A growing conversation around restricting social media access for children under 16 is gaining traction across India, with several state leaders reviewing regulatory models adopted overseas — particularly in Australia. Ministers from at least two southern states have indicated…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Fraudsters Use Postal Mail to Target Crypto Hardware Wallet Owners
Cybercriminals are using traditional mail services to target cryptocurrency users who own hardware wallets manufactured by Trezor and Ledger. The attackers are distributing printed letters that falsely present themselves as official security notifications and attempt to trick recipients into revealing…
Inspector Satellites and Orbital Security Risks in Modern Space Infrastructure
Not far from familiar orbits, small satellites labeled as inspectors are starting to raise questions about safety above Earth. Lately, signs point to Russian vehicles moving near critical communication platforms – moves seen as unusually close by many experts.…
ShinyHunters Leak Exposes Harvard and UPenn Personal Data
Hacking group ShinyHunters has reportedly published more than a million records stolen from Harvard University and the University of Pennsylvania (UPenn) on its dark web site, putting a vast trove of sensitive personal data within reach of cybercriminals worldwide.…
Infostealer Breach Exposes OpenClaw AI Agent Configurations in Emerging Cyber Threat
Cybersecurity experts have uncovered a new incident in which an information-stealing malware successfully extracted sensitive configuration data from OpenClaw, an AI agent platform previously known as Clawdbot and Moltbot. The breach signals a notable expansion in the capabilities of…
Hackers Leak 600000 Customer Records as Canada Goose Opens Investigation
Luxury retail is a rarefied industry where reputations travel faster than seasonal collections. Canada Goose, a brand associated with Arctic-quality craftsmanship and premium exclusivity, is now facing scrutiny from an unexpected part of the internet. In a cyber incident…
More U.S. Investors Join Legal Dispute With South Korea Over Coupang Data Breach
A fresh wave of U.S.-based investment firms has joined an ongoing legal confrontation with the government of South Korea over its handling of a large scale cybersecurity incident involving Coupang. On February 11, it was confirmed that three additional…
ClickFix Campaigns Exploit Claude Artifacts to Target macOS Users with Infostealers
One out of every hundred Mac users searching online might now face hidden risks. Instead of helpful tools, some find traps disguised as guides – especially when looking up things like “DNS resolver” or “HomeBrew.” Behind these results, attackers…
Volvo Hit in Conduent Breach Affecting 25 Million
A major data breach at business services provider Conduent has spiraled into a large-scale security incident affecting at least 25 million people across the United States, with Volvo Group North America among the latest victims. The breach, originally disclosed…
Microsoft Uncovers DNS-Based ClickFix Variant as Stealer Campaigns Escalate Across Windows and macOS
Microsoft has revealed a new evolution of the ClickFix social engineering technique, where attackers manipulate users into executing commands that initiate a Domain Name System (DNS) lookup to fetch a secondary malicious payload. In this updated approach, threat actors…
New ClickFix Campaign Uses Nslookup to Fetch Malicious PowerShell Script
According to Microsoft, the ClickFix social engineering technique has evolved in a refined manner, emphasizing that even the most common software applications can be repurposed into covert channels for malware distribution. Using this latest iteration, hackers are no longer…
Google Links CANFAIL Malware Attacks to Suspected Russia-Aligned Group
A newly identified cyber espionage group has been linked to a wave of digital attacks against Ukrainian institutions, according to findings released by the Google Threat Intelligence Group. Investigators say the activity involves a malware strain tracked as CANFAIL…
Iron Man Data Breach Only Impacted Marketing Resources
Data storage and recovery services company ‘Iron Mountain’ suffered a data breach. Extortion gang ‘Everest’ was behind the breach. Iron Mountain said the breach was limited to marketing materials. The company specializes in records management and data centers, it has…
Moltbook Data Leak Reveals 1.5 Million Tokens Exposed in AI Social Platform Security Flaw
Moltbook has recently captured worldwide attention—not only for its unusual concept as a dystopian-style social platform centered on artificial intelligence, but also for significant security and privacy failures uncovered by researchers. The platform presents itself as a Reddit-inspired network…
Palo Alto Softens China Hack Attribution Over Beijing Retaliation Fears
Palo Alto Networks is facing scrutiny after reports that it deliberately softened public attribution of a vast cyberespionage campaign that its researchers internally linked to China. According to people familiar with the matter, a draft from its Unit 42…
OpenAI’s Evolving Mission: A Shift from Safety to Profit?
Now under scrutiny, OpenAI – known for creating ChatGPT – has quietly adjusted its guiding purpose. Its 2023 vision once stressed developing artificial intelligence to benefit people without limits imposed by profit goals, specifically stating “safely benefits humanity.” Yet…
Fraudulent Recruiters Target Developers with Malicious Coding Tests
If a software developer is accustomed to receiving unsolicited messages offering lucrative remote employment opportunities, the initial approach may appear routine—a brief introduction, a well-written job description, and an invitation to complete a small technical exercise. Nevertheless, behind the…
SMS and OTP Bombing Tools Evolve into Scalable, Global Abuse Infrastructure
The modern authentication ecosystem operates on a fragile premise: that one-time password requests are legitimate. That assumption is increasingly being challenged. What started in the early 2020s as loosely circulated scripts designed to annoy phone numbers has transformed into…
UK May Enforce Partial Ransomware Payment Ban as Cyber Reforms Advance
Governments across the globe test varied methods to reduce cybercrime, yet outlawing ransomware payouts stands out as especially controversial. A move toward limiting such payments gains traction in the United Kingdom, suggests Jen Ellis, an expert immersed in shaping national…
Researchers Identify Previously Undocumented Malware Used in World Leaks Intrusions
Cybersecurity researchers have identified a newly developed malicious software tool being used by the extortion-focused cybercrime group World Leaks, marking a pivotal dent the group’s technical capabilities. According to findings published by the cybersecurity research division of Accenture, the…