A significant data breach impacting as many as 800,000 users from two leading online betting platforms has heightened fears over sophisticated phishing risks and the growing role of artificial intelligence in exploiting compromised personal data. The breach, confirmed by…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Patient Care Technology Disruptions Linked With the CrowdStrike Outage, Study Finds
A little more than a year ago, nearly 8.5 million Windows-based IT systems went down due to a simple error made during a routine software update. Computers were unable to reboot for several hours due to a bug from…
Security Alert as Malware Campaign Hits Widely Used E-commerce CMS
It has been discovered that a malicious program has been launched, posing a serious threat to thousands of online retailers worldwide, as it exploits vulnerabilities in widely used content management systems. According to security researchers, the attack primarily targets platforms…
Chinese Hacker Group Salt Typhoon Breaches U.S. National Guard Network for Nine Months
An elite Chinese cyber-espionage group known as Salt Typhoon infiltrated a U.S. state’s Army National Guard network for nearly nine months, according to a classified Pentagon report revealed in a June Department of Homeland Security (DHS) memo. The memo,…
Why Policy-Driven Cryptography Matters in the AI Era
In this modern-day digital world, companies are under constant pressure to keep their networks secure. Traditionally, encryption systems were deeply built into applications and devices, making them hard to change or update. When a flaw was found, either in…
Romanian Arrested in Diskstation Ransomware Operation Targeting Synology NAS Devices
A 44-year-old Romanian national has been arrested as part of a coordinated international law enforcement effort to take down the cybercriminal group behind the Diskstation ransomware campaign. This group is known for targeting Synology Network-Attached Storage (NAS) devices, which…
LameHug Malware Crafts Real-Time Windows Data-Theft Commands Using AI LLM
LameHug, a novel malware family, generates commands for execution on compromised Windows systems using a large language model (LLM). Russia-backed threat group APT28 (also known as Sednit, Sofacy, Pawn Storm, Fancy Bear, STRONTIUM, Tsar Team, and Forest Blizzard) was…
UK Connects Stealth Malware Targeting Microsoft 365 to Russian GRU
A series of sophisticated cyber espionage activities has been officially attributed to Russia’s military intelligence agency, the GRU, in an important development that aims to strengthen the cybersecurity of both the United Kingdom and its allied countries. On 18…
Sensitive Records of Over 1 Million People Exposed by U.S. Adoption Organization
A large scale data exposure incident has come to light involving the Gladney Center for Adoption, a U.S.-based non-profit that helps connect children with adoptive families. According to a cybersecurity researcher, an unsecured database containing over a million sensitive…
How Tech Democratization Is Helping SMBs Tackle 2025’s Toughest Challenges
Small and medium-sized businesses (SMBs) are entering 2025 grappling with familiar hurdles: tight budgets, economic uncertainty, talent shortages, and limited cybersecurity resources. A survey of 300 decision-makers highlights how these challenges are pushing SMBs to seek smarter, more affordable…
Here’s How Everyday Tech Is Being Weaponized to Deploy Trojan
The technology that facilitates your daily life, from the smartphone in your hand to the car in your garage, may simultaneously be detrimental to you. Once the stuff of spy thrillers, consumer electronics can today be used as tools…
Zimperium Warns of Rising Mobile Threats Over Public WiFi During Summer Travel
Public WiFi safety continues to be a contentious topic among cybersecurity professionals, often drawing sarcastic backlash on social media when warnings are issued. However, cybersecurity firm Zimperium has recently cautioned travelers about legitimate risks associated with free WiFi networks,…
Core Cryptographic Technique Compromised Putting Blockchain Security at Risk
The concept of randomness is often regarded as a cornerstone of fairness, security, and predictability in both physical and digital environments. Randomness must be used to ensure impartiality, protect sensitive information, and ensure integrity, whether it is determining which…
Legal Battle Over Meta’s AI Training Likely to Reach Europe’s Top Court
The ongoing debate around Meta’s use of European data to train its artificial intelligence (AI) systems is far from over. While Meta has started training its large language models (LLMs) using public content from Facebook and Instagram, privacy regulators…
Armenian Man Extradited to US After Targeting Oregon Tech Firm
The Justice Department said Wednesday last week that an Armenian national is in federal custody on charges related to their alleged involvement in a wave of Ryuk ransomware attacks in 2019 and 2020. On June 18, Karen Serobovich Vardanyan,…
Dell Confirms Breach of Demo Platform by WorldLeaks-Linked Hackers, No Sensitive Data Compromised
Dell Technologies has confirmed that one of its internal platforms used for showcasing products was recently accessed by a hacker. The company assured that no sensitive or customer-related data was exposed during the incident. In an official statement to…
Belk Hit by Ransomware Attack as DragonForce Claims Responsibility for Data Breach
The department store chain Belk recently became the target of a ransomware attack, with the hacking group DragonForce taking responsibility for the breach. The cybercriminals claim to have stolen 156 GB of sensitive data from the company’s systems in…
Scattered Spider Broadens Attack Techniques in Latest Cyber Incidents
Known by aliases such as UNC3944, Scatter Swine, and Muddled Libra, Scatter Spider is an extremely persistent and adaptable cybercriminal group focused on financial gain. In the current cyber threat environment, the Scatter Spider group stands out as one…
Sensitive AI Key Leak : A Wave of Security Concerns in U.S. Government Circles
A concerning security mistake involving a U.S. government employee has raised alarms over how powerful artificial intelligence tools are being handled. A developer working for the federal Department of Government Efficiency (DOGE) reportedly made a critical error by accidentally…
Trustwave Reveals Dark Web Travel Agencies’ Secrets
Within the underground economy, dark web travel agencies have become one of the more sophisticated and profitable businesses. According to the Wall Street Journal’s report on Trustwave’s findings, these shady companies use credit card fraud, compromised loyalty program accounts,…