Enterprises are preparing to expand their cloud investments, even as many remain dissatisfied with the financial returns of recent technology deployments, according to a new report from Unisys. The study, which surveyed 1,000 C-suite and IT executives across eight…
Category: CySecurity News – Latest Information Security and Hacking Incidents
India’s Biggest Cyber Fraud: Businessman Duped of ₹25 Crore Through Fake Trading App
A Kochi-based pharmaceutical company owner has suffered a loss of ₹25 crore in what is being described as the largest single-person cyber fraud case in India. The incident involved a sophisticated online trading scam, executed through a fake trading…
New Forensic System Tracks Ghost Guns Made With 3D Printing Using SIDE
The rapid rise of 3D printing has transformed manufacturing, offering efficient ways to produce tools, spare parts, and even art. But the same technology has also enabled the creation of “ghost guns” — firearms built outside regulated systems and…
Password Managers Face Clickjacking Flaw, Millions of Users at Risk
For years, password managers have been promoted as one of the safest ways to store and manage login details. They keep everything in one place, help generate strong credentials, and protect against weak or reused passwords. But new research has…
Cybersecurity Landscape Shaken as Ransomware Activity Nearly Triples in 2024
Ransomware is one of the most persistent threats in the evolving landscape of cybercrime, but its escalation in 2024 has marked an extremely alarming turning point. Infiltrating hospitals, financial institutions, and even government agencies in a manner that has…
Researchers Expose AI Prompt Injection Attack Hidden in Images
Researchers have unveiled a new type of cyberattack that can steal sensitive user data by embedding hidden prompts inside images processed by AI platforms. These malicious instructions remain invisible to the human eye but become detectable once the images…
Age Checks Online: Privacy at Risk?
Across the internet, the question of proving age is no longer optional, it’s becoming a requirement. Governments are tightening rules to keep children away from harmful content, and platforms are under pressure to comply. From social media apps and…
ClickFix Attack Targeting Windows and Mac Users to Steal User Data
“Think before you click”: Microsoft warns all Windows PC users and as well as macOS users, from a series of attacks that are “targeting thousands of enterprise and end-user devices globally every day.” The scripts deploy malware on these devices,…
Cybersecurity: The Top Business Risk Many Firms Still Struggle to Tackle
Cybersecurity has emerged as the biggest threat to modern enterprises, yet most organizations remain far from prepared to handle it. Business leaders are aware of the risks — financial losses, reputational harm, and operational disruptions but awareness has not…
Congress Questions Hertz Over AI-Powered Scanners in Rental Cars After Customer Complaints
Hertz is facing scrutiny from U.S. lawmakers over its use of AI-powered vehicle scanners to detect damage on rental cars, following growing reports of customer complaints. In a letter to Hertz CEO Gil West, the House Oversight Subcommittee on…
Transparent Tribe Target Indian Government’s Custom Linux OS with Weaponized Desktop Files
Transparent Tribe, a cyber-espionage group believed to originate from Pakistan and also known as APT36, has stepped up its attacks on Indian government entities by using malicious desktop shortcuts designed to compromise both Windows and BOSS Linux systems. The…
Worker Sentenced to Four Years for Compromising Company IT Infrastructure
It is the case of a Chinese-born software developer who has been sentenced to four years in federal prison after hacking into the internal systems of his former employer, in a stark warning of the dangers of insider threats…
India Most Targeted by Malware as AI Drives Surge in Ransomware and Phishing Attacks
India has become the world’s most-targeted nation for malware, according to the latest report by cybersecurity firm Acronis, which highlights how artificial intelligence is fueling a sharp increase in ransomware and phishing activity. The findings come from the company’s…
APT36 Exploits Linux .desktop Files for Espionage Malware in Ongoing Cyber Attacks
The Pakistani threat group APT36 has launched new cyber-espionage attacks targeting India’s government and defense sectors by abusing Linux .desktop files to deploy malware. According to recent reports from CYFIRMA and CloudSEK, the campaign—first detected on August 1, 2025—is…
How Image Resizing Could Expose AI Systems to Attacks
Security experts have identified a new kind of cyber attack that hides instructions inside ordinary pictures. These commands do not appear in the full image but become visible only when the photo is automatically resized by artificial intelligence (AI) systems.…
