Microsoft has detailed a structured, three-phase roadmap to gradually retire New Technology LAN Manager (NTLM), reinforcing its broader push toward more secure, Kerberos-based authentication within Windows environments. The announcement follows Microsoft’s earlier decision to deprecate NTLM, a legacy authentication…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Why Emails Pretending to Be from NGOs and Banks Are Becoming More Dangerous
A new cyber threat campaign has been identified in South Korea in which attackers pretended to represent human rights groups and financial institutions to trick people into opening harmful files. The findings were published on January 19 by United Press…
Experts Find Malicious ClawHub Skills Stealing Data from OpenClaw
Koi Security’s security audit of 2,857 skills on ClawHub found 341 malicious skills via multiple campaigns. Users are exposed to new supply chain threats. ClawHub is a marketplace made to help OpenClaw users in finding and installing third-party skills. It…
CrossCurve Bridge Hit by $3 Million Exploit after Smart Contract Flaw
CrossCurve, a cross-chain bridge formerly known as EYWA, has suffered a major cyberattack after hackers exploited a vulnerability in its smart contract infrastructure, draining about $3 million across multiple blockchain networks. The CrossCurve team confirmed the incident on Sunday, saying…
Promptware Threats Turn LLM Attacks Into Multi-Stage Malware Campaigns
Large language models are now embedded in everyday workplace tasks, powering automated support tools and autonomous assistants that manage calendars, write code, and handle financial actions. As these systems expand in capability and adoption, they also introduce new security…
Rhysida Ransomware Hits California Tribal Clinics, Leaks SSNs and Medical Data
A recent ransomware attack has disrupted healthcare services and exposed sensitive patient data at the MACT Health Board, which operates clinics serving American Indian communities in California’s Sierra Foothills. The cybercriminal group Rhysida has claimed responsibility for the November…
Security Analysts Warn of Shadow Directory Techniques Targeting WordPress
Several theme-level vulnerabilities coupled with evolving abuse tactics are demonstrating once again how vulnerable WordPress becomes when multiple vulnerabilities are aligned. An unauthenticated file access and deletion vulnerability has been disclosed in the WPLMS theme-tracked as CVE-2024-10470 and assigned…
Italy Steps Up Cyber Defenses as Milano–Cortina Winter Olympics Approach
Inside a government building in Rome, located opposite the ancient Aurelian Walls, dozens of cybersecurity professionals have been carrying out continuous monitoring operations for nearly a year. Their work focuses on tracking suspicious discussions and coordination activity taking place…
Iran-Linked Hackers Target Human Rights Groups in Redkitten Malware Campaign
A Farsi-speaking threat actor believed to be aligned with Iranian state interests is suspected of carrying out a new cyber campaign targeting non-governmental organizations and individuals documenting recent human rights abuses in Iran, according to a report by HarfangLab. The…
Open-Source AI Models Pose Growing Security Risks, Researchers Warn
Hackers and other criminals can easily hijack computers running open-source large language models and use them for illicit activity, bypassing the safeguards built into major artificial intelligence platforms, researchers said on Thursday. The findings are based on a 293-day study…
WhatsApp Launches High-Security Mode for Ultimate User Protection
WhatsApp has launched a new high-security mode called “Strict Account Settings,” providing users with enhanced defenses against sophisticated cyber threats. This feature, introduced on January 27, 2026, allows one-click activation and builds on the platform’s existing end-to-end encryption. It…
Apple’s New Feature Will Help Users Restrict Location Data
Apple has introduced a new privacy feature that allows users to restrict the accuracy of location data shared with cellular networks on a few iPad models and iPhone. About the feature The “Limit Precise Location” feature will start after updating…
ShinyHunters Claims Match Group Data Breach Exposing 10 Million Records
A new data theft has surfaced linked to ShinyHunters, which now claims it stole more than 10 million user records from Match Group, the U.S. company behind several major swipe-based dating platforms. The group has positioned the incident as…
Open VSX Supply Chain Breach Delivers GlassWorm Malware Through Trusted Developer Extensions
Cybersecurity experts have uncovered a supply chain compromise targeting the Open VSX Registry, where unknown attackers abused a legitimate developer’s account to distribute malicious updates to unsuspecting users. According to findings from Socket, the attackers infiltrated the publishing environment…
Aisuru Botnet Drives DDoS Attack Volumes to Historic Highs
Currently, the modern internet is characterized by near-constant contention, in which defensive controls are being continuously tested against increasingly sophisticated adversaries. However, there are some instances where even experienced security teams are forced to rethink long-held assumptions about scale and…
Cloud Storage Scam Uses Fake Renewal Notices to Trick Users
Cybercriminals are running a large-scale email scam that falsely claims cloud storage subscriptions have failed. For several months, people across different countries have been receiving repeated messages warning that their photos, files, and entire accounts will soon be restricted or…
Former Google Engineer Convicted in U.S. for Stealing AI Trade Secrets to Aid China-Based Startup
A former Google software engineer has been found guilty in the United States for unlawfully taking thousands of confidential Google documents to support a technology venture in China, according to an announcement made by the Department of Justice (DoJ)…
Google Owned Mandiant Finds Vishing Attacks Against SaaS Platforms
Mandiant recently said that it found an increase in threat activity that deploys tradecraft for extortion attacks carried out by a financially gained group ShinyHunters. These attacks use advanced voice phishing (vishing) and fake credential harvesting sites imitating targeted organizations…
New Reprompt URL Attack Exposed and Patched in Microsoft Copilot
Security researchers at Varonis have uncovered a new prompt-injection technique targeting Microsoft Copilot, highlighting how a single click could be enough to compromise sensitive user data. The attack method, named Reprompt, abuses the way Copilot and similar generative AI…
eScan Antivirus Faces Scrutiny After Compromised Update Distribution
MicroWorld Technologies has acknowledged that there was a breach of its update distribution infrastructure due to a compromise of a server that is used to deliver eScan antivirus updates to end users, which was then used to send an unauthorized…