Category: CySecurity News – Latest Information Security and Hacking Incidents

Business and IT Leaders Diverge on Cloud and Security Priorities

  Enterprises are preparing to expand their cloud investments, even as many remain dissatisfied with the financial returns of recent technology deployments, according to a new report from Unisys. The study, which surveyed 1,000 C-suite and IT executives across eight…

Researchers Expose AI Prompt Injection Attack Hidden in Images

  Researchers have unveiled a new type of cyberattack that can steal sensitive user data by embedding hidden prompts inside images processed by AI platforms. These malicious instructions remain invisible to the human eye but become detectable once the images…

Age Checks Online: Privacy at Risk?

  Across the internet, the question of proving age is no longer optional, it’s becoming a requirement. Governments are tightening rules to keep children away from harmful content, and platforms are under pressure to comply.  From social media apps and…

How Image Resizing Could Expose AI Systems to Attacks

Security experts have identified a new kind of cyber attack that hides instructions inside ordinary pictures. These commands do not appear in the full image but become visible only when the photo is automatically resized by artificial intelligence (AI) systems.…

ReVault Flaws Expose Dell ControlVault3 Hardware to Persistent Attacks

  RevaUlt, a company marketing itself on advanced endpoint protection and next-generation SOC capabilities, recently suffered a severe security breach. The attackers penetrated its internal environment, exploiting vulnerabilities in the architecture used for their supposed secure SOC platform.  The compromise…

New Shamos Malware Targets Mac Users Through Fake Tech Support Sites

  Cybersecurity researchers have unearthed a new Mac-targeting malware called Shamos that deceives users through fake troubleshooting guides and repair solutions. This information-stealing malware, developed by the cybercriminal organization “COOKIE SPIDER,” represents a variant of the previously known Atomic macOS…

Nissan Confirms Data Leak After Ransomware Attack on Design Unit

Nissan’s Tokyo-based design subsidiary, Creative Box Inc. (CBI), has launched an investigation into a cyberattack after a ransomware group claimed to have stolen a large cache of internal files. The company confirmed that some design data has been compromised but…

Fake Netflix Job Offers Target Facebook Credentials in Real-Time Scam

  A sophisticated phishing campaign is targeting job seekers with fake Netflix job offers designed to steal Facebook login credentials. The scam specifically focuses on marketing and social media professionals who may have access to corporate Facebook business accounts.  Modus…

Aussie Telecom Breach Raises Alarm Over Customer Data Safety

  A recent cyberattack on TPG Telecom has reignited concerns about how safe personal information really is in the hands of major companies. What the provider initially downplayed as a “limited” incident has in fact left hundreds of thousands of…

Orange Belgium Hit by Cyberattack Affecting 850,000 Customers

  Orange Belgium, a major telecommunications provider and subsidiary of French telecom giant Orange Group, confirmed in August 2025 a significant cyberattack on its IT systems that resulted in unauthorized access to the personal data of approximately 850,000 customers. The…

VP.NET Launches SGX-Based VPN to Transform Online Privacy

  The virtual private network market is filled with countless providers, each promising secure browsing and anonymity. In such a crowded space, VP.NET has emerged with the bold claim of changing how VPNs function altogether. The company says it is…

Microsoft Boosts Digital Trust through Post Quantum Cryptography

  A comprehensive roadmap has been unveiled by Microsoft to enable it to future-proof its security infrastructure, marking a decisive step toward securing the company’s products and services with quantum-safe protection by 2033 — two years ahead of the target…

Hackers Trick Users with Fake Captchas to Steal Data

  Cybersecurity researchers have uncovered a new technique where attackers use fake Captcha tests to trick people into installing malware called Lumma Stealer. This malicious program is designed to quietly search infected computers for valuable information, such as login credentials,…

Workday Suffers Data Breach in Broader Salesforce Campaign

  Workday, a major player in the human resources sector, has disclosed a recent data breach caused by a social engineering attack targeting a third-party customer relationship management (CRM) system—specifically, a Salesforce instance. Although Workday, headquartered in Pleasanton, California, provides…

PayPal Password Leak Puts Millions of Users on High Alert

  It has been reported that millions of PayPal accounts have been traded on underground forums, which has raised a new wave of alarm in the ever-evolving landscape of cybercrime. Using the moniker “Chucky_BF”, a hacker announcing the availability of…