ReVault Flaws Expose Dell ControlVault3 Hardware to Persistent Attacks
RevaUlt, a company marketing itself on advanced endpoint protection and next-generation SOC capabilities, recently suffered a severe security breach. The attackers penetrated its internal environment, exploiting vulnerabilities in the architecture used for their supposed secure SOC platform. The compromise…
Verizon Reimagines the Household Phone Number with Family Line for the Digital Era
Verizon has faced challenges in recent months. They have faced mounting criticism for a number of controversial decisions that have left many of their long-time subscribers wondering why they still belong to Verizon. When Verizon eliminated customer loyalty discounts and…
New Shamos Malware Targets Mac Users Through Fake Tech Support Sites
Cybersecurity researchers have unearthed a new Mac-targeting malware called Shamos that deceives users through fake troubleshooting guides and repair solutions. This information-stealing malware, developed by the cybercriminal organization “COOKIE SPIDER,” represents a variant of the previously known Atomic macOS…
FreeVPN.One Chrome Extension Caught Secretly Spying on Users With Unauthorized Screenshots
Security researchers are warning users against relying on free VPN services after uncovering alarming surveillance practices linked to a popular Chrome extension. The extension in question, FreeVPN.One, has been downloaded over 100,000 times from the Chrome Web Store and…
Millions of Patient Records Compromised After Ransomware Strike on DaVita
Healthcare Faces Growing Cyber Threats A ransomware attack that affected nearly 2.7 million patients has been confirmed by kidney care giant DaVita, revealing that one of the most significant cyberattacks of the year has taken place. There are over 2,600…
Nissan Confirms Data Leak After Ransomware Attack on Design Unit
Nissan’s Tokyo-based design subsidiary, Creative Box Inc. (CBI), has launched an investigation into a cyberattack after a ransomware group claimed to have stolen a large cache of internal files. The company confirmed that some design data has been compromised but…
Colt Technology Services Confirms Customer Data Theft After Warlock Ransomware Attack
UK-based telecommunications provider Colt Technology Services has confirmed that sensitive customer-related documentation was stolen in a recent ransomware incident. The company initially disclosed on August 12 that it had suffered a cyberattack, but this marks the first confirmation that data…
Fake Netflix Job Offers Target Facebook Credentials in Real-Time Scam
A sophisticated phishing campaign is targeting job seekers with fake Netflix job offers designed to steal Facebook login credentials. The scam specifically focuses on marketing and social media professionals who may have access to corporate Facebook business accounts. Modus…
Aussie Telecom Breach Raises Alarm Over Customer Data Safety
A recent cyberattack on TPG Telecom has reignited concerns about how safe personal information really is in the hands of major companies. What the provider initially downplayed as a “limited” incident has in fact left hundreds of thousands of…
A Comprehensive Look at Twenty AI Assisted Coding Risks and Remedies
In recent decades, artificial intelligence has radically changed the way software is created, tested, and deployed, bringing about a significant shift in software development history. Originally, it was only a simple autocomplete function, but it has evolved into a…
Cybercriminals Harness AI and Automation, Leaving Southeast Asia Exposed
A new study warns that cybercriminals are leveraging artificial intelligence (AI) and automation to strike faster and with greater precision, exposing critical weaknesses in Southeast Asia—a region marked by rapid digital growth and interconnected supply chains. The findings urge…
Data Portability and Sovereign Clouds: Building Resilience in a Globalized Landscape
The emergence of sovereign clouds has become increasingly inevitable as organizations face mounting regulatory demands and geopolitical pressures that influence where their data must be stored. Localized cloud environments are gaining importance, ensuring that enterprises keep sensitive information within…
Cyberattack on New York Business Council Exposes Thousands to Risk
The Business Council of New York State (BCNYS), an influential body representing businesses and professional groups, has confirmed that a recent cyberattack compromised the personal information of more than 47,000 people. In a report submitted to the Office of the…
Orange Belgium Hit by Cyberattack Affecting 850,000 Customers
