Category: CySecurity News – Latest Information Security and Hacking Incidents

Weak Links in Healthcare Infrastructure Fuel Cyberattacks

  Increasingly, cybercriminals are exploiting systemic vulnerabilities in order to target the healthcare sector as one of the most frequently attacked and vulnerable targets in modern cybersecurity, with attacks growing both in volume and sophistication. These risks go well beyond…

Kettering Health Ransomware Attack Linked to Interlock Group

  Kettering Health, a prominent healthcare network based in Ohio, is still grappling with the aftermath of a disruptive ransomware attack that forced the organization to shut down its computer systems. The cyberattack, which occurred in mid-May 2025, affected operations…

US Federal Authorities Disrupt Growing Malware Pyramid Network

  A new study by Secureworks’ Counter Threat Unit (CTU) has revealed that ransomware operations have shifted significantly in response to heightened law enforcement crackdowns, forcing threat actors to evolve their strategies accordingly. There has been a tradition of many…

FBI Alert: Play Ransomware Attacks 900 Organizations

In a recent joint cybersecurity advisory released with its Australian partners, the FBI announced that the Play ransomware group has attacked over 900 organizations since May 2025. “As of May 2025, FBI was aware of approximately 900 affected entities allegedly…

The Strategic Imperatives of Agentic AI Security

In terms of cybersecurity, agentic artificial intelligence is emerging as a transformative force that is fundamentally transforming the way digital threats are perceived and handled. It is important to note that, unlike conventional artificial intelligence systems that typically operate within…

Mysterious Entity ExposedGang Exposes Cyber Criminals

An anonymous leaker is exposing the identities of the world’s most wanted cybercriminals.  Recently, a mysterious leaker exposed leaders behind Trickbot and Conti ransomware, hacking groups that are known for some of the biggest extortions in recent times.  Recently, The…

Russian Market Sells Millions of Stolen Credentials

  The “Russian Market” cybercrime marketplace has developed as one of the most popular places for purchasing and selling credentials stolen by info stealer malware. Although the marketplace has been functioning for almost six years and has grown in popularity…

Best Practices for SOC Threat Intelligence Integration

  As cyber threats become more complex and widespread, Security Operations Centres (SOCs) increasingly rely on threat intelligence to transform their defensive methods from reactive to proactive. Integrating Cyber Threat Intelligence (CTI) into SOC procedures has become critical for organisations…

How Banks Are Battling Digital Fraud

  “Unusual activity detected in your account.” A message like this, often accompanied by a suspicious link, is the new face of digital fraud. While you may pause before clicking, banks are already working behind the scenes to block such…

Critical Bug in E-commerce Website, Over 10000 Customers Impacted

WordPress plugin exploit Cybersecurity experts have found a critical unpatched security vulnerability impacting the TI WooCommerce Wishlist plugin for WordPress that unauthorized threat actors could abuse to upload arbitrary files. TI WooCommerce Wishlist has more than 100,000 active installations. It…

How Biometric Data Collection Affects Workers

  Modern workplaces are beginning to track more than just employee hours or tasks. Today, many employers are collecting very personal information about workers’ bodies and behaviors. This includes data like fingerprints, eye scans, heart rates, sleeping patterns, and even…

Want to Leave Facebook? Do this.

Confused about leaving Facebook? Many people are changing their social media habits and opting out of many services. Facebook has witnessed a large exodus of users deserting the platform after the announcement in March that Meta was terminating the independent…

Adidas Confirms Data Leak After User Service Provider Hack

  Adidas confirmed that a third-party customer service provider’s vulnerability allowed a threat actor to steal company data.  Contact details of customers who have previously dealt with the Adidas customer service help desk are among the impacted data. However, passwords,…

Vanta Customer Data Exposed Due to Code Bug at Compliance Firm

  It was discovered today that Vanta, one of the leading providers of compliance automation solutions, had experienced a critical security lapse that resulted in the unauthorised exposure of confidential customer data, which resulted from a software malfunction. An inadvertent…

TCS Investigates Possible Link to M&S Cyberattack

  Tata Consultancy Services (TCS), a leading Indian IT services firm under the Tata Group umbrella, is reportedly investigating whether its systems played any role in the recent ransomware attack that disrupted operations at British retail giant Marks & Spencer…

AI Adoption Accelerates Despite Growing Security Concerns: Report

  Businesses worldwide are rapidly embracing artificial intelligence (AI), yet a significant number remain deeply concerned about its security implications, according to the 2025 Thales Data Threat Report. Drawing insights from over 3,100 IT and cybersecurity professionals across 20 countries…

FBI Cracks Down on Dark Web Drug Dealers

  A major criminal network operating on the dark web has been disrupted in a large international operation led by the FBI. Over 270 individuals have been arrested for their involvement in the online trade of dangerous illegal drugs such…

EU Sanctions Actors Involved in Russian Hybrid Warfare

EU takes action against Russian propaganda The European Union (EU) announced sweeping new sanctions against 21 individuals and 6 entities involved in Russia’s destabilizing activities abroad, marking a significant escalation in the bloc’s response to hybrid warfare threats. European Union…

Vietnam Blocks Telegram Messaging App

  Vietnam’s technology ministry has ordered telecommunications service providers to ban the messaging app Telegram for failing to cooperate in the investigation of alleged crimes committed by its users, a move Telegram described as shocking. In a document dated May…

Governments Release New Regulatory AI Policy

Regulatory AI Policy  The CISA, NSA, and FBI teamed with cybersecurity agencies from the UK, Australia, and New Zealand to make a best-practices policy for safe AI development. The principles laid down in this document offer a strong foundation for…

Technology Meets Therapy as AI Enters the Conversation

  Several studies show that artificial intelligence has become an integral part of mental health care, changing the way practitioners deliver, document, and conceptualise therapy over the years, as well as how professionals are implementing, documenting, and even conceptualising it.…

SK Telecom Malware Breach Exposes 27 Million Phone Numbers

  Last week, South Korean telecom firm SK Telecom announced that a malware-based data breach exposed over 27 million phone numbers, jeopardising user privacy and raising concerns in the cybersecurity community. The breach apparently lasted more than three years and…

ESXi Environment Infiltrated Through Malicious KeePass Installer

Research by cybersecurity researchers has revealed that threat actors have been using tampered versions of KeePass password manager software to break into enterprise networks for several months. Researchers have discovered that this campaign has been sophisticated and ongoing for several…

M&S Faces Multi-million Lawsuit Following Major Data Breach

  Following the cyberattack that affected the retailer for a month, Marks & Spencer is reportedly facing a multimillion-pound lawsuit over the loss of customer data. It acknowledged earlier this month that customer information, including names, email addresses, postal addresses,…

Surge in Skitnet Usage Highlights Evolving Ransomware Tactics

  Today’s cyber threat landscape is rapidly evolving, making it increasingly difficult for adversaries to tell the difference between traditional malware families, as adversaries combine their capabilities to maximise their impact. Skitnet, an advanced multistage post-exploitation toolkit, is one of…

Microsoft Uncover Password Stealer Malware on 4 lakh Windows PCs

  Microsoft’s Digital Crimes Unit (DCU) and global partners have halted Lumma Stealer, one of cybercriminals’ most common info-stealing malware tools. On May 13, Microsoft and law enforcement agencies seized nearly 2,300 domains that comprise Lumma’s infrastructure, inflicting a significant…