A sophisticated cybercriminal technique called fast flux is being increasingly employed by cybercriminals, which is causing heightened concerns among intelligence agencies and cybersecurity agencies throughout the world. It has been reported in April 2025 that the United States National…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Pakistan State-sponsored Hackers Attack Indian Websites, Attempts Blocked
Pakistan’s cyber warfare against India Recently, Pakistan state-sponsored hacker groups launched multiple failed hacking attempts to hack Indian websites amid continuous cyber offensives against India after the Pahalgam terror attack. These breach attempts were promptly identified and blocked by the…
Bitdefender Warns of Surge in Subscription Scams Disguised as Online Stores and Mystery Boxes
Cybersecurity researchers at Bitdefender have uncovered a sharp increase in deceptive online subscription scams, with fraudsters disguising themselves as legitimate e-commerce platforms and mystery box vendors. These sophisticated schemes are luring unsuspecting users into handing over sensitive credit card…
North Korean Hackers Create Fake U.S. Firms to Dupe Crypto Developers
Threat analysts at Silent Push, a U.S. cybersecurity firm, told Reuters that North Korean cyber spies established two companies in the U.S., Blocknovas LLC and Softglide LLC, using fictitious personas and addresses to infect developers in the cryptocurrency industry…
Many Internet Users Suffer Account Breaches Due to Weak Passwords, Study Finds
A recent study has shown that more than one in three people have had at least one of their online accounts broken into during the past year. The main reason? Poor or stolen passwords. The report comes from the…
Coinbase Fixes Account Log Bug That Mistakenly Triggered 2FA Breach Alerts
Coinbase has resolved a logging issue in its system that led users to wrongly believe their accounts had been compromised, after failed login attempts were mistakenly labeled as two-factor authentication (2FA) failures. As first uncovered by BleepingComputer, the bug…
New Report Reveals Hackers Now Aim for Money, Not Chaos
Recent research from Mandiant revealed that financially motivated hackers are the new trend, with more than (55%) of criminal gangs active in 2024 aiming to steal or extort money from their targets, a sharp rise compared to previous years. About…
Think That Job Offer on LinkedIn Is Real? Not Without This Badge
LinkedIn has taken a major step toward improving online safety by extending its identity verification feature beyond its own platform. This update is part of the company’s ongoing efforts to help users avoid fake profiles and internet scams, especially…
Hacker Calls Pahalgam Incident “Inside Job” on Rajasthan Education Department Website
Earlier this week, the Rajasthan education department’s official website was hacked, with a statement ridiculing the Indian government over Pakistan’s detention of Indian Air Force commander Abhinandan Varthaman in 2019. The hackers attacked the homepage with a provocative message…
Rhysida Ransomware Group Leaks 1.3M Files Stolen from Oregon DEQ After Failed Extortion Attempt
A major ransomware breach has rocked the Oregon Department of Environmental Quality (DEQ), with over 1.3 million files—amounting to 2.4 terabytes—dumped online by the cybercriminal group Rhysida. The stolen data, now circulating on the dark web, reportedly includes confidential…
Large-Scale Data Breach at Frederick Health Exposes Patient Records
Two separate ransomware incidents have recently affected healthcare providers in Maryland and California and exposed sensitive information belonging to more than 1.1 million patients as a result, according to disclosures filed with federal regulators that recently broke the story.…
Android Spyware Concealed in Mapping App Targets Russian Military
Doctor Web researchers discovered a new spyware, tracked as Android. Spy.1292.origin, targets Russian military people. The malicious code was concealed in a trojanized Alpine Quest app and distributed via Russian Android catalogues. The malware acquires contacts, geolocation, and file…
Over 21 Million Employee Screenshots Leaked from WorkComposer Surveillance App
An app designed to track employee productivity by logging keystrokes and taking screenshots has suffered a significant privacy breach as more than 21 million images of employee activity were left in an unsecured Amazon S3 bucket. An app for tracking…
Malware Hides in Fake PDF to DOCX Converters to Target Crypto Wallets and Steal Data
Cybercriminals have launched a deceptive malware campaign that disguises itself as online file converters, specifically targeting users searching for PDF to DOCX tools. This scheme uses convincing replicas of popular converter sites to execute hidden PowerShell scripts and deploy…
Millions Affected by Suspected Data Leak at Major Electronics Chain
