The Ministry of Electronics and Information Technology (MeitY) of India has found that the latest restrictions on Grok’s image generation tool by X are not adequate to prevent obscene content. The platform, owned by Elon Musk, restricted the controversial…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Looking Beyond the Hype Around AI Built Browser Projects
Cursor, the company that provides an artificial intelligence-integrated development environment, recently gained attention from the industry after suggesting that it had developed a fully functional browser using its own artificial intelligence agents, which is known as the Cursor AI-based development…
Raspberry Pi Project Turns Wi-Fi Signals Into Visual Light Displays
Wireless communication surrounds people at all times, even though it cannot be seen. Signals from Wi-Fi routers, Bluetooth devices, and mobile networks constantly travel through homes and cities unless blocked by heavy shielding. A France-based digital artist has developed…
1Password Launches Pop-Up Alerts to Block Phishing Scams
1Password has introduced a new phishing protection feature that displays pop-up warnings when users visit suspicious websites, aiming to reduce the risk of credential theft and account compromise. This enhancement builds on the password manager’s existing safeguards and responds…
Multi-Stage Phishing Campaign Deploys Amnesia RAT and Ransomware Using Cloud Services
One recently uncovered cyberattack is targeting individuals across Russia through a carefully staged deception campaign. Rather than exploiting software vulnerabilities, the operation relies on manipulating user behavior, according to analysis by Cara Lin of Fortinet FortiGuard Labs. The attack…
Microsoft BitLocker Encryption Raises Privacy Questions After FBI Key Disclosure Case
Microsoft’s BitLocker encryption, long viewed as a safeguard for Windows users’ data, is under renewed scrutiny after reports revealed the company provided law enforcement with encryption keys in a criminal investigation. The case, detailed in a government filing [PDF],…
Sandworm-Associated DynoWiper Malware Targets Polish Power Infrastructure
A cyber intrusion targeting the nation’s energy infrastructure occurred in late 2025, which security experts have described as one of the largest cyberattacks the nation has faced in many years. It underscores the growing vulnerability of critical national systems…
Cisco Patches ISE XML Flaw with Public Exploit Code
Cisco has recently addressed a significant security vulnerability in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC), tracked as CVE-2026-20029. This medium-severity issue, scored at 4.9 out of 10, stems from improper XML parsing in the…
Attackers Hijack Microsoft Email Accounts to Launch Phishing Campaign Against Energy Firms
Cybercriminals have compromised Microsoft email accounts belonging to organizations in the energy sector and used those trusted inboxes to distribute large volumes of phishing emails. In at least one confirmed incident, more than 600 malicious messages were sent from…
Dark Web Voice-Phishing Kits Supercharge Social Engineering and Account Takeovers
Cybercriminals are finding it easier than ever to run convincing social engineering schemes and identity theft operations, driven by the availability of customized voice-phishing (vishing) kits sold on dark web forums and private messaging channels. According to a recent…
Online Misinformation and AI-Driven Fake Content Raise Concerns for Election Integrity
With elections drawing near, unease is spreading about how digital falsehoods might influence voter behavior. False narratives on social platforms may skew perception, according to officials and scholars alike. As artificial intelligence advances, deceptive content grows more convincing, slipping…
OpenAI Faces Court Order to Disclose 20 Million Anonymized ChatGPT Chats
OpenAI, a company that is pushing to redefine how courts balance innovation, privacy, and the enforcement of copyright in the current legal battle over artificial intelligence and intellectual property, has brought a lawsuit challenging a sweeping discovery order. It was…
How Generative AI Is Accelerating Password Attacks on Active Directory
Active Directory remains the backbone of identity management for most organizations, which is why it continues to be a prime target for cyberattacks. What has shifted is not the focus on Active Directory itself, but the speed and efficiency…
Suspicious Polymarket Bets Spark Insider Trading Fears After Maduro’s Capture
A sudden, massive bet surfaced just ahead of a major political development involving Venezuela’s leader. Days prior to Donald Trump revealing that Nicolás Maduro had been seized by U.S. authorities, an individual on Polymarket placed a highly profitable position.…
Lego’s Move Into Smart Toys Faces Scrutiny From Play Professionals
In the wake of its unveiling of the company’s smart brick technology, LEGO is seeking to reassure critics who argue that the initiative could undermine the company’s commitment to hands-on, imaginative play as well as its longstanding history of…
Chrome WebView Flaw Lets Hackers Bypass Security, Update Urgently Advised
Google has rolled out an urgent security fix for the Chrome browser to address a high severity flaw in the browser’s WebView tag. According to the tech firm, the flaw allows hackers to evade major browser security features to…
Android Malware Uses Artificial Intelligence to Secretly Generate Ad Clicks
Security researchers have identified a new category of Android malware that uses artificial intelligence to carry out advertising fraud without the user’s knowledge. The malicious software belongs to a recently observed group of click-fraud trojans that rely on machine…
WhatsApp Bug Leads to Exposure of User Metadata
The Meta organization has begun to address a number of vulnerabilities in WhatsApp that expose sensitive user information. These vulnerabilities indicate that, even when platforms are encrypted, they can inadvertently reveal critical device details. The vulnerabilities are caused by…
Fortinet Firewalls Targeted as Attackers Bypass Patch for Critical FortiGate Flaw
Critical vulnerabilities in FortiGate systems continue to be exploited, even after fixes were deployed, users now confirm. Though updates arrived aiming to correct the problem labeled CVE-2025-59718, they appear incomplete. Authentication safeguards can still be sidestepped by threat actors…
Kimwolf Botnet Hijacks 1.8M Android Devices for DDoS Chaos
The Kimwolf botnet is one of the largest recently found Android-based threats, contaminating over 1.8 million devices mostly Android TV boxes and IoT devices globally. Named after its reliance on the wolfSSL library, this malware appeared in late October 2025 when…