Orange Belgium, a major telecommunications provider and subsidiary of French telecom giant Orange Group, confirmed in August 2025 a significant cyberattack on its IT systems that resulted in unauthorized access to the personal data of approximately 850,000 customers. The…
Hackers Disclose Why They Targeted North Korean Government Hackers
In a stunning development in the history of cybersecurity, independent hackers managed to successfully break into the system of a North Korean government hacker, enabling them to expose the inner workings of one of the country’s most secretive cyber…
The Rise of the “Shadow AI Economy”: Employees Outpace Companies in AI Adoption
Artificial intelligence has become one of the most talked-about technologies in recent years, with billions of dollars poured into projects aimed at transforming workplaces. Yet, a new study by MIT suggests that while official AI programs inside companies are…
VP.NET Launches SGX-Based VPN to Transform Online Privacy
The virtual private network market is filled with countless providers, each promising secure browsing and anonymity. In such a crowded space, VP.NET has emerged with the bold claim of changing how VPNs function altogether. The company says it is…
Microsoft Boosts Digital Trust through Post Quantum Cryptography
A comprehensive roadmap has been unveiled by Microsoft to enable it to future-proof its security infrastructure, marking a decisive step toward securing the company’s products and services with quantum-safe protection by 2033 — two years ahead of the target…
Major Password Managers Leak User Credentials in Unpatched Clickjacking Attacks
Six popular password managers serving tens of millions of users remain vulnerable to unpatched clickjacking flaws that could allow cybercriminals to steal login credentials, two-factor authentication codes, and credit card information. Modus operandi Security researcher Marek Tóth, who presented…
Hackers Trick Users with Fake Captchas to Steal Data
Cybersecurity researchers have uncovered a new technique where attackers use fake Captcha tests to trick people into installing malware called Lumma Stealer. This malicious program is designed to quietly search infected computers for valuable information, such as login credentials,…
Workday Suffers Data Breach in Broader Salesforce Campaign
Workday, a major player in the human resources sector, has disclosed a recent data breach caused by a social engineering attack targeting a third-party customer relationship management (CRM) system—specifically, a Salesforce instance. Although Workday, headquartered in Pleasanton, California, provides…
PayPal Password Leak Puts Millions of Users on High Alert
It has been reported that millions of PayPal accounts have been traded on underground forums, which has raised a new wave of alarm in the ever-evolving landscape of cybercrime. Using the moniker “Chucky_BF”, a hacker announcing the availability of…
Fake Telegram Premium Website Spreads Lumma Stealer Malware
Cybersecurity researchers have uncovered a malicious campaign that uses a fraudulent Telegram Premium website to distribute a dangerous variant of the Lumma Stealer malware. According to a report by Cyfirma, the fake domain telegrampremium[.]app closely imitates the official Telegram…
Federal Judge Allows Amazon Alexa Users’ Privacy Lawsuit to Proceed Nationwide
A federal judge in Seattle has ruled that Amazon must face a nationwide lawsuit involving tens of millions of Alexa users. The case alleges that the company improperly recorded and stored private conversations without user consent. U.S. District Judge…
FBI Warns of Rising Online Threats Targeting Youth and Digital Assets
The Federal Bureau of Investigation (FBI) has raised concern over what it describes as a fast-expanding online threat, warning that criminal groups are becoming more organized and dangerous in cyberspace. The activity includes ransomware, phishing scams, cryptocurrency theft, and even…
New Gmail Phishing Attack Exploits Login Flow to Steal Credentials
Despite today’s technologically advanced society, where convenience and connectivity are the norms, cyber threats continue to evolve at an alarming rate, making it extremely dangerous to live in. It has recently been reported that phishing attacks and online scams…
Pakistani Cybercriminals Turn Piracy Against Pirates in $4M Malware Scheme
A massive cybercrime operation based in Pakistan has been exposed after running a sophisticated infostealer malware campaign for five years, generating over $4 million by targeting software pirates. Operation details The criminal network, primarily operating from Bahawalpur and Faisalabad,…
New Phishing Scam Uses Japanese Character to Perfectly Mimic Legitimate URLs
Cybersecurity researchers have recently flagged a highly sophisticated phishing campaign that leverages a unique tactic: the use of the Japanese hiragana character “ん” to mimic the appearance of a forward slash (“/”) in website URLs. This technique is especially…