Cybersecurity experts and users alike are worried about a recent report that the hacking group ShinyHunters is offering more stolen data on the darknet marketplace in a concerning development. It has been reported that the group is attempting to…
Trump Claims Administration Learnt to Avoid Signal After Group Chat Leak
President Donald Trump stated that his administration has learnt from Signalgate. “I think we learnt: Maybe don’t use Signal, okay?” Trump spoke about the messaging app in an interview with The Atlantic published Monday. “If you want to know…
Cybercriminals Behind DOGE Big Balls Ransomware Demand $1 Trillion, Troll Elon Musk
A cybercrime group notorious for its outrageous tactics has resurfaced with a ransomware attack demanding an unbelievable $1 trillion from its victims. The group, responsible for the DOGE Big Balls ransomware campaign, has updated its ransom demands with bizarre…
Firewalls and VPNs Under Siege as Businesses Report Growing Cyber Intrusions
A security researcher has discovered an ongoing cyberattack that is active, exploiting a newly discovered vulnerability in Fortinet’s FortiGate Firewalls to infiltrate corporate and enterprise networks and has been conducting this activity for some time. A security advisory published…
Don’t Delete Spam Emails Too Quickly — Here’s Why
Most of us delete spam emails as soon as they land in our inbox. They’re irritating, unwanted, and often contain suspicious content. But what many people don’t know is that keeping them, at least briefly can actually help improve…
Scientists Warn of Cybersecurity Threats in Next-Gen DNA Sequencing
Next-generation DNA sequencing (NGS) is under increasing criticism for its cyber risks. While NGS has transformed disciplines ranging from cancer diagnosis to infectious disease tracking, a recent study warns that the platforms that enable these advancements could also be…
Google Ends Privacy Sandbox, Keeps Third-Party Cookies in Chrome
Google has officially halted its years-long effort to eliminate third-party cookies from Chrome, marking the end of its once-ambitious Privacy Sandbox project. In a recent announcement, Anthony Chavez, VP of Privacy Sandbox, confirmed that the browser will continue offering…
Investigating the Role of DarkStorm Team in the Recent X Outage
It has been reported that Elon Musk’s social media platform, X, formerly known as Twitter, was severely disrupted on Monday after a widespread cyberattack that has caused multiple service disruptions. Data from outage monitoring service Downdetector indicates that at…
Millions at Risk as Malicious Actors Hijack Popular YouTube Accounts
At a startling rate, cybercriminals are taking over well-known YouTube channels, exposing viewers to malware, frauds, and data theft. With billions of views and millions of followers at risk, a single mistake can have disastrous results. According to new…
North Korean Hacker Group Targets Cryptocurrency Developers via LinkedIn
A North Korean threat group known as Slow Pisces has launched a sophisticated cyberattack campaign, focusing on developers in the cryptocurrency industry through LinkedIn. Also referred to as TraderTraitor or Jade Sleet, the group impersonates recruiters offering legitimate job…
Chinese Ghost Hackers Focus on Profits, Attack Key Sectors in the US and UK
In the world of cybercrime, criminals usually fall into two groups. Some target individuals, tricking them for money. Others go after important organizations like hospitals and companies, hoping for bigger payouts. Although attacks on healthcare are less common, they…
SK Telecom Malware Attack Exposes USIM Data in South Korea
SK Telecom, South Korea’s top mobile carrier, has disclosed a security incident involving a malware infection that exposed sensitive information tied to users’ Universal Subscriber Identity Modules (USIMs). The breach was detected on the night of April 19, 2025,…
Zoom Platform Misused by Elusive Comet Attackers in Fraud Scheme
Recent reports suggest that North Korean threat actors are now employing an alarming evolution in the tactics they employ to launch a sophisticated cybercrime operation known as Elusive Comet, a sophisticated cybercrime operation. This newly uncovered campaign demonstrates a…
Cybersecurity Alert Says Fake PDF Converters Stealing Sensitive Information
Online PDF converters provide efficient conversions of documents from one file format to another, and millions of individuals and businesses use these services to do so. However, this free service also poses significant cybersecurity risks despite its convenience. According…
How to Protect Your Smartphone During US Border Crossings
Crossing into the United States has become riskier since the start of Trump’s second administration. Foreign visitors and US visa holders are increasingly being detained, questioned, or deported. As uncertainty grows, travel demand from Canada and Europe has dropped…
