There has been a significant concern raised regarding digital privacy and the practices of state surveillance as a result of an investigation conducted by mobile security firm Lookout. Police departments across China are using a sophisticated surveillance system, raising…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Hackers Exploit End-of-Life SonicWall Devices Using Overstep Malware and Possible Zero-Day
Cybersecurity experts from Google’s Threat Intelligence Group (GTIG) have uncovered a series of attacks targeting outdated SonicWall Secure Mobile Access (SMA) devices, which are widely used to manage secure remote access in enterprise environments. These appliances, although no longer…
Ukrainian Hackers Claim Major Cyberattack on Russian Drone Manufacturer
In an unsettling development in the ongoing cyber conflict linked to the Russia-Ukraine war, Ukrainian-aligned hacking groups have claimed responsibility for a large-scale cyberattack targeting a major Russian drone manufacturing company. The targeted firm, identified as Gaskar Group, is believed…
Hackers Use DNS Records to Hide Malware and AI Prompt Injections
Cybercriminals are increasingly leveraging an unexpected and largely unmonitored part of the internet’s infrastructure—the Domain Name System (DNS)—to hide malicious code and exploit security weaknesses. Security researchers at DomainTools have uncovered a campaign in which attackers embedded malware directly…
Healthcare Firms Face Major Threats from Risk Management and Legacy Tech, Report Finds
With healthcare facilities scrambling to pinpoint and address their top cyber threats, Fortified’s report provides some guidance on where to begin. The report identifies five major security gaps in healthcare organisations: inadequate asset inventories, a lack of unified risk…
UK Tax Fraud Scheme Uncovered Following Arrests in Romania
Despite being organized and waged on a global scale, phishing-based tax fraud schemes that target the United Kingdom have emerged in recent years as a significant development in the fight against transnational cyber-enabled financial crime. An operation coordinated by…
Online Criminals Steal $500K Crypto Via Malicious AI Browser Extension
A Russian blockchain engineer lost over $500,000 worth of cryptocurrencies in a sophisticated cyberattack, highlighting the persisting and increasing threats posed by hostile open-source packages. Even seasoned users can be duped into installing malicious software by attackers using public…
Gigabyte Firmware Vulnerability Enables Stealth UEFI Malware Infection
According to security researchers, a critical set of vulnerabilities has been identified in UEFI firmware for a number of motherboards manufactured by Gigabyte, causing serious concerns about device integrity and long-term system security, as well as serious concerns regarding device…
Interlock RAT Evolves in New KongTuke Web-Inject Attacks Targeting U.S. Industries
A recently enhanced version of the Interlock remote access Trojan (RAT) is being deployed in an ongoing web-inject campaign linked to the ransomware group behind it. Known for its double-extortion tactics, Interlock has now shifted its technical approach with…
‘FileFix’ Malware Trick Amplifies Interlock Ransomware Threat With Evolved Attack Tactic
Cybersecurity researchers have identified a dangerous new twist to the notorious ClickFix malware tactic. The evolved variant—called FileFix—is now being weaponized in active ransomware campaigns, further advancing the threat landscape. ClickFix typically lures users by showing them a bogus…
Ransomware Attacks Surge in 2025, With Smaller Businesses and Manufacturers Most Affected
Ransomware threats are rising fast in 2025, with the first half of the year already showing a sharp increase in attacks. New research shows that U.S.-based companies, small and medium-sized businesses, and firms in the manufacturing sector are currently…
Linux Distribution Designed for Seamless Anonymous Browsing
Despite the fact that operating systems like Windows and macOS continue to dominate the global market, Linux has gained a steady following among users who value privacy and security as well as cybersecurity professionals, thanks to its foundational principles: transparency,…
Major Breach at Medical Billing Giant Results in The Data Leak of 5.4 Million Users
Episource, the medical billing behemoth, has warned millions of Americans that a hack earlier this year resulted in the theft of their private and medical data. According to a listing with the United States Department of Health and Human…
Episource Healthcare Data Breach Exposes Personal Data of 5.4 Million Americans
In early 2025, a cyberattack targeting healthcare technology provider Episource compromised the personal and medical data of over 5.4 million individuals in the United States. Though not widely known to the public, Episource plays a critical role in the…
Over 2 Million Users Affected: Browser Extensions Turned Into Silent Spying Tools
An alarming cyber threat has come to light involving common browser extensions used by millions across the world. According to a recent investigation by cybersecurity firm Koi Security, at least 18 browser add-ons, once considered safe were secretly turned into…
Asia is a Major Hub For Cybercrime, And AI is Poised to Exacerbate The Problem
Southeast Asia has emerged as a global hotspot for cybercrimes, where human trafficking and high-tech fraud collide. Criminal syndicates operate large-scale “pig butchering” operations in nations like Cambodia and Myanmar, which are scam centres manned by trafficked individuals compelled…
Why Major Companies Are Still Falling to Basic Cybersecurity Failures
In recent weeks, three major companies—Ingram Micro, United Natural Foods Inc. (UNFI), and McDonald’s—faced disruptive cybersecurity incidents. Despite operating in vastly different sectors—technology distribution, food logistics, and fast food retail—all three breaches stemmed from poor security fundamentals, not advanced…
Google Gemini Exploit Enables Covert Delivery of Phishing Content
An AI-powered automation system in professional environments, such as Google Gemini for Workspace, is vulnerable to a new security flaw. Using Google’s advanced large language model (LLM) integration within its ecosystem, Gemini enables the use of artificial intelligence (AI)…
Hidden Crypto Mining Operation Found in Truck Tied to Village Power Supply
In a surprising discovery, officials in Russia uncovered a secret cryptocurrency mining setup hidden inside a Kamaz truck parked near a village in the Buryatia region. The vehicle wasn’t just a regular truck, it was loaded with 95 mining…
Chinese Attackers Suspected of Breaching a Prominent DC Law Firm
The next front in the silent war, which is being waged with keystrokes and algorithms rather than missiles, is the digital infrastructure of a prominent legal firm in Washington, DC. Wiley Rein, a company known for negotiating the complex…