Canada’s Parliament Probes Data Breach Linked to Microsoft Flaws
Canada’s House of Commons has launched an investigation after a cyberattack potentially exposed sensitive staff data, raising questions about whether recently discovered Microsoft vulnerabilities played a role. According to national media reports, an internal email to parliamentary employees revealed…
Connex Credit Union Confirms Data Breach Impacting 172,000 Customers
Connex Credit Union, headquartered in North Haven, Connecticut, recently revealed that a data breach may have affected around 172,000 of its members. The compromised data includes names, account numbers, debit card information, Social Security numbers, and government identification used…
VPN Downloads Surge Across the UK as Online Safety Act Triggers Strict Age Verification
Virtual Private Network (VPN) usage has skyrocketed across the UK since the Online Safety Act officially came into force on July 25, 2025. The new legislation mandates that websites, streaming services, and mobile apps hosting adult content implement robust…
Cybercriminals Steal Thousands of Guest ID Documents from Italian Hotels
Thousands of travellers have been left vulnerable to cyberattacks caused by hotel systems that have been breached by a sweeping cyberattack. Identities that have been stolen from hotel systems are now circulating on underground forums. According to the government’s…
Think Twice Before Uploading Personal Photos to AI Chatbots
Artificial intelligence chatbots are increasingly being used for fun, from generating quirky captions to transforming personal photos into cartoon characters. While the appeal of uploading images to see creative outputs is undeniable, the risks tied to sharing private photos…
UnitedHealth Cyberattack Becomes Largest Health Data Breach in History
The recent cyberattack on UnitedHealth has now been confirmed as the biggest health care data breach ever recorded, affecting more than 192 million people, over one-third of the U.S. population. When news of the incident first broke in 2023,…
NIST Issues Lightweight Cryptography Standard to Secure Small Devices
A new lightweight cryptography standard has been finalized by the National Institute of Standards and Technology (NIST), aiming to enhance the security of billions of connected devices worldwide. It is intended to provide protection for small, resource-constrained technologies that…
Crypto24 ransomware uses custom “EDR-blinding” tool to hit high-value targets
A threat group tracked as Crypto24 is attacking large organizations across the U.S., Europe, and Asia, aiming at finance, manufacturing, entertainment, and technology firms. First discussed publicly on security forums in September 2024, the group has since shown mature tradecraft,…
FreeVPN.One Extension Turns from Privacy Tool to Surveillance Threat
Security researchers at Koi Security have discovered troubling behavior from FreeVPN.One, a popular Chrome VPN extension with over 100,000 installations that has begun secretly capturing and transmitting users’ screenshots to remote servers. Threat discovery The extension, which had maintained…
Ransom Payouts Hit Record Levels Amid Social Engineering and Data Exfiltration Attacks
Ransomware payouts surged to unprecedented levels in the second quarter of 2025, driven largely by the rise of highly targeted social engineering schemes. According to new data from Coveware by Veeam, the average ransom payment skyrocketed to $1.13 million,…
Scammers Can Pinpoint Your Exact Location With a Single Click Warns Hacker
With the advent of the digital age, crime has steadily migrated from dark alleys to cyberspace, creating an entirely new type of criminal enterprise that thrives on technology. The adage that “crime doesn’t pay” once seemed so absurd to…
Orange Belgium Data Breach Exposes 850K Users to SIM-Swapping Risks
Orange Belgium has suffered a major data breach in which an attacker accessed the personal information of approximately 850,000 customers, with SIM card numbers and Personal Unblocking Key (PUK) codes among the most sensitive details exposed. The breach, disclosed…
Here’s How ‘AI Poisoning’ Tools Are Sabotaging Data-Hungry Bots
The internet has evolved from a platform mainly used by people for social sharing to one dominated by automated bots, especially those powered by AI. Bots now generate most web traffic, with over half of this stemming from malicious…
Telegram Blocks Black Mirror Hacker Group and Data Leak Channels
Telegram has stepped up its efforts to curb the spread of sensitive information by blocking several channels accused of leaking private data, with the high-profile Black Mirror hacker group being among the most prominent targets. The platform accused Black…