‘Fog’ Attackers Mock Victims With DOGE Ransom Notes
Fog ransomware assaults over the last month have included a new ransom note mentioning the US Department of Government Efficiency (DOGE) and enticing victims to propagate the malware to other PCs, Trend Micro said earlier this week. Analysis of…
Cybercriminals Are Now Focusing More on Stealing Credentials Than Using Ransomware, IBM Warns
A new report from IBM’s X-Force 2025 Threat Intelligence Index shows that cybercriminals are changing their tactics. Instead of mainly using ransomware to lock systems, more hackers are now trying to quietly steal login information. IBM studied over 150…
Tesla Users Targeted by Dangerous New Malware: What You Should Know
Tesla has often made headlines lately, but this new problem is not connected to Elon Musk or his cars. Instead, it involves cybercriminals who are trying to steal people’s private information using a dangerous software called Agent Tesla. Here’s…
Pentagon Director Hegseth Revealed Key Yemen War Plans in Second Signal Chat, Source Claims
In a chat group that included his wife, brother, and personal attorney, U.S. Defence Secretary Pete Hegseth provided specifics of a strike on Yemen’s Iran-aligned Houthis in March, a person familiar with the situation told Reuters earlier this week. …
Pune Company Falls Victim to ₹6.49 Crore Cyber Fraud in Major Man-in-the-Middle Attack
A 39-year-old director of a Mohammedwadi-based firm, which operates in IT services and dry fruit imports, was duped into transferring ₹6.49 crore following a sophisticated Man-in-the-Middle (MitM) cyberattack on March 27. In a MitM scam, cybercriminals secretly intercept communications…
Preventing Unauthorised Recovery of Deleted Files
As far as users are concerned, once a file is removed from their computer, it is forever gone. However, the reality is more complex. The likelihood of recovering a deleted file depends on how it was deleted, as well…
ClickFix Attacks: North Korea, Iran, Russia APT Groups Exploit Social Engineering for Espionage
ClickFix attacks are rapidly becoming a favored tactic among advanced persistent threat (APT) groups from North Korea, Iran, and Russia, particularly in recent cyber-espionage operations. This technique involves malicious websites posing as legitimate software or document-sharing platforms. Targets are enticed…
Rise in Data-Stealing Malware Targeting Developers, Sonatype Warns
A recent report released on April 2 has uncovered a worrying rise in open-source malware aimed at developers. These attacks, described as “smash and grab” operations, are designed to swiftly exfiltrate sensitive data from development environments. Brian Fox, co-founder…
Eight Arrested Over Financial Scam Using Deepfakes
Hong Kong police have detained eight people accused of running a scam ring that overcame bank verification checks to open accounts by replacing images on lost identification cards with deepfakes that included scammers’ facial features. Senior Superintendent Philip Lui…
How Clearing Digital Mess Can Help You Save Money and Feel Better
Many people today are struggling with digital clutter. This means having too many files, photos, apps, and emails saved on phones or computers. A new survey shows that more than three out of four people have more digital data…
New Android Threat Raises Concern Over NFC Relay Attack Vulnerabilities
In recent times, there has been considerable concern with regards to some newly uncovered Android-based malware-as-a-service (Maas) platforms, particularly those based on Android and known as SuperCard X. This is because this platform was able to execute these attacks…
Interlock Ransomware Gang Deploys ClickFix Attacks to Breach Corporate Networks
Cybersecurity researchers have revealed that the Interlock ransomware gang has adopted a deceptive social engineering technique called ClickFix to infiltrate corporate networks. This method involves tricking users into executing malicious PowerShell commands under the guise of resolving system errors…
Symantec Links Betruger Backdoor Malware to RansomHub Ransomware Attacks
A sophisticated custom backdoor malware called Betruger has been discovered in recent ransomware campaigns, with Symantec researchers linking its use to affiliates of the RansomHub ransomware-as-a-service (RaaS) group. The new malware is considered a rare and powerful tool designed…
Over 16,000 Fortinet Devices Infected With the Symlink Backdoor
Over 16,000 internet-connected Fortinet devices have been identified as having a new symlink backdoor that permits read-only access to sensitive data on previously compromised systems. The Shadowserver Foundation, a threat monitoring platform, has stated that 14,000 machines were exposed.…
Cyber Vigilantes Strike Again as Anonymous Reportedly Leaks 10TB of Sensitive Russian Data
