A malicious new Android malware called Perseus is targeting users by scanning personal notes for sensitive information like passwords and cryptocurrency recovery phrases. Discovered by cybersecurity firm ThreatFabric, this threat evolves from earlier malware families such as Cerberus and…
Category: CySecurity News – Latest Information Security and Hacking Incidents
International Crackdown Disrupts IoT Botnets Powering Large-Scale DDoS Attacks
Early results came through cooperation among U.S., German, and Canadian agencies targeting major digital threats like Aisuru, KimWolf, JackSkid, and Mossad. Systems once used to manage attacks now stand inactive after teams disrupted central control points across borders. Instead…
Meta Builds Privacy Focused Chatbot After AI Agents Reveal Confidential Data
Rather than being a malicious incident, what transpired was a routine technical inquiry within a company in which automated systems have become an increasingly integral part of engineering workflows. When a developer sought guidance, he turned to an internal…
Government Remains Primary Target as Cyberattacks Grow in 2025
Government institutions were the most heavily targeted sector in 2025, according to newly published research from HPE Threat Labs, which documented 1,186 active cyberattack campaigns throughout the year. The dataset reflects activity tracked between January 1 and December 31,…
MiniMax Unveils Self-Evolving M2.7 AI: Handles 50% of RL Research
Chinese AI startup MiniMax has unveiled its latest proprietary model, M2.7, touted as the industry’s first “self-evolving” AI capable of independently handling 30% to 50% of reinforcement learning research workflows. According to a VentureBeat report, this breakthrough positions M2.7…
ConnectWise Warns of Critical ScreenConnect Flaw Enabling Unauthorized Access
A security alert now circulates among ScreenConnect users – critical exposure lurks within older builds. Versions released before 26.1 carry a defect labeled CVE-2026-3564. Unauthorized entry becomes possible through this gap, alongside elevated permissions. ConnectWise urges immediate awareness around…
DarkSword Exploit Kit Targets iPhones, Steals Crypto Wallet and Personal Data
A newly identified exploit kit named “DarkSword” is being used to target iOS devices and extract a wide range of sensitive user information, including data from cryptocurrency wallet applications. The threat specifically impacts iPhones running iOS versions 18.4 to…
Large Scale Ransomware Attack at Marquis Compromises Data of 672000 People
Marquis, a Texas-based provider of analytics and visualization solutions to hundreds of U.S. banks, recently disclosed a ransomware intrusion that took place in August 2025 resulted in a large-scale compromise of highly sensitive customer information, demonstrating the systemic vulnerability…
Cyber Operations Expand as Iran Conflict Extends into Digital Warfare
Cyberattacks are increasingly being used alongside conventional military actions in the ongoing conflict involving Iran, with both state-linked actors and loosely organised hacker groups targeting systems in the United States and Israel. A recent incident involving Stryker illustrates the…
Nvidia DLSS 5 Sparks Backlash as AI Graphics Divide Gaming Industry
Despite fanfare at a Silicon Valley event, Nvidia’s latest graphics innovation, DLSS 5, has stirred debate among industry observers. Promoted as a leap toward lifelike visuals in gaming, the system leans heavily on artificial intelligence. Set for release before…
Govt, RBI Tighten Grip on Fraudulent Loan Apps
The Government of India and the Reserve Bank of India (RBI) have intensified efforts to combat fraudulent digital loan apps that exploit vulnerable borrowers. In a recent Rajya Sabha response, Minister of State for Finance Pankaj Chaudhary outlined coordinated…
AI Agents Are Reshaping Cyber Threats, Making Traditional Kill Chains Less Relevant
In September 2025, Anthropic disclosed a case that highlights a major evolution in cyber operations. A state-backed threat actor leveraged an AI-powered coding agent to conduct an automated cyber espionage campaign targeting 30 organizations globally. What stands out is…
FBI Escalates Enforcement Against Thai Fraud Rings Targeting US Individualsa
Digital exchanges that begin with a polite greeting, an apparent genuine conversation, or a quiet offer of companionship increasingly become entry points into a far more calculated form of transnational fraud. For many Americans, these interactions are not merely…
Mazda Reports Limited Data Exposure After Warehouse System Breach
Early reports indicate Mazda Motor Corporation faced a data leak following suspicious activity uncovered in its systems during December 2025. Information belonging to staff members, along with details tied to external partners, became accessible due to the intrusion. Investigation…
24.5 Million Dollar Hack Exposes Vulnerabilities in Resolv DeFi
The concept of stability is fundamental to the architecture of decentralized finance – it is the foundation upon which trust is built. A stablecoin brings parity with the dollar to the decentralized finance system, providing a quiet assurance that…
LeakNet Ransomware Uses ClickFix and Deno for Stealthy Attacks
LeakNet ransomware has changed its approach by pairing ClickFix social-engineering lures with a Deno-based loader, making its intrusion chain harder to spot. The group is using compromised websites to trick users into running malicious commands, then executing payloads in…
“Unhackable” No More: Researcher Demonstrates Hardware-Level Exploit on Xbox One
For years, the Xbox One was widely viewed as one of the few gaming systems that had resisted successful hacking. That perception has now changed after a new hardware-based attack method was publicly demonstrated. At the RE//verse 2026 event, security…
AI-Driven Phishing Campaign Exploits Device Permissions to Steal Biometric and Personal Data
A fresh wave of digital deception, driven by machine learning tools, shifts how hackers grab personal information — no longer relying on password theft but diving into deeper system controls. Spotted by analysts at Cyble Research & Intelligence Labs…
Russian Troops Rage Over Telegram Crackdown
Russian soldiers are increasingly frustrated as the Kremlin tightens control on Telegram, which has become the backbone of military communication, logistics and morale. The restrictions have sparked some unusual criticism from pro-war commentators, who argue that the move risks undermining…
Stryker Attack Prompts Scrutiny of Enterprise Device Management Tools
A significant shift has occurred in the strategic calculus behind destructive cyber operations in recent years, expanding beyond the confines of traditional critical infrastructures into lesser-noticed yet equally vital ecosystems underpinning modern economies. State-aligned threat actors are increasingly focusing their…