A single line of malicious code hidden in a counterfeit npm package has exposed potentially thousands of sensitive emails every day, raising fresh alarms about software supply-chain security. The package, uploaded to npm under the name postmark-mcp, impersonated the legitimate…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Canadian Police Seize $40M in Digital Assets After Closing TradeOgre
Canadian police have shut down the cryptocurrency trading platform TradeOgre and seized digital assets valued at more than $40 million USD, marking both the country’s largest cryptocurrency seizure and the first time a crypto exchange has been dismantled by…
Medusa Ransomware Gang Offers BBC Reporter Millions for Inside Hack Access
A ransomware operation claiming affiliation with the Medusa gang attempted to recruit BBC cybersecurity correspondent Joe Tidy as an insider threat, offering him substantial financial incentives in exchange for access to the broadcaster’s systems. The threat actor, using the…
Massive Breach Allows Hackers to Steal Employee Data from the US Federal Agencies
An incident at the Federal Emergency Management Agency allowed threat actors to steal employee data from the US Customs and Border Protection and the disaster management office. The breach has allegedly triggered the removal of dozens of Federal Emergency Management…
Datzbro Android Banking Trojan Targets Seniors With Device-Takeover Attacks
Researchers have uncovered a previously undocumented Android banking trojan, dubbed Datzbro, that is being used in device-takeover campaigns aimed squarely at older adults. ThreatFabric, a Dutch mobile security firm, first tied the activity to a social-engineering network in August…
Protecting Sensitive Data When Employees Use AI Chatbots
In today’s digitised world, where artificial intelligence tools are rapidly reshaping the way people work, communicate, and work together, it’s important to be aware that a quiet but pressing risk has emerged-that what individuals choose to share with chatbots…
Cyble Flags 22 Vulnerabilities Under Active Exploitation, Including Ransomware Attacks
Cybersecurity researchers at Cyble have revealed 22 vulnerabilities currently being exploited by threat actors, with nine of them missing from the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog. In its latest blog post, Cyble…
Phishing Expands Beyond Email: Why New Tactics Demand New Defences
Phishing has long been associated with deceptive emails, but attackers are now widening their reach. Malicious links are increasingly being delivered through social media, instant messaging platforms, text messages, and even search engine ads. This shift is reshaping the…
Misconfigurations Still Fuel Most Cloud Breaches in 2025
Cloud misconfigurations persist as the foremost driver of cloud breaches in 2025, revealing deep-seated challenges in both technological and operational practices across organizations. While cloud services promise remarkable agility and scale, the complexity of modern infrastructure and oversight failures…
Fezbox npm Package Uses QR Codes to Deliver Cookie-Stealing Malware
A malicious npm package called fezbox was recently uncovered using an unusual trick: it pulls a dense QR code image from the attacker’s server and decodes that barcode to deliver a second-stage payload that steals browser cookies and credentials.…
Hackers Claim Data on 150000 AIL Users Stolen
It has been reported that American Income Life, one of the world’s largest supplemental insurance providers, is now under close scrutiny following reports of a massive cyberattack that may have compromised the personal and insurance records of hundreds of thousands…
Passkeys under threat: How a clever clickjack attack can bypass your secure login
At DEF CON 33, independent security researcher Marek Tóth revealed a new class of attack called DOM-based extension clickjacking that can manipulate browser-based password managers and, in limited scenarios, hijack passkey authentication flows. This is not a failure of…
Retail Cyberattacks Surge as Service Desks Become Prime Targets
In recent months, reports of retail data breaches have surfaced with alarming frequency, showing that both luxury and high-street retailers are under relentless attack. During the second quarter of 2025, ransomware incidents publicly disclosed in the global retail sector…
Shai-Hulud Worm Strikes: Self-Replicating Malware Infects Hundreds of NPM Packages
A highly dangerous self-replicating malware called “Shai-Hulud” has recently swept through the global software supply chain, becoming one of the largest incidents of its kind ever documented. Named after the sandworms in the Dune series, this worm has infected…
How Users Can Identify Spying on Their Wi-Fi Network
The wireless network has become a powerful invisible infrastructure that powers both homes and businesses in today’s interconnected world, silently enabling everything from personal communication to business operations. In the same way that electricity has transformed from being an…
SpamGPT: AI-Powered Phishing Tool Puts Cybersecurity at Risk
While most people have heard of ChatGPT, a new threat called SpamGPT is now making headlines. Security researchers at Varonis have discovered that this professional-grade email campaign tool is designed specifically for cybercriminals. The platform, they report, offers “all…
The Future of Cybersecurity Lies in Structure
Cybersecurity today often feels like a never-ending contest between attackers and defenders. New threats emerge, and companies respond with stronger locks and barriers. But what if security could be built so firmly into the foundation of digital systems that…
Why CEOs Must Go Beyond Backups and Build Strong Data Recovery Plans
We are living in an era where fast and effective solutions for data challenges are crucial. Relying solely on backups is no longer enough to guarantee business continuity in the face of cyberattacks, hardware failures, human error, or natural…
Retail Security Failures Driven by Service Desk Abuse
Retail is currently at a crossroads where digital transformation has redefined the very fabric of commerce. The industry has become increasingly dependent on digital technology, which has redefined commerce as we know it. As retail once revolved around physical…
AT&T Wins Legal Challenge While Verizon Faces Privacy Penalties
Major U.S. wireless carriers have faced contrasting legal outcomes in their battles against Federal Communications Commission fines for selling customer location data without consent, creating an uncertain landscape for consumer privacy protection . Background on data selling practices In…