It has been a dramatic turn in the cyber world for the globally recognised hacktivist collective Anonymous in the last few days, with the claim that a colossal data breach has been perpetrated against the Russian government and its…
Cyberattacks Hit U.S. Healthcare Firms, Exposing Data of Over 236,000 People
Two separate data breaches in the U.S. have exposed sensitive information of more than 236,000 people. These incidents involve two organizations: Endue Software in New York and Medical Express Ambulance (MedEx) in Illinois. Endue Software creates software used by…
Explaining AI’s Impact on Ransomware Attacks and Businesses Security
Ransomware has always been an evolving menace, as criminal outfits experiment with new techniques to terrorise their victims and gain maximum leverage while making extortion demands. Weaponized AI is the most recent addition to the armoury, allowing high-level groups…
Unexpected 4Chan Downtime Leads to Cybersecurity Speculation
There has been a significant breach of security at 4chan recently, which has been widely reported. According to several online sources, a hacker may have managed to penetrate the platform’s internal systems after successfully infiltrating the platform’s anonymous and…
SBI Issues Urgent Warning Against Deepfake Scam Videos Promoting Fake Investment Schemes
The State Bank of India (SBI) has issued an urgent public advisory warning customers and the general public about the rising threat of deepfake scam videos. These videos, circulating widely on social media, falsely claim that SBI has launched…
Landmark Admin Hack: Massive Data Leak Hits 1.6 Million Americans
Landmark Admin, a company based in Texas that works with insurance firms across the country, has shared new details about a cyberattack it suffered last year. According to the latest update, the number of people whose personal data may…
Security Analysts Express Concerns Over AI-Generated Doll Trend
If you’ve been scrolling through social media recently, you’ve probably seen a lot of… dolls. There are dolls all over X and on Facebook feeds. Instagram? Dolls. TikTok? You guessed it: dolls, as well as doll-making techniques. There are…
Top U.S. Banks Cut Off Digital Data Sharing With OCC After Major Cyberattack
Several of the largest banks in the United States have curtailed or reassessed how they share sensitive data with the Office of the Comptroller of the Currency (OCC), after a significant cyberattack compromised the regulator’s email system. According to…
Identity Theft Concerns Rise as USPS Flags Suspicious Package Deliveries
Recently, the United States Postal Service (USPS) issued an advisory in which it advised citizens to be more vigilant in light of an increase in sophisticated mail fraud schemes. In addition to the deceptive activities that have notably increased…
DaVita Faces Ransomware Attack, Disrupting Some Operations but Patient Care Continues
Denver-headquartered DaVita Inc., a leading provider of kidney care and dialysis services with more than 3,100 facilities across the U.S. and 13 countries, has reported a ransomware attack that is currently affecting parts of its network. The incident, disclosed…
Gmail Users Face a New Dilemma Between AI Features and Data Privacy
Google’s Gmail is now offering two new upgrades, but here’s the catch— they don’t work well together. This means Gmail’s billions of users are being asked to pick a side: better privacy or smarter features. And this decision could…
Black Basta: Exposing the Ransomware Outfit Through Leaked Chat Logs
The cybersecurity sector experienced an extraordinary breach in February 2025 that revealed the inner workings of the well-known ransomware gang Black Basta. Trustwave SpiderLabs researchers have now taken an in-depth look at the disclosed contents, which explain how the…
Silicon Valley Crosswalk Buttons Hacked With AI Voices Mimicking Tech Billionaires
A strange tech prank unfolded across Silicon Valley this past weekend after crosswalk buttons in several cities began playing AI-generated voice messages impersonating Elon Musk and Mark Zuckerberg. Pedestrians reported hearing bizarre and oddly personal phrases coming from…
GPS Spoofing Emerges as a Serious Risk for Civil and Military Applications
The growing reliance on satellite-based navigation systems by modern aviation has raised serious concerns among global aviation authorities about the threat to the integrity of these systems that are emerging. As one such threat, GPS spoofing, is rapidly gaining…
Google Plans Big Messaging Update for Android Users
Google is preparing a major upgrade to its Messages app that will make texting between Android and iPhone users much smoother and more secure. For a long time, Android and Apple phones haven’t worked well together when it comes…
ProtectEU and VPN Privacy: What the EU Encryption Plan Means for Online Security
Texting through SMS is pretty much a thing of the past. Most people today rely on apps like WhatsApp and Signal to share messages, make encrypted calls, or send photos—all under the assumption that our conversations are private. But…