Hackers Steal Medical Data of Nearly Half a Million Women in the Netherlands
Almost 500,000 women in the Netherlands have had their medical information stolen after hackers breached a clinical laboratory responsible for analyzing cervical cancer screening tests. The stolen records, dating from 2022 until now, include names, addresses, dates of birth, social…
Europol Cracks Down on Major Cocaine Trafficking and Money Laundering Network Linked to Sky ECC
Europol has carried out a large-scale operation against a notorious organized crime syndicate involved in cocaine trafficking and money laundering. The coordinated raids led to the arrest of 10 individuals, the seizure of an entire tourist hotel, several real…
Brokers Fuel Underground Market for Bank Accounts in India
An undercover investigation of India’s financial ecosystem has revealed that a troubling black market is quietly emerging – a market where bank accounts are traded just as casually as consumer goods. Undercover investigations have revealed that there is a…
Elastic Denies Serious Security Flaw in Its Defend Software
Elastic, the company known for its enterprise search and security products, has pushed back against recent claims of a serious vulnerability in its Defend endpoint detection and response (EDR) tool. The controversy began after a small cybersecurity group, AshES…
Native Phishing Emerges as a New Microsoft 365 Threat Vector
A recent cybersecurity threat report highlights a tactic known as “native phishing,” where attackers exploit the trusted, built-in features of Microsoft 365 to launch attacks from within an organization. This method moves beyond traditional phishing emails with malicious attachments,…
AI Agents and the Rise of the One-Person Unicorn
Building a unicorn has been synonymous for decades with the use of a large team of highly skilled professionals, years of trial and error, and significant investments in venture capital. That is the path to building a unicorn, which…
Manpower Data Breach Hits 145,000 After RansomHub Ransomware Attack
Manpower, one of the world’s largest staffing and recruitment companies, has confirmed that nearly 145,000 individuals had their personal data compromised following a ransomware attack in late December 2024. The company, which operates as part of ManpowerGroup alongside Experis…
Allianz Data Breach Exposes 1.4 Million Customers — What You Should Do
Nearly 1.4 million people in the United States have had their personal information exposed in a recent cyberattack on the Allianz Life Insurance Company of North America. The breach, which took place on July 16, was carried out through…
RomCom Hackers Exploit WinRAR Zero-Day CVE-2025-8088 in Cyberattacks, ESET Confirms
Cybersecurity researchers have uncovered that the Russian hacking group RomCom exploited a previously unknown flaw in WinRAR, tracked as CVE-2025-8088, in a series of zero-day attacks. The vulnerability was identified as a path traversal bug that enabled attackers to…
Facial Recognition’s False Promise: More Sham Than Security
Despite the rapid integration of facial recognition technology (FRT) into daily life, its effectiveness is often overstated, creating a misleading picture of its true capabilities. While developers frequently tout accuracy rates as high as 99.95%, these figures are typically…
Over a Million Healthcare Devices Hit by Cyberattack
Despite the swell of cyberattacks changing the global threat landscape, Indian healthcare has become one of the most vulnerable targets as a result of these cyberattacks. There are currently 8,614 cyberattacks per week on healthcare institutions in the country,…
Profero Cracks DarkBit Ransomware Encryption After Israel-Iran Cyberattack Links
Cybersecurity company Profero managed to break the encryption scheme used by the DarkBit ransomware group, allowing victims to restore their systems without having to pay a ransom. This achievement came during a 2023 incident response investigation, when Profero was…
University of Western Australia Hit by Cybersecurity Breach
The University of Western Australia (UWA) has confirmed a concerning cybersecurity incident that left thousands of staff, students, and visitors temporarily locked out of their accounts after hackers gained access to password data. The breach was detected late Saturday,…
Gemini Flaw Exposed Via Malicious Google Calendar Invites, Researchers Find
Google recently fixed a critical vulnerability in its Gemini AI assistant, which is tightly integrated with Android, Google Workspace, Gmail, Calendar, and Google Home. The flaw allowed attackers to exploit Gemini via creatively crafted Google Calendar invites, using indirect…
Israel and Iran Cyber War Escalates After June Conflict Despite Ceasefire
