A critical vulnerability in Fortinet’s FortiClient EMS platform is now being actively exploited in real‑world attacks, according to threat‑intelligence firm Defused. Tracked as CVE‑2026‑21643, this SQL injection bug affects FortiClient EMS version 7.4.4 and allows unauthenticated attackers to run…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Infiniti Stealer Targets Mac Users with ClickFix Social Engineering Attack
Not stopping at typical malware tricks, Infiniti Stealer targets Macs using clever social manipulation instead of system flaws. Security firm Malwarebytes uncovered the operation, highlighting how it dodges standard protection tools. Once inside, the software slips under the radar…
How Duck.ai Offer Better Privacy Compared to Commercial Chatbots
Better privacy with DuckDuckGo’s AI bot Privacy issues have always bothered users and business organizations. With the rapid adoption of AI, the threats are also rising. DuckDuckGo’s Duck.ai chatbot benefits from this. The latest report from Similarweb revealed that traffic…
Apple Reinforces Digital Privacy for Users Without Restricting Law Enforcement Oversight
The company has long positioned its privacy architecture as a defining aspect of its ecosystem, marketing it as more than a feature, but a fundamental right built into its products as well. However, the latest disclosures emerging from US…
Claude Mythos 5: Trillion-Parameter AI Powerhouse Unveiled
Anthropic has launched Claude Mythos 5, a groundbreaking AI model boasting 10 trillion parameters, positioning it as a leader in advanced artificial intelligence capabilities. This massive scale enables superior performance in demanding fields like cybersecurity, coding, and academic reasoning,…
Cyber Attacks Threatening Global Digital Landscape, Affecting Human Lives
Cyberattack campaigns have increased against critical infrastructure like power grids, healthcare, and energy. Cyber warfare and global threat The global threat landscape has shifted from data theft to threats against human lives. The convergence of Operational Technology (OT) and Information…
Malware Hidden in Blockchain Networks Is Quietly Targeting Developers Worldwide
A new investigation has uncovered a cyberattack method that uses blockchain networks to quietly distribute malware, raising concerns among security researchers about how difficult it may be to stop once it spreads further. The threat first surfaced when a senior…
Infinity Stealer Targets macOS Using ClickFix Trick and Python-Based Malware
A newly identified information-stealing malware, dubbed Infinity Stealer, is targeting macOS users through a sophisticated attack chain that blends social engineering with advanced evasion techniques. Security researchers at Malwarebytes report that this is the first known campaign combining the…
Generative AI Expanding Capabilities of Fraud and Social Engineering Attacks
In the past, the quiet integration of generative artificial intelligence into financial systems has been framed as a story of optimizing and scaling. However, in the digital banking industry, generative AI is now being rewritten in terms that are…
Cybersecurity Risks Rise as Modern Vehicles Become Complex Digital Ecosystems
Today’s vehicles have evolved into highly interconnected cyber-physical systems, combining mobile apps, backend infrastructure, over-the-air (OTA) update mechanisms, and AI-powered decision-making. This growing integration has significantly expanded the potential attack surface, introducing security risks that traditional IT frameworks were…
Microsoft 365 Accounts Targeted in Large Iran-Linked Cyber Campaign
A cyber operation believed to be linked to Iranian threat actors has been identified targeting Microsoft 365 environments, with a primary focus on organizations in Israel and the United Arab Emirates. The activity comes amid ongoing tensions in the Middle…
Threat Actors Exploit GitHub as C2 in Multi-Stage Attacks Attacking Organizations in South Korea
GitHub attacked by state-sponsored hackers Cyber criminals possibly linked with the Democratic People’s Republic of Korea (DPRK) have been found using GitHub as a C2 infrastructure in multi-stage campaigns attacking organizations in South Korea. The operation chain involves hidden Windows…
Judge Blocks Pentagon’s Retaliatory AI Ban on Anthropic
A federal judge has temporarily halted the Pentagon’s effort to designate AI company Anthropic as a supply chain risk, ruling that the move appeared driven by retaliation rather than legitimate security concerns. In a 48-page order, U.S. District Judge…
AI Datacenter Boom Triggers Global CPU and Memory Shortages, Driving Price Hikes
Spurred by growing reliance on artificial intelligence, computing hardware networks are pushing chip production to its limits – shortages once limited to memory chips now affect core processors too. Because demand for AI-optimized facilities keeps climbing, industry leaders say…
Mistral Debuts New Open Source Model for Realistic Speech Generation
Rather than function as a conventional transcription engine, Mistral’s latest release represents a significant evolution beyond its earlier text-focused systems by expanding its open-weight philosophy into the increasingly complex domain of speech generation. As an alternative to acting as a…
Microsoft 365 Phishing Bypasses MFA via OAuth Device Codes
A recent wave of phishing attacks is bypassing traditional security protections on Microsoft 365, even when multi‑factor authentication (MFA) is enabled. Instead of stealing passwords directly, attackers are abusing legitimate Microsoft login flows to trick users into granting access…
Armenian Suspect Extradited to US Over Role in RedLine Malware Operation
A man from Armenia now faces trial in the U.S., accused of helping run a major cybercriminal network recently uncovered. On March 23, authorities took Hambardzum Minasyan into custody; later that week, he stood before judges in Austin. Officials…
CanisterWorm Campaign Combines Supply Chain Attack, Data Destruction, and Blockchain-Based Control
Malware that can automatically spread between systems, commonly referred to as worms, has long been a recurring threat in cybersecurity. What makes the latest campaign unusual is not just its ability to propagate, but the decision by its operators…
New RBI Rule Makes 2FA Mandatory for All Digital Payments
Two-factor authentication (2FA) will be required for all digital transactions under the new framework, drastically altering how customers pay with cards, mobile wallets, and UPI. India plans to change its financial landscape as the Reserve Bank of India (RBI) brings…
Six Month DPRK Campaign Behind $285 Million Drift Cyber Theft
The Drift Protocol, widely considered to be the largest perpetual futures exchange operating on the Solana blockchain, became the focal point of a highly coordinated attack on April 1, 2026, which is rapidly turning into one of the most…