PDPC Probes Bangchak Data Breach Impacting 6.5 Million Records
A major data breach involving Bangchak Corporation Public Company Limited is being swiftly investigated by Thailand’s Personal Data Protection Committee (PDPC). The company stated that unauthorised access to its customer feedback system had affected roughly 6.5 million records. A…
TP-Link Outlines Effective Measures for Preventing Router Hacking
The presentation of a TP-Link Wi-Fi router by Representative Raja Krishnamoorthi of Illinois to Congress was one of the rare displays that highlighted increasing national security concerns on March 5. As a result of the congressman’s stark warning —…
QR Code Frauds Growing Fast in the UK: What You Should Know
A new kind of digital scam is spreading across the UK, where criminals trick people using fake QR codes. This type of scam is called “quishing,” and it has been growing quickly. In 2023, there were over 1,300 reports…
Russian Attackers Target military mission in Ukraine With Info-Stealing Malware
Gamaredon, a Russia-backed threat group renowned for distributing malware via phishing emails, recently appears to have utilised an infected portable drive to target a Ukrainian-based military mission of an undisclosed Western country. The malware was an updated version of…
Best Encrypted Messaging Apps: Signal vs Telegram vs WhatsApp Privacy Guide
Encrypted messaging apps have become essential tools in the age of cyber threats and surveillance. With rising concerns over data privacy, especially after recent high-profile incidents, users are turning to platforms that offer more secure communication. Among the top…
Increasing Exploitation of Remote Access Tools Highlights Ransomware Risks
Among the latest findings from cybersecurity insurance provider At-Bay, ransomware incidents witnessed a significant resurgence in 2024, with both the frequency and the severity of these attacks escalating significantly. Based on the firm’s 2025 InsurSec Report, ransomware activity rose…
Majority of Human-Operated Cyberattacks Target Domain Controllers, Warns Microsoft
Microsoft has revealed that nearly 80% of human-operated cyberattacks involve compromised domain controllers, according to a recent blog post published on Wednesday. Alarmingly, in over 30% of these incidents, attackers use the domain controller—a central system in corporate IT…
Over 1.6 Million Affected in Planned Parenthood Lab Partner Data Breach
A cybersecurity breach has exposed the confidential health data of more than 1.6 million individuals—including minors—who received care at Planned Parenthood centers across over 30 U.S. states. The breach stems from Laboratory Services Cooperative (LSC), a company providing lab…
SpyNote Malware Targets Android Users with Fraudulent Google Play Pages
The notorious SpyNote malware is making a comeback thanks to a novel campaign. This remote access trojan has many malicious features and is also quite challenging to remove from an infected Android smartphone. According to security researchers, this time…
Fourlis Group Confirms €20 Million Loss from IKEA Ransomware Attack
Fourlis Group, the retail operator responsible for IKEA stores across Greece, Cyprus, Romania, and Bulgaria, has revealed that a ransomware attack targeting its systems in late November 2024 led to significant financial losses. The cyber incident, which coincided with…
Hackers Target WordPress Plugin Just Hours After Security Weakness Revealed
A newly found security issue in a widely used WordPress tool called OttoKit (previously called SureTriggers) has opened the door for cybercriminals to take over websites. Within just a few hours of the problem being shared publicly, hackers began…
ESET Security Tool Vulnerability Facilitates TCESB Malware Deployment
The threat actor “ToddyCat,” a Chinese-linked threat actor, is being observed exploiting a vulnerability in ESET security software to spread a newly discovered malware strain known as TCESB, a new strain that has recently been discovered. In a recent study…
Serious Flaw Found in Popular File-Sharing Tool Used by IT Providers
A major security problem has been found in a widely used file-sharing platform, and hackers have already started taking advantage of it. This tool, called CentreStack, is often used by IT service providers to help businesses manage and share…
US Tariffs May Lead to Chinese Cyberattacks in Retaliation, Experts Warn
As the trade battle between the United States and China heats up, some cybersecurity and policy experts fear Beijing could retaliate in cyberspace. Shortly after the US raised its tax on imported Chinese goods to 104 percent on Wednesday…
Understanding ACR on Smart TVS and the Reasons to Disable It
