WhatsApp allegedly collects data The mega-messenger from Meta is allegedly collecting user data to generate ad money, according to recent attacks on WhatsApp. WhatsApp strongly opposes these fresh accusations, but it didn’t help that a message of its own appeared…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Bluetooth Security Risks: Why Leaving It On Could Endanger Your Data
Bluetooth technology, widely used for wireless connections across smartphones, computers, health monitors, and peripherals, offers convenience but carries notable security risks—especially when left enabled at all times. While Bluetooth security and encryption have advanced over decades, the protocol remains…
Why It’s Time to Stop Saving Passwords in the Browser
As convenience often takes precedence over caution in the digital age, the humble “Save Password” prompt has quietly become one of the most overlooked security traps of the digital age, one of the most overlooked security threats. The number…
AI’s Hidden Weak Spot: How Hackers Are Turning Smart Assistants into Secret Spies
As artificial intelligence becomes part of everyday life, cybercriminals are already exploiting its vulnerabilities. One major threat shaking up the tech world is the prompt injection attack — a method where hidden commands override an AI’s normal behavior, turning…
New Google Study Reveals Threat Protection Against Text Scams
As Cybersecurity Awareness Month comes to an end, we’re concentrating on mobile scams, one of the most prevalent digital threats of our day. Over $400 billion in funds have been stolen globally in the past 12 months as a result…
University of Pennsylvania Hit by Hackers: Fake Emails, Data Leak Threats, and Political Backlash
The University of Pennsylvania is investigating a cybersecurity incident after unknown hackers gained access to internal email accounts and sent thousands of misleading messages to students, alumni, and staff on Friday morning. The fraudulent emails, which appeared to come…
UK Digital ID Faces Security Crisis Ahead of Mandatory Rollout
The UK’s digital ID system, known as One Login, triggered major controversy in 2025 due to serious security vulnerabilities and privacy concerns, leading critics to liken it to the infamous Horizon scandal. One Login is a government-backed identity verification…
European Governments Turn to Matrix for Secure Sovereign Messaging Amid US Big Tech Concerns
A growing number of European governments are turning to Matrix, an open-source messaging architecture, as they seek greater technological sovereignty and independence from US Big Tech companies. Matrix aims to create an open communication standard that allows users to…
Security Researchers at Proton Warn of Massive Credential Exposure
Data is becoming the most coveted commodity in the ever-growing digital underworld, and it is being traded at an alarming rate. In a recent investigation conducted by Proton, it has been revealed that there are currently more than 300…
TRAI Approves Caller Name Display Feature to Curb Spam and Fraud Calls
The Telecom Regulatory Authority of India (TRAI) has officially approved a long-awaited proposal from the Department of Telecommunications (DoT) to introduce a feature that will display the caller’s name by default on the receiver’s phone screen. Known as the…
Akira Ransomware Claims 23GB Data Theft in Alleged Apache OpenOffice Breach
The Akira ransomware group has reportedly claimed responsibility for breaching Apache OpenOffice, asserting that it stole 23 gigabytes of sensitive internal data from the open-source software foundation. The announcement was made on October 29 through Akira’s dark web leak…
Deepfake of Finance Minister Lures Bengaluru Homemaker into ₹43.4 Lakh Trading Scam
A deceptive social media video that appeared to feature Union Finance Minister Nirmala Sitharaman has cost a Bengaluru woman her life’s savings. The 57-year-old homemaker from East Bengaluru lost ₹43.4 lakh after being persuaded by an artificial intelligence-generated deepfake that…
TP-Link Routers May Get Banned in US Due to Alleged Links With China
TP-Link routers may soon shut down in the US. There’s a chance of potential ban as various federal agencies have backed the proposal. Alleged links with China The news first came in December last year. According to the WSJ, officials…
Zero STT Med Sets New Benchmark in Clinical Speech Recognition Efficiency
Shunyalabs.ai has taken a decisive step into transforming medical transcription and clinical documentation by introducing Zero STT Med, a powerful automatic speech recognition (ASR) system developed especially for the medical and clinical fields. Shunyalabs.ai is a pioneer in enterprise-grade…
CISA Warns: Linux Kernel Flaw Actively Exploited in Ransomware Attacks
A critical Linux kernel vulnerability (CVE-2024-1086) is now actively exploited in ransomware attacks, according to a recent update from the U.S. Cybersecurity and Infrastructure Security Agency (CISA). First publicly disclosed on January 31, 2024, this flaw stems from a…
Nearly 50% of IoT Device Connections Pose Security Threats, Study Finds
A new security analysis has revealed that nearly half of all network communications between Internet of Things (IoT) devices and traditional IT systems come from devices that pose serious cybersecurity risks. The report, published by cybersecurity company Palo Alto…
Ransomware Surge Poses Geopolitical and Economic Risks, Warns Joint Cybersecurity Report
A new joint report released this week by Northwave Cyber Security and Marsh, a division of Marsh McLennan, warns that ransomware attacks targeting small and medium-sized businesses have sharply increased, creating serious geopolitical, economic, and national security concerns. Northwave…
Google Chrome to Show Stronger Warnings for Insecure HTTP Sites Starting October 2025
Google is taking another major step toward a safer web experience. Starting October 2025, Google Chrome will begin displaying clearer and more prominent warnings when users access public websites that do not use HTTPS encryption. The move is part…
Hackers Exploit AI Stack in Windows to Deploy Malware
The artificial intelligence (AI) stack built into Windows can act as a channel for malware transmission, a recent study has demonstrated. Using AI in malware Security researcher hxr1 discovered a far more conventional method of weaponizing rampant AI in a…
WhatsApp’s “We See You” Post Sparks Privacy Panic Among Users
WhatsApp found itself in an unexpected storm this week after a lighthearted social media post went terribly wrong. The Meta-owned messaging platform, known for emphasizing privacy and end-to-end encryption, sparked alarm when it posted a playful message on X…