Fake Telegram Premium Website Spreads Lumma Stealer Malware

  Cybersecurity researchers have uncovered a malicious campaign that uses a fraudulent Telegram Premium website to distribute a dangerous variant of the Lumma Stealer malware. According to a report by Cyfirma, the fake domain telegrampremium[.]app closely imitates the official Telegram…

FBI Warns of Rising Online Threats Targeting Youth and Digital Assets

The Federal Bureau of Investigation (FBI) has raised concern over what it describes as a fast-expanding online threat, warning that criminal groups are becoming more organized and dangerous in cyberspace. The activity includes ransomware, phishing scams, cryptocurrency theft, and even…

New Gmail Phishing Attack Exploits Login Flow to Steal Credentials

  Despite today’s technologically advanced society, where convenience and connectivity are the norms, cyber threats continue to evolve at an alarming rate, making it extremely dangerous to live in. It has recently been reported that phishing attacks and online scams…

Canada’s Parliament Probes Data Breach Linked to Microsoft Flaws

  Canada’s House of Commons has launched an investigation after a cyberattack potentially exposed sensitive staff data, raising questions about whether recently discovered Microsoft vulnerabilities played a role. According to national media reports, an internal email to parliamentary employees revealed…

Connex Credit Union Confirms Data Breach Impacting 172,000 Customers

  Connex Credit Union, headquartered in North Haven, Connecticut, recently revealed that a data breach may have affected around 172,000 of its members. The compromised data includes names, account numbers, debit card information, Social Security numbers, and government identification used…

Think Twice Before Uploading Personal Photos to AI Chatbots

  Artificial intelligence chatbots are increasingly being used for fun, from generating quirky captions to transforming personal photos into cartoon characters. While the appeal of uploading images to see creative outputs is undeniable, the risks tied to sharing private photos…

NIST Issues Lightweight Cryptography Standard to Secure Small Devices

  A new lightweight cryptography standard has been finalized by the National Institute of Standards and Technology (NIST), aiming to enhance the security of billions of connected devices worldwide. It is intended to provide protection for small, resource-constrained technologies that…

FreeVPN.One Extension Turns from Privacy Tool to Surveillance Threat

  Security researchers at Koi Security have discovered troubling behavior from FreeVPN.One, a popular Chrome VPN extension with over 100,000 installations that has begun secretly capturing and transmitting users’ screenshots to remote servers.  Threat discovery  The extension, which had maintained…

Telegram Blocks Black Mirror Hacker Group and Data Leak Channels

  Telegram has stepped up its efforts to curb the spread of sensitive information by blocking several channels accused of leaking private data, with the high-profile Black Mirror hacker group being among the most prominent targets. The platform accused Black…

Brokers Fuel Underground Market for Bank Accounts in India

  An undercover investigation of India’s financial ecosystem has revealed that a troubling black market is quietly emerging – a market where bank accounts are traded just as casually as consumer goods. Undercover investigations have revealed that there is a…

Elastic Denies Serious Security Flaw in Its Defend Software

  Elastic, the company known for its enterprise search and security products, has pushed back against recent claims of a serious vulnerability in its Defend endpoint detection and response (EDR) tool. The controversy began after a small cybersecurity group, AshES…

Native Phishing Emerges as a New Microsoft 365 Threat Vector

  A recent cybersecurity threat report highlights a tactic known as “native phishing,” where attackers exploit the trusted, built-in features of Microsoft 365 to launch attacks from within an organization. This method moves beyond traditional phishing emails with malicious attachments,…

AI Agents and the Rise of the One-Person Unicorn

  Building a unicorn has been synonymous for decades with the use of a large team of highly skilled professionals, years of trial and error, and significant investments in venture capital. That is the path to building a unicorn, which…

Manpower Data Breach Hits 145,000 After RansomHub Ransomware Attack

  Manpower, one of the world’s largest staffing and recruitment companies, has confirmed that nearly 145,000 individuals had their personal data compromised following a ransomware attack in late December 2024. The company, which operates as part of ManpowerGroup alongside Experis…