Almost all leading TV models in recent years have been equipped with Automatic Content Recognition (ACR), a form of advanced tracking technology designed to analyse and monitor viewing habits that is a key component of most television sets. As…
Ransomware Attacks Surge in Q1 2025 as Immutable Backup Emerges as Critical Defense
Ransomware attacks have seen a dramatic rise in the first quarter of 2025, with new research from Object First revealing an 84% increase compared to the same period in 2024. This alarming trend highlights the growing sophistication and frequency of…
Critical Infrastructure at Risk: Why OT-IT Integration is Key to Innovation and Cybersecurity
As cyberattacks grow more advanced, targeting the essential systems of modern life—from energy pipelines and manufacturing plants to airports and telecom networks—governments are increasing pressure on industries to fortify their digital and physical defenses. A series of high-profile breaches,…
Oracle Faces Data Leak Claims, Clarifies Cloud Services Remain Safe
Oracle has informed its users that a recent cyberattack only affected two outdated servers that are no longer in use. These systems were separate from Oracle’s main cloud services, and the company says that no active customer data or…
Microsoft: CLFS Zero-Day Flaw Exploited in Ransomware Attacks
Ransomware attackers abused a zero-day flaw in a widely used Windows logging system for managing transactional information to launch attacks against organisations in the US real estate sector, Microsoft revealed Tuesday. In a blog post, the tech giant stated…
Smokeloader Malware Clients Detained as Police Seize Critical Servers
It has been reported that law enforcement agencies across Europe and North America have made additional arrests to dismantle the illicit ecosystem supporting malware distribution and deployment as part of a wider global effort. As part of Operation Endgame,…
Windows CLFS Zero-Day CVE-2025-29824 Exploited by Ransomware Group Storm-2460
A newly disclosed Windows zero-day vulnerability, tracked as CVE-2025-29824, is being actively exploited in cyberattacks to deliver ransomware, Microsoft has warned. This flaw affects the Windows Common Log File System (CLFS) driver and enables local privilege escalation—a method often…
AI-Powered Tools Now Facing Higher Risk of Cyberattacks
As artificial intelligence becomes more common in business settings, experts are warning that these tools could be the next major target for online criminals. Some of the biggest software companies, like Microsoft and SAP, have recently started using AI…
Fake Microsoft Office Add-Ins Targeting Crypto Transactions
The attackers are leveraging SourceForge to distribute fraudulent Microsoft add-ins that install malware on victims’ PCs to mine and siphon crypto. SourceForge.net is a legitimate software hosting and distribution platform that also offers version control, issue tracking, and dedicated…
Building Smarter AI Through Targeted Training
In recent years, artificial intelligence and machine learning have been in high demand across a broad range of industries. As a consequence, the cost and complexity of constructing and maintaining these models have increased significantly. Artificial intelligence and machine…
WhatsApp Windows Vulnerability CVE-2025-30401 Could Let Hackers Deliver Malware via Fake Images
Meta has issued a high-priority warning about a critical vulnerability in the Windows version of WhatsApp, tracked as CVE-2025-30401, which could be exploited to deliver malware under the guise of image files. This flaw affects WhatsApp versions prior to…
New Virus Spreading Through YouTube Puts Windows Users at Risk
A new type of digital threat is quietly spreading online, and it’s mainly affecting people who use Windows computers. This threat, called Neptune RAT, is a kind of harmful software that allows hackers to take over someone’s system from…
US regulator OCC Claims Email Hack Exposed Sensitive Bank Details
The US Office of the Comptroller of the Currency (OCC), a key banking regulator, officially classified a significant breach of its email system as a “major information security incident” after learning that malicious actors accessed highly sensitive bank supervisory…
Cybercriminals Target QuickBooks Users with Phishing Attacks via Google Ads Ahead of Tax Deadline
With the April 15 U.S. tax deadline looming, millions of users are logging in to manage their finances online—unfortunately, cybercriminals are watching too. Leveraging this surge in digital activity, attackers are exploiting trusted platforms like Google to deceive users…
FBI Operated ElonmuskWHM: Undercover Money Laundering Site That Handled $90M in Crypto
In a bold and controversial move, the FBI operated a money laundering platform on the dark web under the alias “ElonmuskWHM,” aiming to infiltrate the criminal ecosystem it served. According to an investigation by 404 Media, the FBI’s undercover…
Hackers Demand $4 Million After Alleged NASCAR Data Breach.
