AI and Blockchain: Shaping the Future of Personalization and Security

  The integration of Artificial Intelligence (AI) and blockchain technology is revolutionizing digital experiences, especially for developers aiming to enhance user interaction and improve security. By combining these cutting-edge technologies, digital platforms are becoming more personalized while ensuring that user…

Sophisticated Credit Card Skimmer Malware Targets WordPress Checkout Pages

  Recent cybersecurity reports have highlighted a new, highly sophisticated credit card skimmer malware targeting WordPress checkout pages. This stealthy malware embeds malicious JavaScript into database records, leveraging database injection techniques to effectively steal sensitive payment information. Its advanced design…

Play Ransomware: A Rising Global Cybersecurity Threat

  Play ransomware, also known as Balloonfly or PlayCrypt, has become a significant cybersecurity threat since its emergence in June 2022. Responsible for over 300 global attacks, this ransomware employs a double extortion model — stealing sensitive data before encrypting…