Facial Recognition’s False Promise: More Sham Than Security

  Despite the rapid integration of facial recognition technology (FRT) into daily life, its effectiveness is often overstated, creating a misleading picture of its true capabilities. While developers frequently tout accuracy rates as high as 99.95%, these figures are typically…

Over a Million Healthcare Devices Hit by Cyberattack

  Despite the swell of cyberattacks changing the global threat landscape, Indian healthcare has become one of the most vulnerable targets as a result of these cyberattacks. There are currently 8,614 cyberattacks per week on healthcare institutions in the country,…

University of Western Australia Hit by Cybersecurity Breach

  The University of Western Australia (UWA) has confirmed a concerning cybersecurity incident that left thousands of staff, students, and visitors temporarily locked out of their accounts after hackers gained access to password data. The breach was detected late Saturday,…

Hackers Are Spreading Malware Through SVG Images on Facebook

The growing trend of age checks on websites has pushed many people to look for alternative platforms that seem less restricted. But this shift has created an opportunity for cybercriminals, who are now hiding harmful software inside image files that…

Taiwanese Web Hosting Infrastructure Hit by UAT-7237

  A recent report from Cisco Talos exposes a cyber intrusion by a suspected Chinese-government-backed hacking collective, tracked as UAT-7237, into a Taiwanese web hosting provider. The attackers aimed to steal credentials and implant backdoors, enabling persistent and covert access…

Microsoft Flaw Blamed as Hackers Breach Canada’s House of Commons

  In a recent security incident involving Canada’s parliamentary network, hackers exploited a recently released Microsoft vulnerability to breach the House of Commons network, shaking up the country’s parliament.  According to an internal e-mail obtained by CBC News, the intrusion…

Hackers Bypassed Microsoft Defender to Deploy Ransomware on PCs

  GuidePoint Security’s latest report reveals a sophisticated Akira ransomware campaign exploiting SonicWall VPNs through the strategic use of malicious Windows drivers. The campaign, which began in late July 2025, represents a significant escalation in the group’s tactics for evading…

Indian Government Flag Security Concerns with WhatsApp Web on Work PCs

  The Indian government has issued a significant cybersecurity advisory urging citizens to avoid using WhatsApp Web on office computers and laptops, highlighting serious privacy and security risks that could expose personal information to employers and cybercriminals.  The Ministry of…

Airline suffers data breach, customer information stolen

Air France and KLM announced that threat actors had compromised a customer service platform and stolen customer data. Along with Transavia, KLM and Air France are units of Air France-KLM Group, a Dutch-French multinational airline holding organization. Established in 2004,…

Pro-Russian Hackers Breach Norwegian Dam Systems

  The Norwegian authorities have confirmed, in a development that illustrates the escalation of cyber threats on Europe’s critical infrastructure, that pro-Russian hackers sabotaged a dam in April, affecting water flow for a short period of time. A remote control…

New Hacking Tool Lets Ransomware Groups Disable Security Systems

  Cybersecurity experts have discovered a new malicious tool designed to shut down computer security programs, allowing hackers to attack systems without being detected. The tool, which appears to be an updated version of an older program called EDRKillShifter, is…

KLM Alerts Customers After Data Theft by Fraudsters

On Wednesday, Air France and KLM announced a breach of a customer service platform, compromising the personal data of an undisclosed number of customers. The breach highlights the increasing cybersecurity challenges faced by the aviation industry. Air France–KLM Group, the…

Security Flaws Found in Police and Military Radio Encryption

  Cybersecurity experts have uncovered significant flaws in encryption systems used by police and military radios globally, potentially allowing malicious actors to intercept secure communications.  Background and context  In 2023, Dutch security researchers from Midnight Blue unearthed an intentional backdoor…

Cybercriminals Escalate Client-Side Attacks Targeting Mobile Browsers

  Cybercriminals are increasingly turning to client-side attacks as a way to bypass traditional server-side defenses, with mobile browsers emerging as a prime target. According to the latest “Client-Side Attack Report Q2 2025” by security researchers c/side, these attacks are…

Experts decoded encryption keys used by DarkBit ransomware gang

Encryption key for Darkbit ransomware Good news for people affected by the DarkBit ransomware: experts from Profero have cracked the encryption process, allowing victims to recover their files for free without paying any ransom. However, the company has not yet…