The motorsports industry has recently been faced with troubling news that NASCAR may have become the latest high-profile target for a ransomware attack as a result of the recent hackread.com report. According to the organization’s internal systems being breached…
Malicious PyPi Package ‘disgrasya’ Exploits WooCommerce Stores for Card Fraud, Downloaded Over 34,000 Times
A newly uncovered malicious Python package on PyPi, named ‘disgrasya’, has raised serious concerns after it was discovered exploiting WooCommerce-powered e-commerce sites to validate stolen credit card information. Before its removal, the package had been downloaded more than 34,000…
Researchers Unearth a Massive Data Leak Within Apollo Hospitals
For security analysts Akshay and Viral, a casual check of a healthcare system’s security quickly turned into a huge finding. The duo discovered a major data leak at Apollo Hospitals, one of India’s leading hospital networks. The breach first…
Cybercriminal Group’s Website Taken Over by Unknown Hacker
A criminal group known for using ransomware was recently caught off guard when its own website was tampered with. The website, which the gang normally uses to publish stolen data from their victims, was replaced with a short message…
Europcar GitLab Breach Exposes Sensitive User Data and Configuration Files
A cybersecurity breach allegedly targeting Europcar has brought attention to vulnerabilities in corporate development platforms. A threat actor operating under the alias “Europcar” recently claimed on an underground forum that they had gained unauthorized access to the car rental…
New Sec-Gemini v1 from Google Outperforms Cybersecurity Rivals
A cutting-edge artificial intelligence model developed by Google called Sec-Gemini v1, a version of Sec-Gemini that integrates advanced language processing, real-time threat intelligence, and enhanced cybersecurity operations, has just been released. With the help of Google’s proprietary Gemini large…
Karnataka Sets Up India’s First Cyber Command Centre to Tackle Online Crimes
Karnataka has taken a big step to fight the rising number of online crimes. It has launched the country’s first Cyber Command Centre. This new centre will handle all matters related to cyber safety and crime under one roof.…
Why Personal Identity Should Remain Independent of Social Platforms
Digital services are now as important as other public utilities such as electricity and water in today’s interconnected world. It is very important for society to expect a similar level of consistency and quality when it comes to these…
Generative AI Fuels Identity Theft, Aadhaar Card Fraud, and Misinformation in India
A disturbing trend is emerging in India’s digital landscape as generative AI tools are increasingly misused to forge identities and spread misinformation. One user, Piku, revealed that an AI platform generated a convincing Aadhaar card using only a name,…
WinRAR Bug Circumvents Windows Mark of Web Security Notifications.
A security flaw in the WinRAR file archiver solution might be used to circumvent the Mark of the Web (MotW) security warning and execute arbitrary code on a Windows computer. The vulnerability is known as CVE-2025-31334 and impacts all…
Ethical Hacking: The Cyber Shield Organizations Need
Ethical hacking may sound paradoxical, but it’s one of the most vital tools in modern cyber defence. Known as white hat hackers, these professionals are hired by companies to simulate cyberattacks, uncover vulnerabilities, and help fix them before malicious…
Meta Launches New Llama 4 AI Models
Meta has introduced a fresh set of artificial intelligence models under the name Llama 4. This release includes three new versions: Scout, Maverick, and Behemoth. Each one has been designed to better understand and respond to a mix of…