The long-running cyber conflict between Israel and Iran has intensified following the June war, according to a recent report by the Financial Times. Israeli officials disclosed that they began receiving suspicious text messages containing malicious links soon after the…
Why Hackers Focus on Certain Smart Home Devices and How to Safeguard Them
In an era where convenience is the hallmark of modern living, smart devices have become a large part of households around the world, offering a range of advantages from voice-activated assistants to connected cameras and appliances. These technologies promise…
Peter Burke Unveils Generative AI-Powered Autonomous Drone Software, Redefining Robotics
In a major leap for artificial intelligence and robotics, computer scientist Peter Burke has introduced a project that uses generative AI to build autonomous drone software. Far from being a routine technical experiment, this initiative marks a pivotal shift…
Hackers Are Spreading Malware Through SVG Images on Facebook
The growing trend of age checks on websites has pushed many people to look for alternative platforms that seem less restricted. But this shift has created an opportunity for cybercriminals, who are now hiding harmful software inside image files that…
How Scammers Use Deepfakes in Financial Fraud and Ways to Stay Protected
Deepfake technology, developed through artificial intelligence, has advanced to the point where it can convincingly replicate human voices, facial expressions, and subtle movements. While once regarded as a novelty for entertainment or social media, it has now become a…
Taiwanese Web Hosting Infrastructure Hit by UAT-7237
A recent report from Cisco Talos exposes a cyber intrusion by a suspected Chinese-government-backed hacking collective, tracked as UAT-7237, into a Taiwanese web hosting provider. The attackers aimed to steal credentials and implant backdoors, enabling persistent and covert access…
Microsoft Flaw Blamed as Hackers Breach Canada’s House of Commons
In a recent security incident involving Canada’s parliamentary network, hackers exploited a recently released Microsoft vulnerability to breach the House of Commons network, shaking up the country’s parliament. According to an internal e-mail obtained by CBC News, the intrusion…
‘Samourai’ Cryptomixer Founders Admit to Money Laundering Charges
Two executives behind a cryptocurrency service called Samourai Wallet have admitted in court that they helped criminals hide more than $200 million. Keonne Rodriguez, the company’s CEO, and William Lonergan Hill, its chief technology officer, pleaded guilty to conspiracy…
Hackers Bypassed Microsoft Defender to Deploy Ransomware on PCs
GuidePoint Security’s latest report reveals a sophisticated Akira ransomware campaign exploiting SonicWall VPNs through the strategic use of malicious Windows drivers. The campaign, which began in late July 2025, represents a significant escalation in the group’s tactics for evading…
Leaked Data Exposes Daily Lives of North Korean IT Workers in Remote Work Scams
A recent data leak has shed rare light on the hidden world of North Korean IT workers who carry out remote work scams worldwide. The revelations not only expose the highly organized operations of these state-sponsored workers but also…
Indian Government Flag Security Concerns with WhatsApp Web on Work PCs
The Indian government has issued a significant cybersecurity advisory urging citizens to avoid using WhatsApp Web on office computers and laptops, highlighting serious privacy and security risks that could expose personal information to employers and cybercriminals. The Ministry of…
Airline suffers data breach, customer information stolen
Air France and KLM announced that threat actors had compromised a customer service platform and stolen customer data. Along with Transavia, KLM and Air France are units of Air France-KLM Group, a Dutch-French multinational airline holding organization. Established in 2004,…
US Lawmakers Raise Concerns Over AI Airline Ticket Pricing Practices
Airline controversies often make headlines, and recent weeks have seen no shortage of them. Southwest Airlines faced passenger backlash after a leaked survey hinted at possible changes to its Rapid Rewards program. Delta Air Lines also reduced its Canadian…
Croatia’s Largest Research Institute Hit by Ransomware in Global ToolShell Exploits
The Ruđer Bošković Institute (RBI) in Zagreb — Croatia’s biggest science and technology research center has confirmed it was one of thousands of organizations worldwide targeted in a massive cyberattack exploiting Microsoft SharePoint’s “ToolShell” security flaws. The incident occurred on…
Pro-Russian Hackers Breach Norwegian Dam Systems
The Norwegian authorities have confirmed, in a development that illustrates the escalation of cyber threats on Europe’s critical infrastructure, that pro-Russian hackers sabotaged a dam in April, affecting water flow for a short period of time. A remote control…
