Under research conducted by security researchers, it was discovered that a widely used door access control system includes an inherently insecure default password. Thousands of buildings across the country have insecure default passwords that can be accessed easily and…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Stalkerware: How Scammers Might Be Tracking Your Phone and What You Can Do
Spyware applications designed to secretly monitor people’s phones are becoming more common. These programs, known as stalkerware, can track private messages, calls, photos, locations, and other personal data without the user’s knowledge. Often installed without permission, they operate silently…
LightSpy Malware Attacks Users, Launches Over 100 Commands to Steal Data
Cybersecurity researchers at Hunt.io have found an updated version of LightSpy implant, a modular surveillance framework for data collection and extraction. Famous for attacking mobile devices initially, further enquiry revealed it can attack macOS, Windows, Linux, and routers. LightSpy has…
Bybit Suffers Historic $1.5 Billion Crypto Hack, Lazarus Group Implicated
Dubai-based cryptocurrency exchange Bybit Technology Ltd. has fallen victim to a massive cyberattack, with approximately $1.5 billion in cryptocurrency stolen. The breach is believed to be the largest single theft in cryptocurrency history. Bybit, a well-established exchange with over…
DM Clinical Research Database Exposed Online, Leaking 1.6M Patient Records
A clinical research database containing over 1.6 million patient records was discovered publicly accessible online without encryption or password protection. Security researcher Jeremiah Fowler found the dataset, linked to DM Clinical Research, exposing sensitive information such as names, medical…
Beware of Fake Viral Video Links Spreading Malware
McAfee Labs has uncovered a rise in cyber scams where fraudsters use fake viral video links to trick people into downloading malware. These attacks rely on social engineering, enticing users with promises of exclusive or leaked content. Once a…
Open Access to Critical Data With Bank Staff Leading to Financial Scam
A concerning trend has sent shockwaves across cybersecurity authorities, with central cyber and intelligence organisations tracking and documenting large-scale data leaks perpetrated by bank staff and third party contractors. According to a senior Indian government official, the issue has…
Call Merging Scams and Financial Security Risks with Prevention Strategies
It is not uncommon for fraudsters to develop innovative tactics to deceive their targets, with one of the latest scams being the called merging scam in which the scammers attempt to gain unauthorized access to the victim’s accounts to…
BlackLock Ransomware: The Fastest-Growing Cyber Threat and How to Stay Safe
Ransomware remains a major problem for businesses, and a new cybercriminal group is expanding at an alarming rate. Security researchers at ReliaQuest have identified BlackLock as the fastest-growing ransomware operation today, with its activity increasing by 1,425% since late…
Bybit Crypto Exchange Hacked for $1.5 Billion in Largest Crypto Heist
Bybit, one of the world’s largest cryptocurrency exchanges, has suffered a massive security breach, resulting in the loss of $1.5 billion in digital assets. The hack, now considered the largest in crypto history, compromised the exchange’s cold wallet—an offline…
Building Robust AI Systems with Verified Data Inputs
Artificial intelligence is inherently dependent on the quality of data that powers it for it to function properly. However, this reliance presents a major challenge to the development of artificial intelligence. There is a recent report that indicates that…
Role of Continuous Threat Exposure Management in Business Security
Continuous threat exposure management (CTEM) is a framework for proactively managing and mitigating threat exposure using an iterative approach that emphasises on developing structured organisational procedures as well as leveraging security tools. In this article, we’ll go over CTEM,…
Massive Banking Data Leaks Under Scrutiny as Cyber Fraud Cases Surge
A concerning rise in large-scale data breaches has put cybersecurity agencies on high alert, with central cyber and intelligence bodies actively tracking incidents linked to bank employees and third-party vendors. According to a senior government official, the matter has…
University of Notre Dame Hit by Cyberattack— Hackers Say They Stole Everything
A cybercriminal group known as Fog Ransomware has claimed responsibility for a cyberattack on the University of Notre Dame in Perth, Australia. According to reports, the group has allegedly stolen 62.2GB of sensitive data, including student medical records, staff…
Black Basta’s Slowdown Coincides with BlackLock’s Growth
The activity level of ransomware groups with “black” in their name has varied greatly over the early months of the new year. Despite the significant increase in attacks caused by the BlackLock ransomware group, the long-established Black Basta ransomware…
European Healthcare Entities Targeted With NailaoLocker Ransomware
A previously undocumented ransomware payload named NailaoLocker has been detected in assaults targeting European healthcare entities between June and October 2024. The attackers employed CVE-2024-24919, a Check Point Security Gateway vulnerability, to obtain access to targeted networks and install…
Hidden Bluetooth Security Threats and How to Protect Your Devices
Bluetooth technology has made wireless connectivity effortless, powering everything from headphones and smartwatches to home automation systems. However, its convenience comes with significant security risks. Many users unknowingly leave their devices vulnerable to cyber threats that can steal personal…
Serious Security Flaw in Exim Email Servers Could Let Hackers Steal Data
A dangerous security flaw has been discovered in Exim, a widely used email server software. The vulnerability, officially tracked as CVE-2025-26794, allows hackers to inject harmful commands into the system, potentially leading to data theft or even complete control…
Internal Chat Logs of Black Basta Ransomware Gang Leaked Online
A previously unidentified source has leaked what is claimed to be an archive of internal Matrix chat logs linked to the Black Basta ransomware group. The individual behind the leak, known as ExploitWhispers, initially uploaded the stolen messages to…
Hackers Use Invisible Unicode Trick to Hide Phishing Attacks
Cybercriminals have discovered a new way to conceal malicious code inside phishing attacks by using invisible Unicode characters. This technique, identified by Juniper Threat Labs, has been actively used in attacks targeting affiliates of a U.S. political action committee…