A ransomware group named J GROUP claims to have breached Dimensional Control Systems (DCS), stealing 11GB of sensitive data, including proprietary software architecture, client metadata, and internal security procedures. DCS, a Michigan-based provider of dimensional engineering software, serves major…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Thousands of Government IDs at Risk Following Breach Involving Discord’s Verification Partner
Currently, one of the threats associated with digital identity verification can often be found in the form of cyberattacks targeting third-party service providers linked to Discord, with the result that sensitive personal data belonging to nearly 70,000 users may have…
Zero-click Exploit AI Flaws to Hack Systems
What if machines, not humans, become the centre of cyber-warfare? Imagine if your device could be hijacked without you opening any link, downloading a file, or knowing the hack happened? This is a real threat called zero-click attacks, a covert…
Rise of Evil LLMs: How AI-Driven Cybercrime Is Lowering Barriers for Global Hackers
As artificial intelligence continues to redefine modern life, cybercriminals are rapidly exploiting its weaknesses to create a new era of AI-powered cybercrime. The rise of “evil LLMs,” prompt injection attacks, and AI-generated malware has made hacking easier, cheaper, and…
Payroll Hackers Target U.S. Universities, Microsoft Warns
Microsoft researchers have surfaced a new phishing campaign where cybercriminals are stealing university employees’ salaries by redirecting their payroll deposits to accounts under their control. The group behind the attacks has been named “Storm-2657” by Microsoft. The hackers have…
How Reporting Spam Calls and Texts Helps Stop Scammers for Everyone
Almost everyone has experienced an unexpected call or text from an unknown number. While some turn out to be harmless misdials, many are actually spam or phishing attempts aimed at stealing personal or financial information. In some cases,…
Google Launches Gemini AI Across Home and Nest Devices
Google has unveiled its new Gemini-powered smart home lineup and AI strategy, positioning its AI assistant Gemini at the core of refreshed Google Home and Nest devices. This reimagined approach follows Amazon’s recent Echo launch, highlighting an intensifying competition…
Unauthorized Use of AI Tools by Employees Exposes Sensitive Corporate Data
Artificial intelligence has rapidly revolutionised the modern workplace, creating both unprecedented opportunities and presenting complex challenges at the same time. Despite the fact that AI was initially conceived to improve productivity, it has quickly evolved into a transformational force…
Oura Users Express Concern Over Pentagon Partnership Amid Privacy Debates
Oura, the Finnish company known for its smart health-tracking rings, has recently drawn public attention after announcing a new manufacturing facility in Texas aimed at meeting the needs of the U.S. Department of Defense (DoD). The partnership, which has…
Agentic AI Demands Stronger Digital Trust Systems
As agentic AI becomes more common across industries, companies face a new cybersecurity challenge: how to verify and secure systems that operate independently, make decisions on their own, and appear or disappear without human involvement. Consider a financial firm…
Red Hat Hit by Data Breach, Hackers Exploit GitLab Instance
An extortion gang by the name of Crimson Collective claimed to have stolen approximately 570GB of compressed data from internal development repositories belonging to Red Hat. Red Hat confirmed the breach impacted one of its GitLab instances. The stolen data…
Telstra Denies Scattered Spider Data Breach Claims Amid Ransom Threats
Telstra, one of Australia’s leading telecommunications companies, has denied claims made by the hacker group Scattered Spider that it suffered a massive data breach compromising nearly 19 million personal records. The company issued a statement clarifying that its internal…
Illumio Report Warns: Lateral Movement, Not Breach Entry, Causes the Real Cybersecurity Damage
In most cyberattacks, the real challenge doesn’t begin at the point of entry—it starts afterward. Once cybercriminals infiltrate a system, they move laterally across networks, testing access points, escalating privileges, and expanding control until a small breach becomes a…
OpenAI’s Sora App Raises Facial Data Privacy Concerns
OpenAI’s video-generating app, Sora, has raised significant questions regarding the safety and privacy of user’s biometric data, particularly with its “Cameo” feature that creates realistic AI videos, or “deepfakes,” using a person’s face and voice. To power this functionality,…
AI Tools Make Phishing Attacks Harder to Detect, Survey Warns
Despite the ever-evolving landscape of cyber threats, the phishing method remains the leading avenue for data breaches in the years to come. However, in 2025, the phishing method has undergone a dangerous transformation. What used to be a crude…
China Sentences 11 Individuals to Death Over Massive Cross-Border Scam Network
A Chinese court has handed down death sentences to 11 individuals involved in a vast, family-run criminal network that operated online scam and gambling schemes across the China-Myanmar border. The Wenzhou Intermediate People’s Court in Zhejiang Province announced the…
Microsoft Stops Phishing Scam Which Used Gen-AI Codes to Fool Victims
AI: Boon or Curse? AI code is in use across sectors for variety of tasks, particularly cybersecurity, and both threat actors and security teams have turned to LLMs for supporting their work. Security experts use AI to track and address…
Andesite AI Puts Human Analysts at the Center of Cybersecurity Innovation
Andesite AI Inc., a two-year-old cybersecurity startup, is reimagining how human expertise and artificial intelligence can work together to strengthen digital defense. Founded by former CIA officers Brian Carbaugh and William MacMillan, the company aims to counter a fragmented…
Why Deleting Cookies Doesn’t Protect Your Privacy
Most internet users know that cookies are used to monitor their browsing activity, but few realize that deleting them does not necessarily protect their privacy. A newer and more advanced method known as browser fingerprinting is now being used to…
Ransomware Attack on Motility Software Solutions Exposes Data of 766,000 Customers
Motility Software Solutions, a leading U.S.-based provider of dealer management software (DMS), has confirmed a ransomware attack that compromised the personal data of approximately 766,000 customers. The company, previously known as Systems 2000 (Sys2K), serves over 7,000 dealerships across…