UK Police’s Passport Photo Searches Spark Privacy Row Amid Facial Recognition Surge
. Police in the UK have carried out hundreds of facial recognition searches using the national passport photo database — a move campaigners call a “historic breach of the right to privacy,” The Telegraph has reported. Civil liberties groups…
How ChatGPT prompt can allow cybercriminals to steal your Google Drive data
Chatbots and other AI tools have made life easier for threat actors. A recent incident highlighted how ChatGPT can be exploited to obtain API keys and other sensitive data from cloud platforms. Prompt injection attacks leads to cloud access Experts…
New Hacking Tool Lets Ransomware Groups Disable Security Systems
Cybersecurity experts have discovered a new malicious tool designed to shut down computer security programs, allowing hackers to attack systems without being detected. The tool, which appears to be an updated version of an older program called EDRKillShifter, is…
China’s Ministry of State Security Warns of Biometric Data Risks in Crypto Reward Schemes
China’s Ministry of State Security (MSS) has issued a strong warning over the collection of biometric information by foreign companies in exchange for cryptocurrency rewards, describing the practice as a potential danger to both personal privacy and national security.…
KLM Alerts Customers After Data Theft by Fraudsters
On Wednesday, Air France and KLM announced a breach of a customer service platform, compromising the personal data of an undisclosed number of customers. The breach highlights the increasing cybersecurity challenges faced by the aviation industry. Air France–KLM Group, the…
Security Flaws Found in Police and Military Radio Encryption
Cybersecurity experts have uncovered significant flaws in encryption systems used by police and military radios globally, potentially allowing malicious actors to intercept secure communications. Background and context In 2023, Dutch security researchers from Midnight Blue unearthed an intentional backdoor…
Akira ransomware turns off Windows Defender to install malware on Windows devices
Akira ransomware strikes again. This time, it has abused an Intel CPU tuning driver to stop Microsoft Defender in attacks from EDRs and security tools active on target devices. Windows defender turned off for attacks The exploited driver is called…
Nvidia Pushes Back Against Claims of Secret Backdoors in Its Chips
Nvidia has strongly denied accusations from China that its computer chips include secret ways to track users or shut down devices remotely. The company also warned that proposals to add such features, known as backdoors or kill switches would create…
Rising Underwater Mortgages Signal Strain in Florida and Texas Property Markets
A growing number of American homebuyers are turning to adjustable-rate mortgages (ARMs) and temporary buydowns as a way of easing the initial repayment burden when they are faced with persistently high interest rates. This is a new report from…
Venice Film Festival Cyberattack Leaks Personal Data of Accredited Participants
The Venice Film Festival has reportedly been hit by a cyberattack, resulting in the leak of sensitive personal data belonging to accredited attendees. According to The Hollywood Reporter, the breach exposed information including names, email addresses, contact numbers, and…
Tech Giant Google Introduces an Open-Source AI Agent to Automate Coding Activities
Google has launched Gemini CLI GitHub Actions, an open-source AI agent that automates routine coding tasks directly within GitHub repositories. This tool, now in beta and available globally, acts as an AI coding teammate that works both autonomously and…
From Vibes to Ventures: How AI-First Startups Like Giggles Are Redefining the Rules of Entrepreneurship
In January, 18-year-old Justin Jin introduced Giggles — an AI-powered social entertainment app that has already drawn over 120,000 people to its waitlist and generated 150 million impressions. Remarkably, this momentum came without venture capital backing, a marketing budget,…
Cybercriminals Escalate Client-Side Attacks Targeting Mobile Browsers
Cybercriminals are increasingly turning to client-side attacks as a way to bypass traditional server-side defenses, with mobile browsers emerging as a prime target. According to the latest “Client-Side Attack Report Q2 2025” by security researchers c/side, these attacks are…
Experts decoded encryption keys used by DarkBit ransomware gang
Encryption key for Darkbit ransomware Good news for people affected by the DarkBit ransomware: experts from Profero have cracked the encryption process, allowing victims to recover their files for free without paying any ransom. However, the company has not yet…